SAP software is used throughout the Fortune 500. The company is dealing with a critical software bug disclosed this week. (Getty Images) SAP zero-day vulnerability under widespread active exploitation Researchers attribute the attacks to an initial access broker who is exploiting the 10.0 critical vulnerability. 10 hours ago By Matt Kapko
Safe Mode Verizon’s Alex Pinto on the takeaways from the 2025 DBIR Alex Pinto, Associate Director of Threat Intelligence at Verizon Business 1 day ago By CyberScoop Staff
The four most frequently exploited vulnerabilities were all contained in edge devices, such as VPNs, firewalls and routers. (Getty Images) Attackers hit security device defects hard in 2024 Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network… 2 days ago By Matt Kapko
(Photo by STEFANI REYNOLDS/AFP via Getty Images) 10 key numbers from the 2024 FBI IC3 report The yearly report from the bureau is filled with stats. We pulled out the most interesting ones. 2 days ago By Greg Otto
(Getty Images) Verizon discovers spike in ransomware and exploited vulnerabilities Verizon’s 2025 Data Breach Investigations Report noted a 37% increase in ransomware attacks and a 34% increase in exploited vulnerabilities. 3 days ago By Matt Kapko
(Tippapatt/Getty Images) Attackers stick with effective intrusion points, valid credentials and exploits Infostealers fueled the staying power of identity-based attacks, increasing 84% on a weekly average last year, according to IBM X-Force. 4 days ago By Matt Kapko
Safe Mode Will Pearce on the ever-changing field of offensive AI security Will Pearce, CEO and Co-founder of Dreadnode Apr 17, 2025 By CyberScoop Staff
Shanghai, China; AerialPerspective Images, Getty Images 35 countries use Chinese networks for transporting mobile user traffic, posing cyber risks An analysis from iVerify found U.S. allies on the list where mobile providers employ China-based networks. Apr 17, 2025 By Tim Starks
A logo sign outside of the headquarters of Ivanti in South Jordan, Utah. (Kristoffer Tripplaar / Alamy Stock Photo) Is Ivanti the problem or a symptom of a systemic issue with network devices? Exploited vulnerabilities have turned up in Ivanti products 16 times since 2024. That’s more than any other vendor in the network edge device space. Apr 14, 2025 By Matt Kapko
Safe Mode Lior Div on how security teams should be using AI agents Lior Div, co-founder and CEO of 7AI Apr 10, 2025 By CyberScoop Staff