https://thenewstack.io/owasp-top-10-a-guide-to-the-worst-software-vulnerabilities/
Nov 5, 2021 - For the first time in four years, the OWASP Top 10 list of web application risks was updated for OWASP's 20th anniversary.
the worstsoftware vulnerabilitiesowasptopguide
https://www.nist.gov/publications/report-workshop-software-measures-and-metrics-reduce-security-vulnerabilities-swmm-rsv
The National Institute of Standards and Technology (NIST) workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV) was held on Ju
the workshopreportsoftwaremeasuresmetrics
https://www.itpro.com/security/33031/spectre-vulnerabilities-cannot-be-mitigated-by-software-alone
Researchers found that one variant of the critical data-leaking flaw "defeats everything we can think of"
it prospectrevulnerabilitiescannotmitigated
https://siliconangle.com/2025/10/06/google-deepmind-unveils-codemender-ai-agent-autonomously-patches-software-vulnerabilities/
Google DeepMind unveils CodeMender, an AI agent that autonomously patches software vulnerabilities - SiliconANGLE
google deepmindai agentpatches
https://cyberinsider.com/asus-patches-critical-vulnerabilities-in-routers-and-pc-software/
Nov 26, 2025 - ASUS released firmware and software updates addressing multiple vulnerabilities across its consumer router lines and PC management software.
pc softwareasuspatchescriticalvulnerabilities
https://www.securitymagazine.com/articles/101643-critical-software-vulnerabilities-rose-37-in-2024
A recent software vulnerability report by Action1 found a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited...
critical softwarevulnerabilitiesrosesecuritymagazine
https://alwaysuptodate.ai/understanding-the-critical-role-of-software-vulnerabilities-in-hacking-incidents/
Approximately 60% of hacking incidents can be attributed to software vulnerabilities. In this article we look at how to mitigate the risk.
software vulnerabilitiesrolehackingincidents
https://www.brighttalk.com/webcast/11673/599529
Many organizations today run their businesses using proprietary or “First-Party” applications built on 80% open-source components to meet their unique n...
open source softwarethe riskdiscoverampassess
https://www.checkpoint.com/cyber-hub/cloud-security/what-is-application-security-appsec/owasp-top-10-vulnerabilities/
Learn what the most recent OWASP top 10 web application security vulnerabilities are, and why organizations should be aware of these vulnerabilities.
check point softwareowasptopvulnerabilities
https://www.computerweekly.com/microscope/news/252447412/Comparex-exposes-council-server-software-vulnerabilities
Thanks to a Freedom of Information Request the channel now knows just how widespread the use of unsupported server software is among councils
server softwareexposescouncilvulnerabilitiesmicroscope
https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
CISA lists CVE-2024-12356, a critical BeyondTrust flaw, as actively exploited. Update on-prem systems to patch vulnerabilities.
cisaaddscriticalflawbeyondtrust