Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

Likely Exploited Vulnerabilities LEV

Vulnerabilities

The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV- and EPSS-based remediation prioritization. 

Pwn2Own Berlin 2025 results

Vulnerabilities

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.

Pwn2Own Berlin 2025

Vulnerabilities

Pwn2Own participants have earned tens of thousands of dollars for Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI exploits.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.


Trending

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register