Axiomtek iNA200 protects OT assets against malware and cyber-attacks
Axiomtek has released the iNA200, a DIN-rail cybersecurity gateway for operational technology (OT) network security. The iNA200 is powered by the Intel Atom x6212RE or x6414RE processor (Elkhart Lake) and has one DDR4-3200 SO-DIMM for up to 32GB of s.....»»
The TORRAS Ostand Spin offers so much it makes your iPhone 16 live longer
The TORRAS Ostand Spin case not only protects your iPhone 16, making it live longer, but also extends its functionality through several great features......»»
The Multiple Ways Climate Change Threatens to Make Migraines Worse
Migraine sufferers are often triggered by the weather, and research suggests warming temperatures and more extreme weather events worsen attacks......»»
New infosec products of the week: September 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from anecdotes, F5 Networks, Gcore, Rapid7, Strivacity, and Veritas Technologies. Veritas unveils AI-driven features to simplify cyber recovery Veritas Technologi.....»»
Windscribe review: build your own plan with this unique VPN
I tested Windscribe, a VPN with a free service, low-cost plans, and a malware blocker. I explored its strengths, weaknesses, and overall value......»»
Hezbollah chief denounces Israeli attacks as warplane sonic booms rattle Beirut
Hezbollah chief denounces Israeli attacks as warplane sonic booms rattle Beirut.....»»
Windows users targeted with fake human verification pages delivering malware
For a while now, security researchers have been warning about fake human verification pages tricking Windows users into inadvertently installing malware. A recently exposed campaign showed how some users end up on these pages. Beware of fake human ve.....»»
Picus Security raises $45 million to help organizations reduce cyber risk
Picus Security announced it has closed a $45 million growth investment round led by Riverwood Capital with the participation of existing investor Earlybird Digital East Fund, bringing Picus’ total funds raised to $80 million. Picus has over 500 ent.....»»
Tenable Enclave Security enables discovery, assessment and analysis of IT assets
Tenable launched Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security.....»»
Data disposal and cyber hygiene: Building a culture of security within your organization
Data breach episodes have been constantly rising with the number of data breach victims crossing 1 billion in the first half of 2024. A recent Data Breach Report 2023 by Verizon confirms that 74% of data breaches are due to human errors. Although cyb.....»»
Totallee’s Clear Case protects and shows off your new iPhone 16 Pro or 16 Pro Max
If you just pre-ordered one of the new iPhone 16 phones, you may be looking for a case to protect your device without covering up its sleek design and color. Totallee just released the perfect solution for everyone looking to protect their new iPh.....»»
1.3 million Android-based TV boxes backdoored; researchers still don’t know how
Infection corrals devices running AOSP-based firmware into a botnet. Enlarge (credit: Getty Images) Researchers still don’t know the cause of a recently discovered malware infection affecting almost 1.3 million streami.....»»
Millions of Android streaming boxes hit by damaging malware
Vo1d backdoor is compromising older streaming boxes powered by Android......»»
Rain Technology protects consumers against visual hackers and snoopers at ATM terminals
Rain Technology announced ATM Switchable Privacy, designed to protect consumers against visual hackers and snoopers at ATM terminals in financial institutions, retail stores, restaurants, airports, and other public settings. ATM stats and state of th.....»»
Cyber insurance set for explosive growth
Cyber insurance is poised for exponential growth over the coming decade, but it remains a capital-intensive peril that requires structural innovation, according to CyberCube. The mid-range projection suggests that the US standalone cyber insurance ma.....»»
Security measures fail to keep up with rising email attacks
Organizations must reassess their email security posture as incidents continue to escalate, leading to financial losses. Key findings reveal a significant increase in email attacks, with many successfully bypassing standard security protocols and tar.....»»
Dru Investigate simplifies cyber investigations and helps users uncover data threats
Druva launched Dru Investigate, a gen AI-powered tool that guides data security investigations using a natural language interface. With Dru Investigate, users across IT, security, legal, and privacy teams can swiftly identify and mitigate data risks,.....»»
NETSCOUT enhances Omnis Cyber Intelligence platform with MITRE ATT&CK behavioral analytics
NETSCOUT announced updates to its advanced, scalable deep packet inspection-based Omnis Cyber Intelligence Network Detection and Response (NDR) platform. New MITRE ATT&CK behavioral analytics enable earlier detection of advanced threats like ransomwa.....»»
Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense
In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including funding,.....»»
As quantum computing threats loom, Microsoft updates its core crypto library
Two algorithms added so far, two more planned in the coming months. Enlarge (credit: Getty Images) Microsoft has updated a key cryptographic library with two new encryption algorithms designed to withstand attacks from q.....»»
Kaspersky security tools hijacked to disable online protection systems
RansomHub is using a legitimate tool to disable EDRs and deploy stage-two malware, including infostealers......»»