software
How threat actors are using npm to launch attacks
WhiteSource released a threat report based on malicious activity found in npm, the most popular JavaScript package manager used by developers worldwide. The report is based on …
Product showcase: Cybellum’s Product Security Lifecycle Platform
Automotive, medical device and industrial equipment manufacturers are building critical devices we all rely on – from the cars we use to commute, the equipment that …
Healthcare industry most common victim of third-party breaches last year
Black Kite released its annual Third-Party Breach Report, which examines the impact of third-party cyber breaches in 2021. Ransomware was the most common attack method behind …
Spending on edge computing to reach $176 billion in 2022
Worldwide spending on edge computing is expected to be $176 billion in 2022, an increase of 14.8% over 2021. Enterprise and service provider spending on hardware, software, …
Proactive software supply chain security becoming critical as threats rise
Anchore released its report of executive insights into managing enterprise software supply chain security practices. The Anchore 2022 Software Supply Chain Security Report …
Software supply chain attacks jumped over 300% in 2021
Software supply chain attacks grew by more than 300% in 2021 compared to 2020, according to a study by Argon Security. According to the study, researchers discovered attackers …
Antivirus software market to reach $4.54 billion in 2025
The global antivirus software market is expected to grow from $3.80 billion in 2020 to $3.92 billion in 2021 at a compound annual growth rate (CAGR) of 3.2%. The market is …
Embedded hypervisor software market to reach $1.16 billion by 2026
36% of the growth will originate from APAC for the embedded hypervisor software market. China and Japan are the key markets for embedded hypervisor software in APAC. Market …
Open-source software holds the key to solving Log4Shell-like problems
Earlier this month, the existence of a critical vulnerability in Apache Log4j 2 was revealed and a PoC for it published. Dubbed Log4Shell, it’s an issue in a logging library …
GoTestWAF: Open-source project for evaluating web application security solutions
GoTestWAF is a tool for API and OWASP attack simulation that supports a wide range of API protocols including REST, GraphQL, gRPC, WebSockets, SOAP, XMLRPC, etc. It was …
Immudb: Open-source database, built on a zero trust model
Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …
Product showcase: Is Crystal Eye XDR the most comprehensive security platform on the market?
In this product showcase, we look at Red Piranha’s Crystal Eye XDR platform. Red Piranha pioneered the integrated security service model back in 2015 with out of the box MDR …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)