Lumo expands its Lumo AI assistant with encrypted, project-based workspaces

Lumo is Proton’s AI assistant, built with a focus on privacy and user control. It runs on Proton’s infrastructure and is designed so conversations are not used to train... Read more »

Wine 11 brings major architectural work, synchronization changes, 600+ bug fixes

Wine, originally short for “Wine Is Not an Emulator,” is a compatibility layer that allows Windows applications to run natively on POSIX-compliant operating systems, including Linux, macOS, and BSD.... Read more »

Acronis Archival Storage brings compliance-ready, S3-compatible cold storage to MSPs

Acronis announced the launch of Acronis Archival Storage, a long-term, compliant, and cost-efficient data storage and protection solution designed for Managed Service Providers (MSPs) and their small-to-medium business (SMBs)... Read more »

F5 NGINXaaS for Google Cloud protects cloud-native applications

F5 launched F5 NGINXaaS for Google Cloud, a cloud-native application delivery-as-a-service solution. Developed in collaboration with Google Cloud, this offering addresses the challenges of delivering modern and containerized applications... Read more »

Concentric AI releases Private Scan Manager for AWS GovCloud (US)

Concentric AI announced further expansion of the Private Scan Manager functionality in its Semantic Intelligence AI and data security governance platform to include AWS GovCloud (US). Government agencies, contractors,... Read more »

AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations

Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in Salesforce Experience Cloud applications. The tool focuses on the... Read more »

Noction adds automatic anomaly detection to IRP v4.3 for faster DDoS mitigation

Noction has released Noction Intelligent Routing Platform (IRP) v4.3, delivering new capabilities in automated DDoS detection, routing safety, and operational control for modern IP networks. A key highlight of... Read more »

Browser-in-the-Browser phishing is on the rise: Here’s how to spot it

Browser-in-the-Browser (BitB) phishing attacks are on the rise, with attackers reviving and refining the technique to bypass user skepticism and traditional security controls. BitB phishing: Dangerous and effective For... Read more »

Minimal Ubuntu Pro expands Canonical’s cloud security offerings

Canonical has released Minimal Ubuntu Pro images for use on public cloud platforms, aiming to give teams a smaller base image with a narrower software footprint. The solution is... Read more »

AI EdgeLabs launches Compliance Center and Linux Audit for NIS2 and CRA readiness

AI EdgeLabs announced the launch of Compliance Center and Linux Audit. Purpose-built for organizations facing NIS2, CRA, and global critical-infrastructure mandates, the new capabilities replace manual reporting and scan-based... Read more »
Subscribe to our Newsletter