- CISA KEV Catalog Update
- ProjectDiscovery Nuclei Template Integrity Process
- Actively Exploited Critical VMware & Dell Flaws
- AI's Impact on Bug Bounty Hunter Workflows
- PortSwigger Publishes New Black Hat USA Research
CISA KEV Catalog Update
WhatCISA added one new vulnerability to its Known Exploited Vulnerabilities catalog, requiring federal agencies to remediate it under BOD 22-01.
Sourcewww.cisa.gov
Applies toGeneral
Why it mattersThis is a mandated priority for patching based on evidence of active exploitation.
ProjectDiscovery Nuclei Template Integrity Process
WhatProjectDiscovery details its open-source process for creating and validating reliable Nuclei templates, including community submissions and independent review.
Sourceprojectdiscovery.io
Applies toGeneral
Why it mattersUnderstanding this process helps assess the reliability of Nuclei templates used in automated security testing.
Actively Exploited Critical VMware & Dell Flaws
WhatGreenbone reports CVE-2026-22769 (CVSS 10) affecting Dell RecoverPoint for VMs has been covertly exploited since mid-2024; VMware Aria Operations 8.x also has critical patches.
Sourcewww.greenbone.net
Applies toGeneral (VMware, Dell environments)
Why it mattersThese are critically scored, widely deployed enterprise products under active attack.
AI's Impact on Bug Bounty Hunter Workflows
WhatThe 2026 YesWeHack report analyzes how AI is shaping bug bounty hunter strategies, target selection, and tool usage.
Sourcewww.yeswehack.com
Applies toGeneral
Why it mattersThis reflects the evolving tactics of the adversary community we defend against.
PortSwigger Publishes New Black Hat USA Research
WhatPortSwigger released new practical web security research from Black Hat USA 2026.
Sourcex.com
Applies toGeneral (Web Applications)
Why it mattersPortSwigger research consistently delivers novel, practical attack techniques relevant to modern appsec.
Is your WordPress site exposed to threats like these?
Arc is an AI security agent that watches your site 24/7 and patches vulnerabilities before attackers find them.
Scan your site free →