Why we're rethinking cache for the AI era
The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at ...
20 articles
The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at ...
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just...
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source...
Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables ...
Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant...
E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks
Variance has raised a total of $26 million in funding and the latest investment will fuel platform growth. The post Variance Raises $21.
The OWASP Zed Attack Proxy (ZAP) just received a massive upgrade for testing modern web applications. The release of the ZAP PTK Add-on 0.
The European Commission has confirmed a cyberattack affecting its Europa.eu web platform, with initial reports indicating that the attackers accessed the dat...
The integration of artificial intelligence into core business systems, better known as enterprise AI, is moving fast, along with the threats around it. Secur...
In this Help Net Security interview, John O’Rourke, CISO at PPG, talks about what it means for security to drive business value. He explains how mature secur...
Drone detection in cities is expensive. Dedicated radar installations are cost-prohibitive at scale, cameras have limited range and stop working well at nigh...
Organizations that rely on Exchange Online for internal communications have long needed a way to send large volumes of automated messages, such as payroll no...
The company will accelerate product development, scale go-to-market efforts, and expand its global footprint. The post Linx Security Raises $50 Million for I...
In this Help Net Security video, Lenny Gusel, Head of Fraud Solutions in North America at Feedzai, explains how customer identity and access management has c...
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.
Scaling SOC efficiency through multi-signal correlation and higher-order detection patterns.
This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025.