Ruckus network management solutions riddled with unpatched vulnerabilities

Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software,... Read more »

Sigma360 AI Investigator Agent reduces manual reviews

Sigma360 launched AI Investigator Agent, an autonomous GenAI agent that transforms how compliance teams handle risk alerts. This innovation leverages advanced AI and entity resolution models to clear easily... Read more »

Cynomi’s platform updates enable service providers to prioritize their security efforts

Cynomi has launched new business impact analysis (BIA) and business continuity planning (BCP) features. Designed to help cybersecurity professionals identify and protect mission-critical business processes, these new capabilities enable... Read more »

Lepide Protect detects, prioritizes, and revokes excessive permissions

In a move set to redefine the way organizations manage data access and implement zero trust, Lepide launched Lepide Protect, an AI-powered permissions management solution designed to help organizations move... Read more »

What EU’s PQC roadmap means on the ground

In this Help Net Security interview, David Warburton, Director at F5 Labs, discusses how the EU’s Post-Quantum Cryptography (PQC) roadmap aligns with global efforts and addresses both the technical... Read more »

Fake online stores look real, rank high, and trap unsuspecting buyers

Shopping on a fake online store can lead to more than a bad purchase. It could mean losing money, having your identity stolen, or even getting malware on your... Read more »

Open source has a malware problem, and it’s getting worse

Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as npm and PyPI. This brings the total number... Read more »

C-suites step up on OT cybersecurity, and it’s paying off

There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives, according to Fortinet. Growing maturity in OT... Read more »

Global software supply chain visibility remains critically low

Only 23% of organizations are confident that they have very high visibility of their software supply chain, according to LevelBlue’s Data Accelerator. The limited visibility reported by organizations significantly... Read more »

Red Hat introduces Enterprise Linux for Business Developers

Red Hat announced Red Hat Enterprise Linux for Business Developers to simplify access to the world’s leading enterprise Linux platform for business-focused development and testing scenarios. A new self-service... Read more »
Subscribe to our Newsletter