About 4,850,000 results
Open links in new tab
  1. 2023 Top Routinely Exploited Vulnerabilities - CISA

    Nov 12, 2024 · Malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to 2022, allowing them to conduct operations against …

    Missing:
    • company
    Must include:
  2. Recent Cybersecurity Attacks and Data Breaches – 2025

    Dec 19, 2025 · Intellizence offers the latest data on cyber security, data breaches, malware, and ransomware attacks in leading companies and government agencies. We have listed major …

  3. CISA, NSA, and Partners Issue Annual Report on Top Exploited ...

    Nov 12, 2024 · The CSA, “2023 Top Routinely Exploited Vulnerabilities,” details the top 15 Common Vulnerabilities and Exposures (CVEs) collected by the authoring agencies in 2023.

  4. Data Breaches 2025: Biggest Cybersecurity Incidents So Far

    5 days ago · Breach cause: The reason for the breach was a vulnerability in third-party software. Key lesson: Enforce security controls and cybersecurity best practices with supply chain …

  5. 2025 Data Breach Report Industries Most at Risk Analysis

    Jul 14, 2025 · Industries from healthcare to e-commerce have faced record-breaking breaches, fueled by AI-driven ransomware, zero-day exploits, and insider threats. These aren’t random …

    Missing:
    • company
    Must include:
  6. Breaking Down CISA’s Top Routinely Exploited Vulnerabilities

    Dec 10, 2024 · Despite 2024 nearing its end, the Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, NSA, and international partners, issued their annual …

    Missing:
    • company
    Must include:
  7. Introduction - OWASP Top 10:2025

    OWASP Top 10:2025The Ten Most Critical Web Application Security Risks Introduction Welcome to the 8th installment of the OWASP Top Ten! A huge thank you to everyone who contributed …

    Missing:
    • company
    Must include:
  8. Top 50 Vendors By Total Number Of "Distinct" Vulnerabilities

    You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time.

    Missing:
    • company
    Must include:
  9. Top 20 Cybersecurity Vulnerabilities and Stories of 2025

    5 days ago · The cybersecurity landscape in 2025 saw a significant increase in the exploitation of vulnerabilities across various sectors, including enterprise software, cloud infrastructure, and …

    Missing:
    • company
    Must include:
  10. CVE: Common Vulnerabilities and Exposures

    Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 309,000 CVE Records accessible via Download or Keyword Search above. The CVE …

    Missing:
    • company
    Must include: