Cequence Security partners with Vercara to prevent sophisticated automated API attacks
Cequence Security announced a new partnership with Vercara, a provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protection.....»»
New infosec products of the week: December 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
Discovery of egg"s immune-like attack on sperm mitochondria may aid fertility
Within minutes of fertilization, the egg of a fruit fly becomes a scene from the battle of the sexes. The egg attacks and destroys the cellular "power plants" (mitochondria) from the sperm that had fertilized it, so that only its own mitochondria rem.....»»
Cellular RNA plays key role in antiviral defense, study finds
Scientists have uncovered a new role for a cell's own RNA in fending off attacks by RNA viruses. Some of the cell's RNA molecules, researchers found, help regulate antiviral signaling. These signals are part of the intricate coordination of immune re.....»»
Why don"t more women choose to propose to their male partners?
The Christmas period isn't just for presents, sparkling lights and too much festive food—it's also prime time for couples to get engaged. And for heterosexual couples, this is likely to happen in a specific way. The man will do the asking......»»
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
Tencent & ByteDance may be Apple Intelligence launch partners in China
Apple is reportedly in talks with ByteDance and Tencent to integrate their AI models with Apple Intelligence in China, so it can expand the feature set to the lucrative market.Apple Intelligence has a long way to go before launching in ChinaApple is.....»»
Top 10 plant and fungal species named new to science in 2024
Scientists from the Royal Botanic Gardens, Kew and their partners reveal their pick of the top 10 plants and fungi named new to science in 2024......»»
Ransomware in 2024: New players, bigger payouts, and smarter tactics
In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article,.....»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Are threat feeds masking your biggest security blind spot?
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»
Enpass simplifies compliance and security controls for password management
Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further enhancing.....»»
Netwrix 1Secure enhances protection against data and identity access risks
Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome the la.....»»
EU wants Apple to ensure ‘effective interoperability’ of iOS with other platforms
Apple this year was forced to drastically change how iOS works in the EU due to the Digital Markets Act (DMA) antitrust law, which establishes a series of rules to prevent big techs from engaging in anti-competitive practices. However, it seems that.....»»
Thousands of SonicWall VPN devices are facing worrying security threats
Many SonicWall VPNs are running outdated and vulnerable software versions......»»
TP-Link faces possible US ban as hijacked routers fuel Chinese attacks
Founded in China, TP-Link makes routers popular in US homes and businesses. US government authorities are reportedly investigating whether to ban TP-Link wireless routers, which h.....»»
Assault on DEI: Critics use simplistic terms to attack the programs, but they are key to uprooting workplace bias
Prominent politicians have recently increased their attacks on workplace programs that promote diversity, equity and inclusion, or DEI. They claim that initiatives that seek to be inclusive are divisive and lack merit......»»
A critical security flaw in Apache Struts is under attack, so patch now
Criminals are apparently using already available Proof-of-concept to attack Apache Struts......»»