25% of employees don’t care enough about cybersecurity to report a security incident
According to a new Tessian report, 30% employees do not think they personally play a role in maintaining their company’s cybersecurity posture. This Help Net Security video reveals why strong security culture is important in maintaining a strong se.....»»
Black Basta target orgs with new social engineering campaign
Black Basta, one of the most prolific ransomware-as-a-service operators, is trying out a combination of email DDoS and vishing to get employees to download remote access tools. Black Basta TTPs and newest initial access attempts According to a cybers.....»»
MITRE EMB3D improves security for embedded devices
MITRE released EMB3D, a cybersecurity threat model for embedded devices. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to m.....»»
Raspberry in the sky: Astronomers discover a new supernova remnant candidate
Astronomers from the Western Sydney University in Australia and elsewhere report the detection of a new supernova remnant (SNR) candidate. The newfound SNR candidate, dubbed "Raspberry" due to its morphology, was identified in the near side of the Mi.....»»
The Snapdragon 8 Gen 4 could be a gamer’s dream come true
A recent report revealed the potential upgrade in the Qualcomm Snapdragon 8 Gen 4, making it an excellent chipset for gamers. The post The Snapdragon 8 Gen 4 could be a gamer’s dream come true appeared first on Phandroid. If you’re a s.....»»
Apple Store workers in Maryland vote in favor of a strike over working conditions
Two years ago, Apple Store workers in Towson, Maryland voted in favor of unionization, making it the first Apple retail location in the United States to unionize. Now, those Apple Towson Town Center employees have authorized a strike, after “a year.....»»
Securing the future through cybersecurity education
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role STEM education can play in solving that problem. They also discuss actions nee.....»»
How AI affects vulnerability management in open-source software
In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source software. One of the core issues around open-source vulnerability patch managemen.....»»
AI’s rapid growth puts pressure on CISOs to adapt to new security risks
The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity, according to Trellix. GenAI’s impact on CISO responsibility GenAI has rolled out at an immense spe.....»»
Establishing a security baseline for open source projects
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has.....»»
Toyota dealer adds $2 million satellite for new battery plant workers
Toyota of Greensboro will open a new $2 million delivery and service center exclusively for 5,100 new employees of automaker's new N.C. battery plant......»»
Apple inching closer to ChatGPT deal with OpenAI
Talks between Apple and OpenAI have advanced so far, that a deal is reportedly close to completion that may bring ChatGPT generative AI technology to iOS 18 in some fashion.ChatGPT is in the App Store nowA report published late on Friday is light on.....»»
Bloomberg: Apple finalizing deal with OpenAI to bring ChatGPT features to iOS 18
Apple is finalizing an agreement with OpenAI to bring some of its technology to the iPhone this year, according to a new report from Bloomberg. With this deal, the report explains that Apple will be able to offer “a popular chatbot” powered by Ch.....»»
iOS 18 will bring AI-powered audio transcription and summary features, per report
Apple has dabbled in audio transcription in the past with mixed success. One shining example lately has been Apple Podcasts transcripts; more pessimistically, voicemail transcripts are still subpar. But according to a new report, the upcoming iOS 18.....»»
Apple to unveil brand new Siri at WWDC powered by generative AI
Apple is preparing to unveil a major revamp to Siri at WWDC in June, as reported by The New York Times today. The report says the new version of Siri will be powered by generative AI, allowing it to be more conversational and understand more types.....»»
Security Bite: Apple updates Platform Security guide with first-ever details on App Store security, BlastDoor, more
Apple this week updated its Platform Security guide, which contains in-depth technical information on security features implemented in its products. First released in 2015, the latest update adds six new topics, including first-ever details on BlastD.....»»
Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off!
This offer packs three cameras into one bundle. The post Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off! appeared first on Phandroid. For buyers after a reliable home surveillance and security solution, Blink’s wide.....»»
New infosec products of the week: May 10, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, AuditBoard, Cranium, Datadog, Eclypsium, ExtraHop, Forcepoint, SentinelOne, Splunk, Sumo Logic, and Trellix. AuditBoard enhances InfoSec S.....»»
GenAI enables cybersecurity leaders to hire more entry-level talent
93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically for cybersecurity operations, according to Splunk. A total of 1,650 security leaders participated in the global surv.....»»
Nmap 7.95 released: New OS and service detection signatures
Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap identifies av.....»»
How secure is the “Password Protection” on your files and drives?
People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Exc.....»»