Private Repository Secures the AI-driven Development Boom
Friday, March 27, 2026 by Austin Harris
ActiveState has launched ActiveState Curated Catalog. This new offering provides organizations with a private, secure repository of open source components from the ActiveState Library, giving developers and AI code generators access to vetted packages from a trusted internal source instead of pulling them directly from the open internet.
Directly pulling open source ...
AI productivity rises amid 2026 uncertainty
Thursday, February 19, 2026 by Trey Abbe
AI continues to deliver measurable productivity and performance gains across organizations, but global economic uncertainty and geopolitical risk are reshaping technology investment, hiring, and innovation strategies for 2026, according to the annual Reveal Top Software Development Challenges Survey from Infragistics, released today. The study surveyed 250 senior t...
Reused bitcoin addresses are quietly increasing quantum risk
Wednesday, February 4, 2026 by Brittany Hainzinger
Despite billions spent on blockchain improvements and security measures, crypto criminals still steal billions of dollars from the crypto ecosystem each year, and that didn`t change in 2025. In fact, with over $4 billion in total losses from hacks, fraud, scams, money laundering, and ransomware, 2025 was the worst year for crypto illicit activity ever recorded.
Howev...
Airline data breach hits WestJet exposing over 1M passengers
Thursday, October 30, 2025 by Russ Scritchfield
Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected.
Details of the information compromised
The informati...
Russian airport hacked as St. Petersburg website reports cyberattack
Monday, October 6, 2025 by Trey Abbe
Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...
Blockchain prediction enhanced through AI delivers smarter forecasts
Thursday, September 25, 2025 by Austin Harris
Blockchain and artificial intelligence (AI) are two of the most studied technologies in modern computing. Each brings distinct strengths: blockchain provides transparency and security through decentralized ledgers, while AI delivers advanced capabilities in data analysis, learning, and prediction. When combined, the two technologies are positioned to improve how forecas...
Push for FTC to Investigate Microsoft
Monday, September 22, 2025 by Austin Harris
U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure.
Senator highlights cybersecurity risks
In a letter addressed to FT...
Salesforce data breach linked to Tenable via Salesloft Drift
Friday, September 12, 2025 by Richard Harris
A recent Salesforce data breach involving the Salesloft Drift integration has affected multiple organizations, including cybersecurity company Tenable. The company confirmed that limited customer contact and support case data were exposed but emphasized that no core product data was compromised.
Scope of exposed information
Tenable reported that information access...
Hackers steal cryptocurrency using fake job offers report reveals
Tuesday, September 9, 2025 by Trey Abbe
A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...
Salesforce breach let hackers steal Google customer data
Monday, August 25, 2025 by Richard Harris
In June, one of Google’s corporate Salesforce instances was affected by activity consistent with the UNC6040 campaign described in the post. Google responded by conducting an impact analysis and implementing mitigation steps. The affected instance stored contact information and related notes for small and medium-sized businesses. Investigators confirmed that data ...
GitHub Copilot surpasses 20M users
Monday, August 18, 2025 by Austin Harris
Microsoft Corporation wrapped up its fiscal year 2025 on an exceptionally strong note, delivering robust growth across cloud, AI, productivity, and consumer services. The tech giant reported a 24% year-over-year jump in net income for the fourth quarter, amounting to $27.2 billion, while revenue for the same period reached $76.4 billion, an 18% increase. These results u...
Microsoft at Black Hat USA 2025
Monday, August 11, 2025 by Russ Scritchfield
Microsoft will participate in Black Hat USA 2025, scheduled for August 5-7 in Las Vegas, offering attendees a practitioner-driven experience centered on real-world threat intelligence, incident response, and applied AI expertise. The company emphasizes that cybersecurity is most effective when intelligence, tools, and domain expertise are tightly integrated. To that end...
KNP ransomware attack
Wednesday, August 6, 2025 by Russ Scritchfield
One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...
Microsoft SharePoint hit by widespread zero-day attacks
Wednesday, July 30, 2025 by Austin Harris
The Cybersecurity and Infrastructure Security Agency (CISA) has reported active exploitation of a newly identified remote code execution (RCE) vulnerability affecting on-premise Microsoft SharePoint servers. The vulnerability, cataloged as CVE-2025-53770, is a variant of the previously known CVE-2025-49706 and presents significant risks to organizations by enabling unau...
2025 Artifact Management Report
Thursday, July 10, 2025 by Richard Harris
The 2025 Artifact Management Report arrives at a moment of profound change for software development teams worldwide. As organizations grapple with unprecedented security challenges, rapid AI adoption, and complex software supply chains, this year’s findings expose the critical gaps and evolving expectations surrounding artifact management. With software now the ba...
AI harms addressed by Anthropic
Wednesday, May 21, 2025 by Austin Harris
As AI capabilities rapidly advance, understanding and addressing the full spectrum of potential impacts becomes increasingly important. Today, we're sharing insights into our evolving approach to assessing and mitigating various harms that could result from our systems, ranging from catastrophic scenarios like biological threats to critical concerns like child safet...
Universities fighting cybercrime with students
Thursday, April 24, 2025 by Richard Harris
Universities, one of the most popular targets for cybercriminals, are employing a new tool in the fight against cybercrime, their own students.
Over the past few years, universities and colleges around the U.S. have been increasingly hiring students and training them to become analysts in their security operations centers, known as SOCs. Students work alongside...
Security trade-offs and Xs vulnerabilities
Friday, March 21, 2025 by Richard Harris
The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...
