Improve your program scope visibility
We’re excited to introduce Asset Groups, our latest feature designed to help structure mismanaged and broad program scopes for improved visibility. A more organized program…
We’re excited to introduce Asset Groups, our latest feature designed to help structure mismanaged and broad program scopes for improved visibility. A more organized program…
pi GPT, a custom integration for OpenAI’s ChatGPT that transforms everyday Raspberry Pi devices into fully managed AI-powered workstations. Announced on November 18, 2025, this…
Security leaders often feel prepared for a major cyber incident, but performance data shows a different reality. Teams continue to miss key steps during practice…
When AI models generate code, they deliver power and risk at the same time for security teams. That tension is at the heart of the…
As Black Friday sale scams continue to rise, shoppers across Europe and the US are being urged to stay vigilant this festive season. With promotions…
Cline is an open-source AI coding agent with 3.8 million installs and over 52,000 GitHub stars. Contains four critical security vulnerabilities that enable attackers to…
Passwords sit at the core of every critical system, but many organizations still overlook how fragile their password workflows can be. When something goes wrong,…
A targeted cyber espionage campaign has emerged across Southeast Asia, specifically affecting government and media organizations in countries surrounding the South China Sea. The campaign,…
Privacy rules like GDPR and CCPA are meant to help app stores be clearer about how apps use your data. But in the Google Play…
Nov 20, 2025Ravie LakshmananMalvertising / Artificial Intelligence Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part…
A dangerous vulnerability in ServiceNow’s Now Assist AI platform allows attackers to execute second-order prompt injection attacks via default agent configuration settings. The flaw enables…
State groups, criminal crews, and hybrid operators are all using familiar IT entry points to reach systems that support industrial processes, according to the latest…