Palo Alto Networks has added a new SCA solution to Prisma Cloud to help developers safely use open source software components.
Uber has confirmed that it is responding to a cyber security incident as reports emerge that the firm has suffered a significant network data breach.
Vendors, collectives and governments are contributing to improve the security of open source code, software and development practices.
Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimise them.
The npm Best Practices Guide aims to help JavaScript and TypeScript developers reduce the security risks of using open source dependencies.
A new report shows that significantly more CVEs will be published this year, and that some organisations are still vulnerable from older, unpatched CVEs.
Akamai research discovers phishing toolkit reuse played a key role in increased malicious domain activity in the second quarter of 2022.
From March 2023, Lloyd’s of London will require all its insurer groups to exclude liability for losses arising from state-backed cyber attacks.
Google Cloud claims Cloud Armor protected a customer from a HTTPS DDoS attack that peaked at 46 million requests per second.
New research from Cyble has identified a peak in attacks targeting virtual network computing (VNC) in critical infrastructure sectors.
Cisco has admitted suffering a security incident targeting its corporate IT infrastructure in late May 2022, after an employee’s credentials were compromised.
Cyber security vendor CrowdStrike has added new AI-powered indicators of attack (IoA) functionality to its Falcon platform.
UnionDigital Bank’s CISO Dominic Grunden and CDO Dr. David R. Hardoon lift the lid on why the new digital bank has fully embraced an AI-focused approach to cyber security.
From Heartbleed to Apache Struts to SolarWinds, these are the 10 watershed security incidents of the past 10 years.
Darktrace claims its AI-driven portfolio works together autonomously to optimise an organisation’s security through a continuous feedback loop.