Dependency-Track: Open-source component analysis platform
Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles…
Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles…
The industry is entering a phase where code is being deployed faster than it can be secured, according to OX Security. Findings from the Army…
Want to see if a remote server is still alive, or trace the path your data takes across the internet? Network Utility had you covered,…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks the wrong wayMost research on…
Microsoft has released an out-of-band security update that “comprehensively address” CVE-2025-59287, a remote code execution vulnerability in the Windows Server Update Services (WSUS) that is…
Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from the internet. The change affects…
In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype from reality. She explains why…
Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers describe a year in which…
Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate a person’s voice with matching…
AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with a price. A new report…
Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout and Rubrik. Axoflow Security Data…
Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed the “YouTube Ghost Network.” The…