NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks
NETSCOUT has introduced Arbor Sightline Mobile and MobileStream to answer mobile network operators’ (MNO) need for scalable, real-time visibility, detection, and mitigation of threats that can impact the performance and availability of 4G/5G mobile.....»»
Lake tsunamis pose significant threat under warming climate
Cowee Creek, Brabazon Range, Upper Pederson Lagoon—they mark the sites of recent lake tsunamis, a phenomenon that is increasingly common in Alaska, British Columbia and other regions with mountain glaciers......»»
New Nevada experiments aim to improve monitoring of nuclear explosions
On an October morning in 2023, a chemical explosion detonated in a tunnel under the Nevada desert was the launch of the next set of experiments by the National Nuclear Security Administration, with the goal to improve detection of low-yield nuclear e.....»»
Lahar detection system upgraded for Mount Rainier
In the shadow of Washington State's Mount Rainier, about 90,000 people live in the path of a potential large lahar—a destructive, fluid and fast-moving debris flow associated with volcanic slopes......»»
Cyble Vision X covers the entire breach lifecycle
Cyble is launching Cyble Vision X, the successor to its Cyble Vision 2.0 threat intelligence platform, to elevate the user experience by empowering decision-makers with immediate access to critical information. The comprehensive release infuses artif.....»»
Trellix Wise automates security workflows with AI, streamlining threat detection and remediation
Trellix has unveiled Trellix Wise, a powerful suite of traditional and Generative Artificial Intelligence (GenAI) tools to drastically reduce cyber risk. Trellix Wise extends across the Trellix XDR Platform to discover and neutralize threats more eff.....»»
BlackBerry CylanceMDR improves cybersecurity defensive strategy
BlackBerry introduced the new and expanded CylanceMDR, offering comprehensive Managed Detection & Response (MDR) protection powered by the Cylance AI platform and augmented with award-winning security operations center analysts for 24×7 threat c.....»»
Most companies changed their cybersecurity strategy in the past year
Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the hear.....»»
Gurucul REVEAL empowers organizations with full control over data
Gurucul announced REVEAL, a unified security analytics platform. REVEAL delivers Threat Detection, Investigation and Response (TDIR) regardless of data type, volume and residency through a combination of its AI/ML analytics, an intelligent data engin.....»»
Maximum-severity GitLab flaw allowing account hijacking under active exploitation
The threat is potentially grave because it could be used in supply-chain attacks. Enlarge A maximum severity vulnerability that allows hackers to hijack GitLab accounts with no user interaction required is now under act.....»»
Appdome launches MobileEDR, merging MTD and EDR to protect enterprise mobile apps
Appdome has released Appdome MobileEDR, a new enterprise mobile app protection service that consolidates Mobile Threat Defense (MTD) and Endpoint Detection & Response (EDR) capabilities into a single agentless product offering. MobileEDR leverages th.....»»
HITRUST updates Cyber Threat Adaptive engine to address emerging cyber threats
HITRUST announced a comprehensive update to its Cyber Threat Adaptive engine to enable increased accuracy and timeliness of HITRUST CSF updates to address emerging cyber threats. This update introduces advanced AI capabilities through a collaboration.....»»
Climate is one culprit in growth and spread of dust in Middle East
Climate change is transforming dust storms—a natural phenomenon in the Middle East—into a more frequent and widespread threat to health and economies throughout the region, a new study shows......»»
Veracode platform enhancements help organizations reduce application risk
Veracode announced platform innovations that set a new standard for developer-powered application security. New repo risk visibility and analysis from Longbow Security, powered by Veracode, speeds up remediation of application risk from code reposito.....»»
CalypsoAI introduces customizable generative AI security scanners for enterprises
CalypsoAI introduced two AI security solutions to the CalypsoAI SaaS platform: next gen security scanners and enhanced security functionalities for chat platforms such as Slack and Microsoft Teams. These new capabilities are designed to empower enter.....»»
Nord Security unveils NordStellar, a platform for advanced cyber threat detection and response
Nord Security introduces NordStellar, a next-generation threat exposure management platform. Created by developers of VPN solution NordVPN, the enterprise cyber threat exposure management platform helps businesses detect and respond to cyber threats,.....»»
Skyhawk Security unveils cloud-native CTEM, streamlining security with AI-powered automation
Skyhawk Security has unveiled its cloud native Continuous Threat Exposure Management (CTEM) solution. The agentless approach empowers organizations to automate their CTEM program for the first time and operationalize it through Skyhawk’s existing A.....»»
Virsec releases security tools to offer ransomware protection
Virsec released TrustSight and TrustGuardian, its newest security tools in the fight against an ever-expanding threat environment – one where EDRs miss up to 30% of attacks, and ransomware detonates in milliseconds, according to various sources.....»»
Study examines US public opinion of "would-be" mass shooters
The unpredictable and widespread threat of mass shootings can affect anyone anywhere. Interrupting the process of planning and conducting a mass shooting is a matter of public safety. However, the public's willingness to both "see something" and "say.....»»
Cybersecurity jobs available right now: May 1, 2024
Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»
iOS 17.5 introduces new ‘Repair State’ that keeps Find My on when sending an iPhone to Apple
Currently, when you need to send an iPhone for repair to Apple or an authorized repair center, you first have to turn off Find My. That way, Apple knows that you own that iPhone and that it’s not a lost or stolen device. However, with iOS 17.5, use.....»»