Attack automation becomes a prevalent threat against APIs
The second half of 2022 marked a significant turning point in the security landscape. In several high-profile incidents, application programming interfaces (APIs) emerged as a primary attack vector, posing a new and significant threat to organization.....»»
How human-led threat hunting complements automation in detecting cyber threats
In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and explains how human-led approaches complement each other to form a ro.....»»
Open-source software helps streamline 2D materials research with scanning tunneling microscope automation
A new open-source software package developed by Monash University researcher Julian Ceddia aims to significantly streamline the study of materials using scanning tunneling microscopes (STMs)......»»
Resecurity gains recognition in Frost & Sullivan’s 2024 Cyber Threat Intelligence report
Resecurity announced its recognition in the prestigious Frost & Sullivan’s Global Cyber Threat Intelligence 2024 report. This annual report is an essential indicator of market trends and highlights the most influential vendors and tools shaping.....»»
Cequence Security partners with Netskope to provide protection for business-critical APIs
Cequence Security announced a new partnership with Netskope. Through the partnership, Netskope customers can now leverage unique API threat intelligence from the Cequence Unified API Protection (UAP) platform to unlock insights into real-world threat.....»»
83% of organizations experienced at least one ransomware attack in the last year
Ransomware is an all-too-common occurrence: 83% of organizations have experienced at least one ransomware attack in the last year, 46% of respondents experienced four or more and 14% indicated they experienced 10 or more. Of those respondents who exp.....»»
Phage editing technology could lead to alternative treatments for antibiotic-resistant bacteria
As antibiotic resistance becomes an increasingly serious threat to our health, the scientific and medical communities are searching for new medicines to fight infections. Researchers at Gladstone Institutes have just moved closer to that goal with a.....»»
Georgia school shooter suspect interviewed by police a year before attack
Georgia school shooter suspect interviewed by police a year before attack.....»»
New filter removes chemical contaminants from water even at very low concentrations
Pharmaceuticals and personal care products pose a major environmental threat. These chemicals, found in everyday items like medicines and cosmetics, can pollute waterways, harming the plants and animals living in the waterways and the humans who use.....»»
Soil pollution surpasses climate change as top threat to underground biodiversity, study finds
Earthworms, insects and mites are all at risk from soil pollution, and scientists are worried that we know very little about the damage it's causing......»»
Viewpoint: In the face of DEI backlash, belonging plays a key role to future success
Diversity, equity and inclusion efforts have become increasingly visible in U.S. workplaces, especially over the past five years. However, DEI has recently come under attack, with companies scaling back their DEI plans......»»
Why Lear is going all in on automation
The long-term need for factory jobs is increasing, but there are fewer people to fill them. For Lear, automation is the answer......»»
Is Ark cross-platform?
Dinosaurs are just one threat in the world of Ark, so having some friends to watch your back is essential. The question becomes if this game is cross-platform......»»
Business routers vulnerable to OS command injection attack
Zyxel fixes a 9.8-severity vulnerability in multiple endpoints......»»
Ransomware attacks escalate as critical sectors struggle to keep up
Ransomware remains a concerning cybersecurity threat, with attacks becoming more frequent, severe, and costly. Recent reports highlight alarming trends, including increased attacks on critical sectors like healthcare, education, and manufacturing. Th.....»»
OpenBAS: Open-source breach and attack simulation platform
OpenBAS is an open-source platform that enables organizations to plan, schedule, and execute crisis exercises, adversary simulations, and breach simulations. Compliant with ISO 22398 standards, OpenBAS is built as a modern web application featuring a.....»»
Man indicted on first-degree murder charge in death of Fla. dealership co-worker
Steve Tilbury is accused of fatally striking his co-worker with a metal baseball bat in a premeditated attack......»»
The attack with many names: SMS Toll Fraud
Bad actors leverage premium-rate phone numbers and bots to steal billions of dollars from businesses. In this Help Net Security video, Frank Teruel, CFO at Arkose Labs, discusses how to spot and stop them. The post The attack with many names: SMS Tol.....»»
How ransomware tactics are shifting, and what it means for your business
In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these cybercriminal operations are adapting to increased competition, shifting str.....»»
Managing low-code/no-code security risks
Continuous threat exposure management (CTEM) – a concept introduced by Gartner – monitors cybersecurity threats continuously rather than intermittently. This five-stage framework (scoping, discovery, prioritization, validation, and mobili.....»»
Apple"s embrace of Matter and new automation accessories on HomeKit Insider
On this episode of the HomeKit Insider Podcast, we cover several new products that have launched, go hands on with a new charger, and talk about Apple's perhaps self-destructive embrace of Matter.HomeKit Insider PodcastThis week IFA kicks off in Berl.....»»