Checkmarx API Security identifies shadow and zombie APIs during software development
In Las Vegas, at Black Hat USA 2022, Checkmarx has released Checkmarx API Security, the “shift-left” API security solution. Building on the launch of Checkmarx Fusion, which prioritizes and correlates vulnerability data from across differ.....»»
iPhone SE Issues Continue to Pile Up
We’ve been tracking iOS and iPhone issues in the weeks since Apple last rolled out software and there are a number of problems impacting the iPhone SE, iPhone SE 2, and iPhone SE 3. In late March, Apple pushed iOS 17.4.1 to the iPhone SE 3 and.....»»
Shadow of the Erdtree: Which Edition Should You Buy?
FromSoftware’s Shadow of the Erdtree DLC Elden Ring expansion is up for pre-order. There are several versions on sale and today we want to help you pick the right one for your interest level and budget. Shadow of the Erdtree arrives on June 21s.....»»
The US Is Cracking Down on Synthetic DNA
Synthetic DNA could be used to spark a pandemic. A move by President Biden aims to create new standards for the safety and security of mail-order genetic material......»»
More details of the AI upgrades heading to iOS 18 have leaked
We've got a few more details about what's likely to be coming with Apple's software updates for 2024......»»
Researcher: Climate models can run for months on supercomputers—but my new algorithm can make them ten times faster
Climate models are some of the most complex pieces of software ever written, able to simulate a vast number of different parts of the overall system, such as the atmosphere or ocean. Many have been developed by hundreds of scientists over decades and.....»»
Blink Mini 2 vs. Wyze Cam v4: Which is the better budget security camera?
If you're in the market for a budget security camera, the Blink Mini 2 and Wyze Cam v4 are great options. But which is best for your home?.....»»
Microsoft ties executive pay to security following multiple failures and breaches
Microsoft has been criticized for "preventable" failures and poor communication. Enlarge / A PC running Windows 11. (credit: Microsoft) It's been a bad couple of years for Microsoft's security and privacy efforts. Miscon.....»»
Male or female? Scientists discover the genetic mechanism that determines sex development in butterflies
Scientists of the Biology Centre, Czech Academy of Sciences, in collaboration with University of Liverpool have found the genetic mechanism that determines whether individuals of the butterfly species Bicyclus anynana become male or female......»»
What can AI learn about the universe?
Artificial intelligence and machine learning have become ubiquitous, with applications ranging from data analysis, cybersecurity, pharmaceutical development, music composition, and artistic renderings......»»
New Nevada experiments aim to improve monitoring of nuclear explosions
On an October morning in 2023, a chemical explosion detonated in a tunnel under the Nevada desert was the launch of the next set of experiments by the National Nuclear Security Administration, with the goal to improve detection of low-yield nuclear e.....»»
Lahar detection system upgraded for Mount Rainier
In the shadow of Washington State's Mount Rainier, about 90,000 people live in the path of a potential large lahar—a destructive, fluid and fast-moving debris flow associated with volcanic slopes......»»
Trellix Wise automates security workflows with AI, streamlining threat detection and remediation
Trellix has unveiled Trellix Wise, a powerful suite of traditional and Generative Artificial Intelligence (GenAI) tools to drastically reduce cyber risk. Trellix Wise extends across the Trellix XDR Platform to discover and neutralize threats more eff.....»»
Lenovo launches AI-based Cyber Resiliency as a Service
Lenovo has launched its new AI-based Cyber Resiliency as a Service (CRaaS) leveraging Lenovo device telemetry and the Microsoft security software portfolio including Microsoft Copilot for Security and Defender for Endpoint. With AI offering protectio.....»»
Nokod Security Platform secures low-code/no-code development environments and apps
Nokod Security launched the Nokod Security Platform, enabling organizations to protect against security threats, vulnerabilities, compliance issues, and misconfigurations introduced by LCNC applications and robotic process automations (RPAs). Most or.....»»
FortiGate 200G series boosts campus connectivity for Wi-Fi 7
Fortinet announced a new next-generation firewall (NGFW) appliance with the security and networking performance needed to serve as the backbone of the modern campus. Built on the Fortinet operating system, FortiOS, and the latest, fifth-generation Fo.....»»
BlackBerry CylanceMDR improves cybersecurity defensive strategy
BlackBerry introduced the new and expanded CylanceMDR, offering comprehensive Managed Detection & Response (MDR) protection powered by the Cylance AI platform and augmented with award-winning security operations center analysts for 24×7 threat c.....»»
Researchers develop "founding document" on synthetic cell development
Cells are the fundamental units of life, forming the variety of all living things on Earth as individual cells and multicellular organisms. To better understand how cells perform the essential functions of life, scientists have begun developing synth.....»»
New infosec products of the week: May 3, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Cybersixgill, Proofpoint, Secure Code Warrior, Snyk, and Synopsys. Cybersixgill Third-Party Intelligence module identifies potential supply chain ri.....»»
97% of security leaders have increased SaaS security budgets
58% of the organizations were affected by a SaaS security incident in the last 18 months, according to Valence Security’s 2024 State of SaaS Security Report. Likely, as a result, 96% security leaders have made SaaS security a top priority and 97% h.....»»
What is cybersecurity mesh architecture (CSMA)?
Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces,.....»»