Coalition ESS helps enterprises mitigate their most critical risks
Coalition announced the Coalition Exploit Scoring System (Coalition ESS), a vulnerability scoring system that helps risk managers mitigate potential cyber threats. Developed by Coalition Security Labs, the company’s research and innovation center,.....»»
The "publish or perish" mentality is fueling research paper retractions—and undermining science
When scientists make important discoveries, both big and small, they typically publish their findings in scientific journals for others to read. This sharing of knowledge helps to advance science: it can, in turn, lead to more important discoveries......»»
NICE Actimize Fraud Investigation combats fraud and financial crime
NICE Actimize launched AI-powered Fraud Investigations solution that facilitates end-to-end fraud management capabilities from detection to investigations. Explicitly designed to enable fraud investigations post detection, the new solution helps fina.....»»
Cloudflare helps secure popular messaging applications
Cloudflare announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a public-private key exchange encrypts messages to prot.....»»
KELA Identity Guard detects and intercepts compromised assets
KELA launched Identity Guard, the first line of defense to help combat the #1 cause of data breaches – compromised corporate assets and identities. Identity Guard is a critical module of KELA’s threat intelligence platform, already in use.....»»
ArmorCode unveils two modules to help reduce software-based risks
ArmorCode announced the expansion of its platform with the launch of two new modules for Penetration Testing Management and Exceptions Management. Alongside AI-powered Correlation and Remediation, these modules further advance ArmorCode’s leading p.....»»
Evaluating embedded vulnerabilities and cybersecurity risks in procurement
Evaluating embedded vulnerabilities and cybersecurity risks in procurement.....»»
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats,.....»»
MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud. Session hijacking surges as ma.....»»
American Honda aims to increase CPO leasing mix
The automaker will continue to enhance its leasing programs for used vehicles, a "critical gateway" for young and first-time buyers......»»
Cloudflare AI Audit helps websites control how their content is used by AI models
Cloudflare announced AI Audit, a set of tools to help websites of any size analyze and control how their content is used by AI models. For the first time, website and content creators will be able to quickly and easily understand how AI model provide.....»»
US to ban Chinese connected car software and hardware, citing security risks
The ban would start in model-year 2027 for software and MY2030 for hardware. Enlarge (credit: Getty Images) The US government is readying its latest measure to defend local automotive manufacturing. In May, US President.....»»
U.S. proposes ban on Chinese vehicle software
Pending restrictions stem from an investigation of cybersecurity risks from Chinese vehicle software that President Joe Biden launched in March......»»
Paid open-source maintainers spend more time on security
Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in industry standards like the OpenSSF Scorecard.....»»
U.S. readies ban on Chinese vehicle software
Pending restrictions stem from an investigation of cybersecurity risks from Chinese vehicle software that President Joe Biden launched in March......»»
Week in review: Critical VMware vCenter Server bugs fixed, Apple releases iOS 18
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Critical VMware vCenter Server bugs fixed (CVE-2024-38812) Broadcom has released fixes for two vulnerabilities affecting VMware vCenter Server that.....»»
Algorithm used on Mars rover helps scientists on Earth see data in a new way
A new algorithm tested on NASA's Perseverance Rover on Mars may lead to better forecasting of hurricanes, wildfires, and other extreme weather events that impact millions globally......»»
Team develops gene editing strategy for macroalgae Neopyropia
Neopyropia is an important economic macroalga and is one of the main macroalgae cultivation species in China, Japan, South Korea and other countries. As a critical juncture in the evolution of photosynthetic organisms, red algae to which Neopyropia b.....»»
Mysterious Pacific Ocean sounds identified as a type of whale—a new AI app helps track them
A team of oceanographers and marine biologists from the NOAA Pacific Islands Fisheries Science Center and Oregon State University has identified a mysterious noise heard in the Pacific Ocean for two decades as the sounds of Bryde's whales......»»
VinFast Q2 loss widens on impairment charge, higher overseas outlays
Revenue jumped 33 percent quarter-on-quarter to $357 million but the deeper loss underscores the risks of VinFast's aggressive expansion strategy ......»»
Taliban using Iranian jammers to stop people watching critical news channels, says TV boss
Taliban using Iranian jammers to stop people watching critical news channels, says TV boss.....»»