• Request IT Security
  • OPENVAS PRODUCTS
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
  • Nederlands Nederlands Dutch nl
Greenbone
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Upcoming Solutions
      • OPENVAS AI
      • OPENVAS CONTROL
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • Partners
    • MSSP
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Attack Vector Timeline
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • Exposure Management
      • IT and Information Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Upcoming Solutions
      • OPENVAS AI
      • OPENVAS CONTROL
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap and Lifecycle
    • Request IT Security
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • Partners
    • MSSP
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Attack Vector Timeline
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • Exposure Management
      • IT and Information Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
  • German
  • English
  • Italian
  • Dutch

Latest Cybersecurity News and IT Security Insights

Stay informed about emerging threats, practical protection strategies and innovations in vulnerability management. Benefit from the expertise of the Greenbone specialists and strengthen your IT security.

Subscribe to the Newsletter Now

Joseph Lee

July 2025 Threat Report: Cisco, CrushFTP, HPE IRS and Others Face Active Exploitation

Blog

The July 2025 Threat Report takes a broad approach, covering some of the top cyber threats from the past month. The Microsoft SharePoint flaw titles “ToolShell” dominated the headlines; see our alert on ToolShell for a detailed analysis. Over 4,000 CVEs were published last month; almost 500 of them were rated Critical, with CVSS over […]

Read more
20. August 2025/by Joseph Lee
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Joseph Lee https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Joseph Lee2025-08-20 14:21:172025-12-31 09:33:56July 2025 Threat Report: Cisco, CrushFTP, HPE IRS and Others Face Active Exploitation
Joseph Lee

New WinRAR Flaw CVE-2025-8088 Exploited in Social Engineering Attacks

Blog

! Update January 28, 2026 Recent reporting from Google Threat Intelligence Group confirms that CVE-2025-8088 continues to be actively exploited well after patch availability. Attacks have been observed across a broad range of threat actors and campaigns and are no longer isolated to a single cluster or region. Threat actors leveraging CVE-2025-8088 include government-backed actors […]

Read more
15. August 2025/by Joseph Lee
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Joseph Lee https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Joseph Lee2025-08-15 11:50:292026-02-02 12:26:41New WinRAR Flaw CVE-2025-8088 Exploited in Social Engineering Attacks
Greenbone AG

Greenbone Supports DORA Compliance with Vulnerability Detection, Data Sovereignty and Reporting

Blog

The global financial sector has been slammed with high-profile cyber incidents, placing trust in financial systems in jeopardy. These cyber attacks are extremely costly and widespread. Large corporations are not the only losers in this battle. Citizens also suffer directly when data protection and the integrity of financial transactions are compromised. Some of the most […]

Read more
13. August 2025/by Greenbone AG
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Greenbone AG https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Greenbone AG2025-08-13 14:50:412025-09-30 15:58:18Greenbone Supports DORA Compliance with Vulnerability Detection, Data Sovereignty and Reporting
Page 9 of 56«‹7891011›»

Search

Search Search

Archive

  • 2026
  • 2025

Newsletter

Subscribe Now

OPENVAS BASIC

Our entry-level enterprise product

Test 14 Days Free of Charge

Products & Solutions

  • OPENVAS SCAN
  • OPENVAS REPORT
  • OPENVAS BASIC
  • OPENVAS FREE
  • OPENVAS AI
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
  • Cyber Resilience Act
ISO27001-EN

About us

  • About Greenbone
  • Partners
  • MSSP
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Newsletter
  • Media Contact
  • Careers
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2026
  • Link to LinkedIn
Scroll to top Scroll to top Scroll to top
Contact
Request IT Security Contact Us Subscribe to Newsletter Follow on LinkedIn