От Kubernetes до AI Engineering: 5 главных трендов Технологического радара DevOpsConf 2026
Представьте типичный разговор на ретроспективе: команда обсуждает, стоит ли переходить с Ansible на Terraform, нужен ли Backstage или хватит самописно…
Latest Open Source news from Tech News
Представьте типичный разговор на ретроспективе: команда обсуждает, стоит ли переходить с Ansible на Terraform, нужен ли Backstage или хватит самописно…
Despite promising to help determine what happened with the hacks targeting journalists and activists in Italy, Israeli American spyware maker Paragon …
The U.S. top court is expected to rule on whether to allow police to identify criminal suspects by dragnet searching the databases of tech giants.
How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push p…
If you're one of millions using element-data, it's time to check for compromise.
Xu Zewei is accused of participating in a Chinese government hacking group that broke into thousands of U.S. organizations and stole COVID-19-related …
For software companies, security is inseparable from software quality. That makes security excellence a real competitive advantage. But closing the Th…
Plus: Spy firms tap into a global telecom weakness to track targets, 500,000 UK health records go up for sale on Alibaba, Apple patches a revealing no…
Researchers have found a new case where government authorities used a fake Android app to plant spyware on a target’s phone. The company that allegedl…
Cursor and Chainguard are setting their sights on securing the open source dependency chain in AI-generated code — a problem The post Cursor and…
Researchers have finally cracked Fast16, mysterious code capable of silently tampering with calculation and simulation software. It was created in 200…
Anthropic's tightly controlled rollout of Claude Mythos has taken an awkward turn. After spending weeks insisting the AI model is so capable at cybers…
The Citizen Lab found two separate surveillance vendors abusing the backbone of cellular networks to spy on several victims across the world.
Ship attacked by Iran after possibly falling for safe passage crypto scam.
When authentication fails, things can go very, very wrong.
Several US federal agencies are taking up Anthropic's new cybersecurity model to find vulnerabilities, but one is reportedly not getting in on the act…
Anthropic's Mythos AI model, a powerful cybersecurity tool that the company said could be dangerous in the wrong hands, has been accessed by a "small …
CTO says new AI model is "every bit as capable" as world's best security researchers.
The Firefox team doesn’t think emerging AI capabilities will upend cybersecurity long term, but they warn that software developers are likely in for a…
Some lawmakers are calling for widespread reforms following years of surveillance scandals and abuses across successive U.S. administrations. But even…
Palantir's ideological bent has come under more scrutiny as it's worked with ICE and positioned itself as a defender of "the West."
A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit them. Now, hackers are tak…
Some lawmakers are calling for widespread reforms following years of surveillance scandals and abuses across successive U.S. administrations. But even…
Cal.com, an open-source startup that builds scheduling infrastructure for developers and enterprises, announced on Tuesday that it’s m…
AI agents are reshaping software development. They can autonomously read codebases, write and edit files, run tests, and fix bugs, The post Agents are…
The UK-based AI Security Institute (ASI) this week released the results of its evaluation of Anthropic’s new Claude Mythos Preview, The post Cla…
Learn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 de…
The new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your…
It's not clear how many people were compromised by this hacking campaign, but a security researcher said the hackers were targeting victims since at l…
Viktor Peterson, part of the CISA task force working on SBOM blueprints and co-founder of sbomify, explores the shifting landscape of software supply …