![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Is it OK to publish PoC exploits for vulnerabilities and patches?
In the wake of the Microsoft Exchange ProxyLogon zero-day and F5 BIG-IP security exploits earlier this year, many are questioning if and when should researchers publish proof …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110910/biohazard-400x200.jpg)
Years-old MS Office, Word flaws most exploited to deliver malware
29% of malware captured was previously unknown – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection, according to a HP …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/08194013/microsoft_exchange_2020-1-400x200.jpg)
As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leak
Microsoft Exchange servers around the world are still getting compromised via the ProxyLogon (CVE-2021-26855) and three other vulnerabilities patched by Microsoft in early …
![vmware](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100820/vmware-400x200.jpg)
Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP!
The day after VMware released fixes for a critical RCE flaw (CVE-2021-21972) found in a default vCenter Server plugin, opportunistic attackers began searching for publicly …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
57% of vulnerabilities in 2020 were classified as critical or high severity
NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, …
![talk](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100600/talk-400x200.jpeg)
Nearly 40% of consumers lost money to phone scams in 2020
Businesses and consumers are relying on the voice call more than ever during the pandemic with voice traffic up 184% in 2020 compared to 2019, according to a Hiya report. …
![broken](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/13095340/hand-glass-400x200.jpg)
Accellion to retire enterprise file-sharing product targeted in recent attacks
U.S.-based cloud solutions company Accellion will soon retire FTA, its legacy enterprise file-sharing solution, vulnerabilities in which have recently been exploited by …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
When it comes to vulnerability triage, ditch CVSS and prioritize exploitability
When it comes to software security, one of the biggest challenges facing developers today is information overload. Thanks in part to the widespread proliferation and use of …
![Vulnerabilities](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/03103021/10-vulnerabilities-400x200.jpg)
Top 10 most exploited vulnerabilities from 2020
Vulnerability intelligence-as-a-service outfit vFeed has compiled a list of the top 10 most exploited vulnerabilities from 2020, and among them are SMBGhost, Zerologon, and …
![Drupal](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/19123529/drupal-logo-sky-400x200.jpg)
Out-of-band Drupal security updates fix bugs with known exploits
Drupal has released out-of-band security updates to fix two critical code execution flaws (CVE-2020-28948, CVE-2020-28949) in Drupal core, as “there are known exploits …
![bug](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101615/bug-400x200.jpg)
The effectiveness of vulnerability disclosure and exploit development
New research into what happens after a new software vulnerability is discovered provides an unprecedented window into the outcomes and effectiveness of responsible …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/01102838/cisco-pattern-logo-400x200.jpg)
Critical vulnerabilities in Cisco Security Manager fixed, researcher discloses PoCs
Cisco has patched two vulnerabilities in its Cisco Security Manager solution, both of which could allow unauthenticated, remote attackers to gain access to sensitive …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!