News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an ...
CISA announced new resources for security teams looking to contain cyberattacks and evict hackers from their networks.
North Korean threat actors have distributed over 200 malicious open source packages, in an audacious new cyber-espionage ...
Trivy Partner Connect enables companies to integrate with and contribute to Trivy in a structured, community-aligned way. The ...
Vulnerabilities don’t get fixed because we wish them away. They get fixed because someone insists that they can’t be ignored.
In response, the National Institute of Standards and Technology (NIST) launched a multi-year effort to standardize post-quantum cryptographic (PQC) algorithms resistant to quantum attacks. This ...
Hear insights from inside the intelligence community and private sector on building OSINT that’s transparent, cost-aware and ...
A new report out today from software supply chain security firm Sonatype Inc. details how the infamous North Korea-backed ...
Cybersecurity researchers say they've identified a major vulnerability within Google's Gemini CLI, an open-source AI agent ...
A hacker recently injected code into Amazon Q in order to warn users of the platform’s potential security flaws. But the ...
Too often, security advice is vague or impractical, but Baseline aims to change that, observed Ben Cotton, open-source community lead at Kusari and co-maintainer of Baseline. He noted that every ...