ServiceNow is acquiring cybersecurity firm Armis for $7.75 billion to enhance its security workflow capabilities with proactive, AI-driven management for…
Read More »vulnerability management
ImmuniWeb's Q4 update focuses on identifying AI-specific vulnerabilities, including the OWASP Top 10 for LLMs, and expands capabilities for detecting…
Read More »Google's December 2025 Android Security Bulletin details numerous critical vulnerabilities, including a severe flaw in the Android Framework that could…
Read More »Terra Security has launched a continuous exploitability validation solution to help organizations determine if detected vulnerabilities are actually exploitable within…
Read More »Security leaders face a rapidly growing vulnerability backlog due to fragmented tools and slow remediation, with the mean time to…
Read More »The Onapsis Control platform has been upgraded with enhanced security features that integrate with SAP CI/CD pipelines, expand Git repository…
Read More »Ransomware activity surged in Q3 2025, with compromised VPN credentials being the primary entry point for nearly half of all…
Read More »Traditional security measures often fail due to inaccurate data and manual processes, leaving organizations vulnerable as they operate with flawed…
Read More »Security teams face operational inefficiencies due to overwhelming threat intelligence data, struggling to prioritize effectively amid overlapping feeds and fragmented…
Read More »Forescout launched eyeSentry, a cloud-native platform that helps enterprises identify and manage vulnerabilities across IT, IoT, and IoMT assets, addressing…
Read More »Identity-related weaknesses and outdated vulnerabilities are the main causes of the rise in cloud security incidents, with attackers exploiting these…
Read More »The cybersecurity landscape in October 2025 saw companies introducing AI-driven solutions to automate security processes, improve visibility, and address evolving…
Read More »This month's selection of open-source cybersecurity tools offers cost-effective solutions for strengthening security across IT environments, including code analysis and…
Read More »Dependency-Track is an open-source platform that provides continuous, real-time monitoring of software supply chain risks by analyzing Software Bills of…
Read More »GitLab 18.5 introduces AI-driven agents and a redesigned interface to streamline development workflows and reduce context switching for teams. The…
Read More »Current cyber resilience measurement lacks standardized metrics, leaving governments unable to make informed policy decisions or compare capabilities across sectors…
Read More »The traditional cybersecurity model focused on detecting and responding to breaches is no longer sufficient, as modern organizations require proactive…
Read More »Tenable Cloud Security has achieved PROTECTED level certification under Australia's IRAP, validating its robust security controls for government cloud deployments…
Read More »Focus on foundational cybersecurity controls like vulnerability management and network segmentation to maximize protection with limited resources, as they offer…
Read More »DefectDojo is an open-source platform that centralizes application security management, vulnerability tracking, and DevSecOps workflows by consolidating findings from multiple…
Read More »

















