All Related Articles for: Fix Software Weaknesses, Not Just Individual Bugs
Found 178 articles related to this post based on shared entities and topics.
-
December 13, 202526%MITRE Reveals 2025’s 25 Most Dangerous Software Weaknesses
MITRE and CISA have released the 2025 CWE Top…
Entity similarity: 35% | Topic similarity: 12%Read More » -
January 3, 202626%Top 10 Cybersecurity Stories of 2025: The Year’s Biggest Breaches & Threats
Major cybersecurity vendors withdrew from the MITRE ATT&CK Evaluations…
Entity similarity: 35% | Topic similarity: 12%Read More » -
April 17, 202624%ENISA Aims for CVE Program Leadership Role
The EU's ENISA is being onboarded by the U.S.…
Entity similarity: 35% | Topic similarity: 6%Read More » -
April 14, 202622%MITRE’s New Fraud-Cyber Framework Uses Real Attack Data
U.S. financial fraud losses surged to $16.6 billion in…
Entity similarity: 36% | Topic similarity: 0%Read More » -
September 12, 202521%CISA Unveils New CVE Program Roadmap for Enhanced Cybersecurity
CISA has launched a strategic roadmap to transition the…
Entity similarity: 36% | Topic similarity: 0%Read More » -
April 17, 202621%EU Mandates Coordinated Vulnerability Disclosure
The near-lapse of funding for the global CVE program…
Entity similarity: 35% | Topic similarity: 0%Read More » -
April 17, 202621%CISA Expands AI Role in Cybersecurity Program
A senior CISA leader has called for major AI…
Entity similarity: 35% | Topic similarity: 0%Read More » -
July 4, 202518%CVE Program Expands with Two New Forums for Better Security
The CVE Program has launched two new working groups,…
Entity similarity: 31% | Topic similarity: 0%Read More » -
April 18, 202614%NIST to prioritize only high-risk CVEs amid NVD backlog
NIST is shifting the National Vulnerability Database (NVD) to…
Entity similarity: 16% | Topic similarity: 11%Read More » -
September 9, 202513%New Ethics Rules for Cybersecurity Research: What You Need to Know
Major cybersecurity conferences are implementing new ethics requirements for…
Entity similarity: 17% | Topic similarity: 7%Read More » -
January 17, 202613%Critical FortiSIEM Exploit Released: CVE-2025-64155 PoC
A critical vulnerability (CVE-2025-64155) in Fortinet's FortiSIEM platform now…
Entity similarity: 17% | Topic similarity: 7%Read More » -
October 9, 202513%Secure Your Code with DefectDojo: Open-Source DevSecOps
DefectDojo is an open-source platform that centralizes application security…
Entity similarity: 17% | Topic similarity: 7%Read More » -
September 6, 202513%September 2025 Patch Tuesday: What to Expect from the CVE Matrix
CVE identifiers provide a universal system for cataloging and…
Entity similarity: 17% | Topic similarity: 7%Read More » -
October 14, 202513%Crafting an Effective Healthcare Cybersecurity Strategy
Focus on foundational cybersecurity controls like vulnerability management and…
Entity similarity: 17% | Topic similarity: 6%Read More » -
March 13, 202613%Infostealers Fuel Rise of Agentic Attack Chains
The cyber threat landscape in 2025 is defined by…
Entity similarity: 18% | Topic similarity: 6%Read More » -
February 24, 202613%Android Tablet Backdoor & Dell Zero-Day: Critical Week in Review
A critical firmware backdoor in Android tablets and a…
Entity similarity: 17% | Topic similarity: 6%Read More » -
December 17, 202513%Ro’s CISO: Securing Telehealth Data Flows
The rapid growth of telehealth creates a complex data…
Entity similarity: 17% | Topic similarity: 6%Read More » -
March 17, 202613%AWS Accounts Hijacked by AiTM Phishing, HR Targeted in Year-Long Malware Campaign
Attackers are employing sophisticated, persistent methods like phishing kits…
Entity similarity: 17% | Topic similarity: 6%Read More » -
March 3, 202613%Self-Spreading npm Malware & Cisco SD-WAN 0-Day Exploited
The digital threat landscape is intensifying with novel supply…
Entity similarity: 17% | Topic similarity: 6%Read More » -
October 15, 202513%US Government Shutdown Cuts Cybersecurity Staff
The US government shutdown has drastically reduced staffing at…
Entity similarity: 17% | Topic similarity: 6%Read More »