News

AppOmni at the 2025 RSA Conference today added a Model Context Protocol (MCP) server to its platform for protecting software-as-a-service (SaaS) ...
Windscribe, a globally used privacy-first VPN service, announced today that its founder, Yegor Sak, has been fully acquitted by a court in Athens, Greece, following a two-year legal battle in which ...
Jeffrey Bowie, the CEO of cybersecurity company Veritaco, was seen on security camera footage walking into St. Anthony Hospital in Oklahoma City last year and installing malware on an employee ...
Cisco today at the 2025 RSA Conference revealed it is making available an open-source generative artificial intelligence (AI) reasoning model specifically designed to automate cybersecurity analytics ...
Quando Skybox Security ha chiuso, ho avuto seri dubbi, non solo riguardo al mio lavoro, ma anche su come la situazione avrebbe potuto influire sulla mia credibilità professionale che ...
NetRise today at the 2025 RSA Conference unveiled a binary composition analysis (BCA) tool that makes it possible to identify application security weaknesses in applications that have already been ...
We recently released The Rise of Agentic AI, our API ThreatStats report for Q1 2025, finding that evolving API threats are fueled by the rise of agentic AI systems, growing complexity in cloud-native ...
Discover the Blue Shield of California data breach affecting 4.7M members. Learn about the risks and essential security ...
Discover Google's Firestore with MongoDB compatibility, enhancing cloud database functionality with serverless architecture.
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the ...
As generative artificial intelligence develops, new terms and emerging threats are grabbing headlines regarding cyber threats to enterprises.
Are Your Cloud Compliance Practices Truly Impenetrable? Non-Human Identities (NHIs) and Secrets Management have emerged as critical components of an effective cybersecurity strategy. These effectively ...