AI virtual escape room challenge
Friday, March 7, 2025 by Austin Harris
Pangea recently announced the general availability of AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure. Alongside the company’s existing AI Access Control and AI Visibility products, Pangea now offers the industry’s most comprehensive suite of guardrails to secure AI applications.&nb...
Cybersecurity in 2025
Tuesday, February 4, 2025 by Richard Harris
Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...
Cybersecurity supply chain risk management predictions for 2025
Thursday, January 16, 2025 by Austin Harris
DTS CEO and President Edward Tuorinsky shares his cybersecurity prediction for shaping the 2025 business landscape.
Cybersecurity in 2025 is like that party game where you whisper a phrase to the person next to you. One mistake is passed along to others, with funny outcomes. The stakes are higher, and the results are less amusing when data breaches or hacks travel al...
AI automation to simplify developers roles in 2025
Friday, January 3, 2025 by Richard Harris
As we look ahead to 2025, Sacha Labourey, co-founder of CloudBees, predicts that AI automation will revolutionize developer roles. Shifting from task automation to full workflow management, AI will simplify developers' workloads, streamline security and compliance tasks, and reduce inefficiencies caused by fragmented tools. Labourey emphasizes the importance of unif...
API Security Perspectives 2025 report from Kong Inc
Monday, December 30, 2024 by Richard Harris
Kong Inc. released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report which highlights today’s API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern a...
Software security in 2025 - Four encouraging trends
Thursday, December 26, 2024 by Austin Harris
The good news is that over the last few years software development organizations have embraced their role in ensuring the security of their applications in the face of ever-increasing threats to their organizations. The bad news is that they are struggling with how to protect code without overburdening developers, slowing down releases, and generally hindering innovatio...
AI fraud prevention solution launched
Tuesday, December 10, 2024 by Richard Harris
AppsFlyer announced the launch of an industry-leading AI enhancement layer on top of its Protect360 fraud prevention solution. Designed to address the growing challenges posed by increasingly sophisticated fraud tactics, the new AI layer leverages multiple machine learning models to deliver unmatched fraud detection and deterrence capabilities – offering customers...
Emerging features to consider for mobile app development
Wednesday, November 13, 2024 by Richard Harris
In an era where mobile applications are ubiquitous, with a staggering 8.93 million apps vying for attention across various app stores, distinguishing your app from the competition is paramount. While aesthetics undoubtedly play a role in user attraction, it is the functionality and features of an app that truly captivate and retain users. Whether you are embarking on yo...
Faster cyberthreat detection updates from Progress
Tuesday, October 29, 2024 by Austin Harris
Progress announced the latest release of Progress Flowmon, the network observability platform with AI-powered detection for cyberthreats, anomalies and fast access to actionable insights for greater network and application performance across hybrid cloud ecosystems. With today’s release, the Flowmon platform enhances IP search efficiency up to tenfold with in...
Developers threatened by DOJ proposals says Google
Monday, October 21, 2024 by Richard Harris
The U.S. Department of Justice (DOJ) has shared a broad outline of radical changes it may demand as part of its lawsuit regarding search distribution. This marks the beginning of a lengthy process, and Google plans to respond in detail to the DOJ's ultimate proposals as it prepares its case in court next year. However, concerns have arisen that the DOJ is signaling ...
Google AdSense updates revealed for new US state privacy laws
Friday, October 18, 2024 by Austin Harris
Google AdSense has released an important update addressing upcoming privacy laws in five US states. With new privacy regulations taking effect in Iowa, Delaware, New Jersey, Nebraska, and New Hampshire in early 2025, AdSense users and publishers will see key changes designed to ensure compliance and transparency.
Google AdSense updates announced for the new US state ...
Increasing cyber threats from artificial intelligence
Wednesday, October 9, 2024 by Austin Harris
The UK Cybersecurity M&A market has grown significantly over the past decade, with the deal volume trend line increasing, and the sector continuing to attract significant investment from Private Equity, alongside larger corporates consolidating emerging technologies to counter increasingly sophisticated threats.
The UK National Cyber Security Centre has...
Vulnerabilities in Apple products alert
Monday, September 30, 2024 by Richard Harris
CERT-In has recently issued Advisory CIAD-2024-0046, highlighting multiple high-severity vulnerabilities in Apple products. The vulnerabilities affect a wide range of Apple software, including iOS versions prior to 18, iPadOS versions prior to 18, macOS Sonoma versions prior to 14.7, macOS Ventura versions prior to 13.7, and the upcoming macOS Sequoia versions prior to ...
SaaS report from Onymos reveals what tech leaders are worried about
Monday, September 9, 2024 by Brittany Hainzinger
Onymos, developer of solutions transforming Software-as-a-Service (SaaS) for software and application development, today announced the findings of its SaaS Disruption Report: Security & Data. It reveals that over three-quarters (78%) of technology leaders are concerned about security threats in Software-as-a-Service (SaaS) for application and software development.
...
GenAI cybersecurity assistant lands from IBM
Friday, August 16, 2024 by Austin Harris
IBM recently announced the introduction of generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM's watsonx data and AI platform, the new IBM Consulting Cybersecurity Assistant is designed to accelerate and improve the identification,...
AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Austin Harris
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
DevOps threats report released from GitProtect io
Monday, August 12, 2024 by Brittany Hainzinger
Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities,
and, as a result, data loss are the reality that DevSecOps teams have to face...even every
few days.
The State of DevOps threats report - teams affected every few days
GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...