MITRE breached by nation-state threat actor via Ivanti zero-days
MITRE has been breached by attackers via two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti’s Connect Secure VPN devices. The attackers have also managed to move laterally and compromise the company network’s VMware i.....»»
Five-day work week builds work–life balance in construction
Construction workers typically work six days a week but research tracking a five-day work week in the industry shows flexibility is key to improving worker well-being, with minimal perceived impact on productivity......»»
Cold sintering may rescue plastic, ceramics, battery components from landfills
Recycling does not necessarily prevent an item from eventually ending up in a landfill, according to Enrique Gomez, interim associate dean for equity and inclusion and professor of chemical engineering in the Penn State College of Engineering. Instea.....»»
Lake tsunamis pose significant threat under warming climate
Cowee Creek, Brabazon Range, Upper Pederson Lagoon—they mark the sites of recent lake tsunamis, a phenomenon that is increasingly common in Alaska, British Columbia and other regions with mountain glaciers......»»
Kenya on alert as it braces for first-ever cyclone
Kenyan President William Ruto put the flood-ravaged country on high alert on Friday and postponed the reopening of schools indefinitely as the nation braced for its first-ever cyclone......»»
Lahar detection system upgraded for Mount Rainier
In the shadow of Washington State's Mount Rainier, about 90,000 people live in the path of a potential large lahar—a destructive, fluid and fast-moving debris flow associated with volcanic slopes......»»
Cyble Vision X covers the entire breach lifecycle
Cyble is launching Cyble Vision X, the successor to its Cyble Vision 2.0 threat intelligence platform, to elevate the user experience by empowering decision-makers with immediate access to critical information. The comprehensive release infuses artif.....»»
Trellix Wise automates security workflows with AI, streamlining threat detection and remediation
Trellix has unveiled Trellix Wise, a powerful suite of traditional and Generative Artificial Intelligence (GenAI) tools to drastically reduce cyber risk. Trellix Wise extends across the Trellix XDR Platform to discover and neutralize threats more eff.....»»
BlackBerry CylanceMDR improves cybersecurity defensive strategy
BlackBerry introduced the new and expanded CylanceMDR, offering comprehensive Managed Detection & Response (MDR) protection powered by the Cylance AI platform and augmented with award-winning security operations center analysts for 24×7 threat c.....»»
97% of security leaders have increased SaaS security budgets
58% of the organizations were affected by a SaaS security incident in the last 18 months, according to Valence Security’s 2024 State of SaaS Security Report. Likely, as a result, 96% security leaders have made SaaS security a top priority and 97% h.....»»
Most companies changed their cybersecurity strategy in the past year
Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the hear.....»»
Gurucul REVEAL empowers organizations with full control over data
Gurucul announced REVEAL, a unified security analytics platform. REVEAL delivers Threat Detection, Investigation and Response (TDIR) regardless of data type, volume and residency through a combination of its AI/ML analytics, an intelligent data engin.....»»
Maximum-severity GitLab flaw allowing account hijacking under active exploitation
The threat is potentially grave because it could be used in supply-chain attacks. Enlarge A maximum severity vulnerability that allows hackers to hijack GitLab accounts with no user interaction required is now under act.....»»
Artificial intelligence enhances monitoring of threatened marbled murrelet
Artificial intelligence analysis of data gathered by acoustic recording devices is a promising new tool for monitoring the marbled murrelet and other secretive, hard-to-study species, research by Oregon State University and the U.S. Forest Service ha.....»»
Significant new discovery in teleportation research: Noise can improve the quality of quantum teleportation
Researchers have succeeded in conducting an almost perfect quantum teleportation despite the presence of noise that usually disrupts the transfer of quantum state. The results have been published in the journal Science Advances......»»
Appdome launches MobileEDR, merging MTD and EDR to protect enterprise mobile apps
Appdome has released Appdome MobileEDR, a new enterprise mobile app protection service that consolidates Mobile Threat Defense (MTD) and Endpoint Detection & Response (EDR) capabilities into a single agentless product offering. MobileEDR leverages th.....»»
HITRUST updates Cyber Threat Adaptive engine to address emerging cyber threats
HITRUST announced a comprehensive update to its Cyber Threat Adaptive engine to enable increased accuracy and timeliness of HITRUST CSF updates to address emerging cyber threats. This update introduces advanced AI capabilities through a collaboration.....»»
Research demonstrates high qubit control fidelity and uniformity in single-electron control
The journal Nature has published a research paper, "Probing single electrons across 300-mm spin qubit wafers," demonstrating state-of-the-art uniformity, fidelity and measurement statistics of spin qubits. The industry-leading research opens the door.....»»
Climate is one culprit in growth and spread of dust in Middle East
Climate change is transforming dust storms—a natural phenomenon in the Middle East—into a more frequent and widespread threat to health and economies throughout the region, a new study shows......»»
Nord Security unveils NordStellar, a platform for advanced cyber threat detection and response
Nord Security introduces NordStellar, a next-generation threat exposure management platform. Created by developers of VPN solution NordVPN, the enterprise cyber threat exposure management platform helps businesses detect and respond to cyber threats,.....»»
Skyhawk Security unveils cloud-native CTEM, streamlining security with AI-powered automation
Skyhawk Security has unveiled its cloud native Continuous Threat Exposure Management (CTEM) solution. The agentless approach empowers organizations to automate their CTEM program for the first time and operationalize it through Skyhawk’s existing A.....»»