Ukraine supporters in Germany targeted with PowerShell RAT malware
Ukraine supporters in Germany targeted with PowerShell RAT malware

Ukraine supporters in Germany targeted with PowerShell RAT malware

2022-05-16 18:05

An unknown threat actor is targeting German users interested in the Ukraine crisis, infecting...

Bitdefender vs McAfee: Compare EDR software

Bitdefender vs McAfee: Compare EDR software

2022-05-16 17:53

Bitdefender vs McAfee: Compare EDR software We may be compensated by vendors who appear on this...

CISA warns not to install May Windows updates on domain controllers

CISA warns not to install May Windows updates on domain controllers

2022-05-16 17:24

The U.S. Cybersecurity and Infrastructure Security Agency has removed a Windows security flaw...

Hackers are after your data. So why are you making it so easy for them?

Hackers are after your data. So why are you making it so easy for them?

2022-05-16 17:15

It's a no-brainer then that data security should be at the center of your overall security...

Delve into cybersecurity with this two-part training bundle

Delve into cybersecurity with this two-part training bundle

2022-05-16 17:00

Delve into cybersecurity with this two-part training bundle We may be compensated by vendors who...

Microsoft Defender vs CrowdStrike: Compare EDR software

Microsoft Defender vs CrowdStrike: Compare EDR software

2022-05-16 16:58

In user tests of endpoint detection and response tools, CrowdStrike is generally considered to...

Kali Linux 2022.2 released with 10 new tools, WSL improvements, and more

Kali Linux 2022.2 released with 10 new tools, WSL improvements, and more

2022-05-16 16:35

Kali Linux is a Linux distribution for cybersecurity professionals and ethical hackers to...

Vulnerabilities by Risk level (Last 12 months)

Risk level Last 12 months #
Critical 1238
High 3493
Medium 14169
Low 3414

Vulnerabilities by Vendor (Last 12 months)

Vendor Last 12 months #
Google 1386
Fedoraproject 992
Microsoft 887
Debian 792
Oracle 679

Latest Vulnerabilities

Latest Critical Vulnerabilities