How Secure by Design helps developers build secure software
Security isn’t just a feature, it’s a foundation. As cyber threats grow more sophisticated and regulations tighten, developers are being asked to do more than…
Security isn’t just a feature, it’s a foundation. As cyber threats grow more sophisticated and regulations tighten, developers are being asked to do more than…
Ravie LakshmananFeb 04, 2026Supply Chain Security / Secure Coding The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks…
A high-severity vulnerability has been discovered in the Kubernetes ingress-nginx controller, allowing attackers to execute arbitrary code and potentially compromise entire clusters. Tracked as CVE-2026-24512,…
Global Threat Map is an open-source project offering security teams a live view of reported cyber activity across the globe, pulling together open data feeds…
Spain is preparing to take one of the strongest steps yet in Europe’s growing push to regulate the digital world for young people. Spain will…
Chrome Vulnerabilities Arbitrary Code Google has released a critical security update for the Chrome Stable channel, addressing two high-severity vulnerabilities that expose users to potential…
The Django Software Foundation has issued emergency security patches addressing six critical vulnerabilities affecting multiple versions of the popular Python web framework. Released on February…
One Identity Appoints Gihan Munasinghe as Chief Technology Officer – Hackread – Cybersecurity News, Data Breaches, AI, and More Notice: Function WP_Scripts::add was called incorrectly.…
Auto retailers see fraud as a regular part of selling and financing vehicles, something that shows up often enough to plan around, according to Experian.…
The HoneyMyte APT group, also known as Mustang Panda and Bronze President, continues expanding its cyber-espionage operations across Asia and Europe, with Southeast Asia being…
Datadog Security Research has uncovered an active web traffic hijacking campaign that abuses malicious NGINX configurations to intercept and reroute legitimate user traffic through attacker-controlled…
Coinbase has confirmed an insider breach after a contractor improperly accessed the data of approximately thirty customers, which BleepingComputer has learned is a new incident…