An increase in compliance activities such as the creation of software bills of materials (SBOMs), performing software composition analysis (SCA) scans on code repositories, and securing the attack ...
Ransomware Evolution: Data exfiltration and extortion overtook encryption-based attacks as the primary ransomware tactic, simplifying operations and maximizing payouts. Healthcare became the second ...
The annual Building Security In Maturity Model report from Black Duck highlights trends in securing complex software supply ...
Malware has compromised more than 1 billion passwords according to a new security alert—here’s what you need to know and do.
We’re pleased to announce the publication of our 2025 State of Application Risk report. Based on anonymized data collected ...
Report highlights Aqua's comprehensive suite of capabilities that enable enterprises to confidently protect their cloud native application lifecycle ...
As reported by Cybernews, the cybersecurity company Check Point details the most impersonated brands in phishing schemes from Q4 of 2024 – and to no one’s surprise, Microsoft continues to top the list ...
Open source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge.
Five months after announcing that it hit $200 million in annualized revenue, Abnormal Security has hired a CFO.
CAMBRIDGE, Mass., Jan. 16, 2025 (GLOBE NEWSWIRE) -- ReversingLabs (RL), the trusted name in file and software security, ...
It's reported that the Commerce Department has been investigating Baicells on national security grounds and has sent ...
CISA and other agencies call to action for the US government to take steps to close the software understanding gap.