Bugcrowd launches new products for speeding up vulnerability remediation

Bugcrowd has announced two new products for helping IT and security teams remediate vulnerabilities more quickly. The first, AI Connect, is like a read-only “front door” for vulnerability data, Bugcrowd said. It allows customers to integrate Bugcrowd vulnerability data into their preferred internal AI stacks. Under the hood, it is built upon MCP to enable … continue reading

AI updates in ITOps platforms announced in July

Cloudflare now blocks AI crawlers by default, introduces pay per crawl model Last year, Cloudflare introduced a setting that allowed website owners to block AI crawlers. Now, the company is announcing that this setting will now be the default rather than a user needing to switch it on. The company explained that by switching to a … continue reading

Report: Barriers to operational resiliency

A new report from SolarWinds shows that while 9 out of 10 respondents are confident in their resiliency, there are still some challenges holding them back. Some of the most common ones are managing cyberthreats (52% of respondents), remote and distributed workforces (45%), AI (38%), managing increasing user expectations (36%), and bring-your-own-device policies (26%).  Additionally, … continue reading

Latest BloodHound release enables ingestion of data from third-party system for more comprehensive attack path mapping

The security company SpecterOps has announced the release of the latest version of its open source Attack Path Management tool BloodHound.  BloodHound allows companies to uncover hidden or unintended relationships in Active Directory, Entra, and Azure so that they can map potential attack paths.  The latest release, version 8.0, introduces BloodHound OpenGraph, which will allow … continue reading

Critical vulnerabilities in on-premises Microsoft SharePoint servers exploited in the wild

Critical vulnerabilities were exploited in some on-premises Microsoft SharePoint installations over the weekend.  Ronen Ahdut, head of CyOps MDR at Cynet Security, explained that there were two vulnerabilities involved: CVE-2025-53770 and CVE-2025-53771.  CVE-2025-53770 relates to deserialization of untrusted data, and can be remotely exploited without authentication. CVE-2025-53771 relates to improper input validation, and enables a … continue reading

Aqua Security forms advisory program to collaborate on secure AI best practices

Aqua Security is bringing together several leaders in enterprise security to develop strategies for securing AI in production. According to Aqua Security, companies that have already adopted AI have focused on security at different layers of the technology stack. For example, some utilize AI firewalls to monitor how users are interacting with public models, while … continue reading

Catchpoint launches new solutions for monitoring AI workloads

Catchpoint is launching new monitoring capabilities to provide new ways for IT teams to detect and prevent AI performance issues.  The new AI Assistant Reliability Monitoring solution detects issues that affect AI APIs, LLMs, and chatbots.  It tests AI endpoints across over 100 countries to detect DNS, routing, or regional outages. It also includes the … continue reading

Broadcom begins shipping Tomahawk Ultra Ethernet switches

Broadcom is starting to ship out its latest Ethernet switch, the Tomahawk Ultra, designed for high-performance computing (HPC) and AI workloads.  According to Broadcom, the “Tomahawk Ultra redefines what an Ethernet switch can deliver.” It offers ultra-low latency, and the company claims it can achieve 250ns latency at 51.2 Tbps throughput.  It also offers line-rate … continue reading

SUSE Virtualization 1.5 Prime offers improved release cadence, support for Arm

SUSE has announced the release of Virtualization 1.5 Prime, featuring new capabilities that will enable organizations to optimize virtualization strategies for cloud native.  “With an improved release lifecycle, more flexible patching and upgrades, and an ecosystem that supports production-grade storage integration, SUSE Virtualization 1.5 Prime is designed to be the foundation of the modern enterprise … continue reading

Report: Majority of employees are engaging in shadow AI

As AI adoption continues to rise, so does the prevalence of shadow AI, or unapproved usage of AI.  In a new survey from ManageEngine, 60% of the 700 survey respondents admitted to using unapproved AI tools and 93% admitted to adding information to AI tools without approval. 32% of employees entered confidential client data into … continue reading

IBM announces Power11 servers

IBM has announced the latest generation of its Power servers, featuring innovations that make them more resilient, efficient, and AI-ready.  The Power11 family will include high-end, mid-range, and entry servers, and will also include a virtualized option in IBM Power Virtual Server in IBM Cloud. Both the physical and virtual servers will be available on … continue reading

KnowBe4 shares five key strategies to follow to avoid phishing scams in the enterprise

KnowBe4, a security training platform, is sharing five strategies organizations should take to avoid phishing scams.  According to recent research from the company, between November 2024 and February 2025 there was a 57.7% increase in successful phishing attacks. Since phishing attacks target humans, it’s important to properly train employees to avoid them. Here are five … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!