Sumsub announced the launch of its AI Agent Verification solution, an approach to controlling AI-driven automation by binding it to a real, verified human identity within Sumsub’s Know Your... Read more »
cside announced the launch of VPN Detection. The new solution enables businesses to detect and manage traffic originating from virtual private networks. As verification laws and content distribution agreements... Read more »
Google agrees to pay $135 million to settle a proposed class action lawsuit brought by Android smartphone users over alleged unauthorized cellular data transmissions. After fees and administrative costs... Read more »
Our phones hold our most personal details, and we use them everywhere. On the bus, in elevators, and while waiting in line, screens are often visible to people nearby.... Read more »
OpenSSL released security updates that address 12 flaws, including a high-severity remote code execution vulnerability. OpenSSL issued security updates fixing 12 vulnerabilities in the open-source cryptographic library, including a... Read more »
SolarWinds has fixed six critical and high-severity vulnerabilities in its popular Web Help Desk (WHD) support ticketing and asset management solution, and is urging customers to upgrade to v2026.1... Read more »
The number of people working in the cyber security field has almost trebled in the 2020s, with one cyber professional for every 68 businesses in the UK Read more »
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous... Read more »
Dynatrace announced next-generation Real User Monitoring (RUM) capabilities that deliver unified insights across web and mobile applications. RUM has become essential to understanding how applications perform for real users.... Read more »
Open source malware activity during 2025 concentrated on a single objective: executing code inside developer environments, according to Sonatype. The focus reflected a broader shift in supply chain attacks... Read more »
