The ActiveState catalog grew to 40 million components in mid 2025 when it introduced coverage for Java and R in addition to ...
The open-source development ecosystem has experienced a significant rise in malicious software components, putting enterprises on high alert for software supply chain attacks. Malware is infiltrating ...
Two years ago, the joint government-private sector response to the Log4j vulnerability that spawned 800,000 attacks worldwide led to the Enduring Security Framework for federal agencies adopting open ...
Less than a year after closing its last funding round, Chainguard Inc. today disclosed that it has raised another $140 million to support its sales growth. Redpoint Ventures, Lightspeed Venture ...
The OCUDU Ecosystem Foundation combined with ongoing open networking initiatives such as LF Networking (LFN) extends the open source communities deeper into RAN intelligence, automation, and edge ...
OpenText, The Information Company, is debuting OpenText Debricked Open Source Select, a solution aimed toward helping developers select the right open source components that align with company intake ...
On the eve of the 2026 Mobile World Congress (MWC 2026), Huawei announced that it will officially launch the open source project for the A2A-T (Agent-to-Agent for Telecom) protocol supporting software ...
Grants for critical, unappreciated projects Open source projects, ever short of funding, have a potential new source of ...
In 2020, the SolarWinds incident served as a wake-up call for the tech industry, highlighting the urgent need for organizations to refine their response strategies to critical CVEs (common ...
Open-source software tools continue to increase in popularity because of the multiple advantages they provide including lower upfront software and hardware costs, lower total-cost-of-ownership, lack ...
In our wider community we are all familiar with the idea of open source software. Many of us run it as our everyday tools, a lot of us release our work under an open source licence, and we have a ...
Imagine designing a super-fun game which you can play because you possess the secret rules to it, a.k.a. the code. Now, what if you were to tell your friends these “rules,” and they could start adding ...