Please turn on your JavaScript for this page to function normally.
Dependency Combobulator
Dependency Combobulator: Open source toolkit to combat dependency confusion attacks

Apiiro released Dependency Combobulator, a modular and extensible open source toolkit to detect and prevent dependency confusion attacks. The toolkit, available on GitHub, …

industrial
Unseen gatekeepers: Industrial software providers’ role securing global infrastructure

National infrastructure in almost every Western country has come under attack by threat actors in the last few years. These attacks have grabbed the attention of businesses, …

criminal
77% of rootkits are used for espionage purposes

In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or …

MITRE ATT&CK
Mapping ATT&CK techniques to CVEs should make risk assessment easier

Vulnerability reporters should start using MITRE ATT&CK technique references to describe what the attacker is trying to achieve by exploiting a given CVE-numbered …

AI
Navigating ethics in AI today to avoid regrets tomorrow

As artificial intelligence (AI) programs become more powerful and more common, organizations that use them are feeling pressure to implement ethical practices in the …

bot
Bots to become the future of work and provide ROI to organizations using them

The prolonged pandemic has already brought many changes to the workplace, and according to a TELUS International survey, 90% of U.S. employees believe bots will play a key …

ThreatMapper
ThreatMapper: Open source platform for scanning runtime environments

Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, …

KuberLogic
KuberLogic open-source platform turns infrastructure into a managed PaaS

CloudLinux launched a new open-core project – KuberLogic – software that allows DevOps to set up scalable, self-healing PaaS on top of your Kubernetes cluster. Available on …

Nick Myers
Electronic warfare: The critical capability of dominating the electromagnetic spectrum

In this interview with Help Net Security, Nick Myers, Director of Business Development, Electronic Combat Solutions at BAE Systems, talks about the evolution of electronic …

fix
ORM software market to reach $2.6 billion in 2026

The global operational risk management (ORM) software applications market will grow from $1.5 billion in 2020, at a CAGR of 9%, to $2.6 billion in 2026, according to a study …

Bug
Security and trust in software remains top priority for buyers

Faster decision making, credit card transactions instead of negotiated contracts, and the near-ubiquitous use of peer review sites are all part of the new normal in enterprise …

C-level execs confident in their software supply chain security, but challenges remain

A survey of C-level executives released by CloudBees reveals high confidence levels in software supply chain security but a limited understanding of the essential components …

Don't miss

Cybersecurity news