Click any tag below to further narrow down your results
Links
Django 6.0 has been released, introducing several key features like modular template partials, a built-in task framework for background tasks, and an updated email API. With this release, Django 5.2 has reached the end of mainstream support, so users are encouraged to upgrade to stay secure. The final security release for Django 5.1 was issued recently, marking its end of support as well.
This article reflects on Tetragon's progress in 2025, highlighting key features like persistent enforcement, attribute resolution, and userspace hooks that enhance security observability. It also showcases community engagement through talks and user stories that emphasize Tetragon's role in runtime security.
Kubernetes 1.35 introduces significant changes to its security features, including the removal of cgroup v1 support and enhanced image pull verification. Users will need to review their RBAC policies and ensure proper credentials are in place to avoid potential issues during upgrades.
The article discusses the latest security features in Google Android 16, highlighting enhancements aimed at scam protection and user safety. These updates include advanced tools to combat phishing and other cyber threats, ensuring a more secure experience for Android users.
WhatsApp has introduced advanced privacy features that allow users to control who can see their last seen status, profile photo, and about information. These updates aim to enhance user privacy and provide more options for managing visibility within the app. Additionally, WhatsApp emphasizes its commitment to user security with end-to-end encryption for messages.
Recent updates to Node.js have integrated many features that previously required third-party npm packages, enhancing security, reducing dependency bloat, and simplifying application maintenance. Notable replacements include global functions like fetch() and WebSocket, as well as built-in testing and database functionalities. This evolution encourages developers to leverage core capabilities while considering tools like N|Solid for monitoring and optimization.