The latest research out of Kenna Security and Cyentia Institute compared how quickly defenders could remediate vulnerabilities and how quickly attackers could exploit the vulnerability in the wild.
Enterprise IT staff should prioritize fixing the flaws listed in the Top 25 list of most commonly targeted vulnerabilities released by the United States National Security Agency.
A new technique called the Raccoon attack can break the confidentiality of some TLS connections under certain circumstances.
Attackers are actively exploiting a critical bug in the File Manager WordPress plugin.
Attackers are actively trying to exploit a memory exhaustion vulnerability (CVE-2020-3566) in Cisco's IOS XR royter software.