And almost 50 more than last month.
Rubrik, Inc. ( RBRK) Data Recovery Summit January 21, 2026 1:00 PM EST ...
CISA has added to the KEV catalog two Linux vulnerabilities leading to privilege escalation and authentication bypass via ...
Researchers have discovered a never-before-seen framework that infects Linux machines with a wide assortment of modules that ...
Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows them to bypass ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such ...
This week’s recap unpacks how evolving exploits, malware frameworks, and cloud missteps are reshaping modern cyber defense ...
A 9.8-severity flaw (CVE-2026-24061) in GNU InetUtils telnetd allows remote authentication bypass and root access in versions ...
It was a strange year in cyberspace, as US president Donald Trump and his administration launched foreign policy initiatives and massive changes to the federal government that have had significant ...
Linux users face a new threat as cybercriminals exploit a critical vulnerability in Canonical’s Snap Store, hijacking trusted ...