Open-source vulnerability management architecture
How to manage vulnerabilities when developing or using open-source software.
1141 articles
How to manage vulnerabilities when developing or using open-source software.
How the AI boom and increasing reliance on open-source components are piling up corporate security debt — and what you can actually do about it.
In 2025, just as in the year prior, supply-chain attacks remained one of the most severe threats facing organizations. We’re breaking down last year’s most noteworthy incidents.
How open-source security solutions became the starting point for a massive attack on other popular applications, and what organizations that use them should do.
Cybercriminals are now deploying web applications generated by Bubble, an AI-powered app builder, to hunt for corporate credentials.
In November 2025, the npm ecosystem was hit by a flood of junk packages that were part of the IndonesianFoods malicious campaign. We’re breaking down the lessons learned from this incident.
Threat actors are promoting pages containing malicious instructions for installing AI agents intended for workflow automation.
Educational institutions are increasingly falling victim to ransomware attacks. We look at some real-world incidents, explain their causes, and discuss how to mitigate risks to academic infrastructure.
The latest update to Kaspersky Cloud Workload Security adds support for an AI assistant for image analysis.
An in-depth analysis of CVE-2026-3102, a vulnerability posing a potential threat to anyone processing images on a Mac.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
We examine how popular Canon printers could become a foothold for attackers within an organization’s network.
Malicious actors have started utilizing a new variation of the ClickFix technique — named “FileFix”. We explain how it works, and how to defend your company against it.
The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.