Attack automation becomes a prevalent threat against APIs
The second half of 2022 marked a significant turning point in the security landscape. In several high-profile incidents, application programming interfaces (APIs) emerged as a primary attack vector, posing a new and significant threat to organization.....»»
AppOmni unveils SaaS-aware ITDR capabilities
AppOmni announced a series of technology advances to deliver identity and threat detection (ITDR) capabilities to protect SaaS environments. The newest capabilities complement traditional ITDR and identity and access management (IAM) solutions from I.....»»
IBM Consulting Cybersecurity Assistant helps clients accelerate alert investigation
IBM generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM’s watsonx data and AI platform, the new IBM Consult.....»»
Rapid7 releases Command Platform, unified attack defense and response
Rapid7 launched its Command Platform, a unified threat exposure, detection, and response platform. It allows customers to integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to clo.....»»
Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) released
A partnership of 28 industry leaders serving public and private organizations across the vendor and consumer community volunteered their time, effort, and experience to launch the first version of the Cyber Threat Intelligence Capability Maturity Mod.....»»
U.S. expected to propose barring Chinese software in autonomous vehicles
The Biden administration plans to issue a proposed rule that would bar Chinese software in vehicles in the United States with Level 3 automation and above......»»
Chinese hackers hijacked an ISP software update to spread malware
StormBamboo used DNS poisoning to successfully attack organizations using insecure updates......»»
MISP: Open-source threat intelligence and sharing platform
MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professio.....»»
How to Stop Wildfire Smoke Damaging Your Health
Smoke from fires is linked to thousands of premature deaths every year, and is a growing health threat as widespread blazes becomes more common......»»
Mac malware posing as apps like Loom, LedgerLive, and Black Desert Online
A “sophisticated and alarming” Mac malware attack is being carried out in the guise of free versions of popular apps like the screen recording utility Loom, cryptocurrency manager LedgerLive, and MMO game Black Desert Online. It appears to be.....»»
Apple trying to pressure WeChat into blocking a payment loophole; developer refusing
Apple is trying to pressure WeChat – the world’s most popular app – into blocking a payment loophole for in-app purchases. If app owner Tencent fails to comply, Apple says it would block essential updates. The report says the same threat was.....»»
Organizations fail to log 44% of cyber attacks, major exposure gaps remain
40% of tested environments allowed attack paths that lead to domain admin access, according to Picus Security. Achieving domain admin access is particularly concerning because it is the highest level of access within an organization’s IT infrastruc.....»»
Health-threat "forever chemicals" removed from water with 3D-printed ceramic ink
Engineers have invented a new way to remove health-harming 'forever chemicals' from water—using 3D printing......»»
Nucleus Vulnerability Intelligence Platform enhances threat assessment and remediation speed
Nucleus Security has launched its Nucleus Vulnerability Intelligence Platform. Platform enables enterprises to aggregate, analyze, and act on insights from government, open-source, and premium threat intelligence feeds while reducing manual effort, a.....»»
Wing Security unveils custom SaaS Threat Intelligence for direct dashboard integration
Wing Security launched its new tailored SaaS Threat Intelligence, providing organizations with personalized detection and response capabilities directly integrated into their SaaS security dashboard. The threat intelligence feature delivers timely, p.....»»
Synack PTaaS platform offers complete security testing suite
Synack has unveiled additional capabilities of its Penetration Testing as a Service (PTaaS) platform that deliver a comprehensive security testing experience. The Synack platform now covers all customers’ security testing needs, from attack sur.....»»
Cado platform enhances SOC efficiency with AI-driven workflow automation
Cado Security has unveiled that the Cado platform now enables customers to dramatically streamline the effectiveness of their SOC using end-to-end workflow investigation automation capabilities. Through the infusion of AI-guided investigations and da.....»»
Threat intelligence: A blessing and a curse?
Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data and intelligence feeds to choose from. However, selecting the right.....»»
SMS Stealer malware targeting Android users: Over 105,000 samples identified
Zimperium’s zLabs team has uncovered a new and widespread threat dubbed SMS Stealer. Detected during routine malware analysis, this malicious software has been found in over 105,000 samples, affecting more than 600 global brands. SMS Stealer.....»»
Microsoft: DDoS defense error amplified attack on Azure, leading to outage
A DDoS attack that started on Tuesday has made a number of Microsoft Azure and Microsoft 365 services temporarily inaccessible, the company has confirmed. Microsoft’s mitigation statement on the Azure status history page Microsoft Azure, 365 ou.....»»
Proficio launches ProBAS service to help organizations better prepare and respond to cyber attacks
Proficio has announced the roll out of its ProBAS Breach and Attack Simulation service. By rigorously testing an organization’s security defenses, ProBAS ensures they can prevent compromise events and detect attacks throughout the entire threat det.....»»