CrowdStrike turns to managed XDR to help orgs navigate the cyber skills gap
CrowdStrike's new managed extended detection and response tool addresses the skills gap with 24/7 support from cybersecurity specialists. CrowdStrike's new managed extended detection and response tool addresses the skills gap with 24/7 support.....»»
Destiny: Rising turns Bungie’s MMO into a free-to-play mobile game
Bungie has partnered with NetEase Games to bring Destiny to mobile. Destiny: Rising has just been revealed and will soon begin its first alpha test......»»
Protecting the Olympics from cyber-attacks is no mean feat of athleticism
Protecting the Olympics from cyber-attacks is no mean feat of athleticism.....»»
How to make biodiversity credits work: Science-based solutions for real conservation gains
Biodiversity is in crisis. Human activities are driving species extinctions at unprecedented rates, but funding for conservation remains woefully inadequate. To address this gap, the concept of a Biodiversity Credit Market (BCM) has emerged, inspired.....»»
SpaceX just caught a huge rocket booster for the first time. Now what?
SpaceX managed to catch the Super Heavy booster on the first attempt, and on only the rocket's fifth test flight. So what happens next?.....»»
CISSP and CompTIA Security+ lead as most desired security credentials
33.9% of tech professionals report a shortage of AI security skills, particularly around emerging vulnerabilities like prompt injection, according to O’Reilly. This highlights the need for specialized training as AI adoption continues to accelerate.....»»
EU adopts Cyber Resilience Act to secure connected products
The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products tha.....»»
DORA regulation’s nuts and bolts
The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial market,.....»»
Data loss incidents impact patient care
92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitiga.....»»
Using ChatGPT to make fake social media posts backfires on bad actors
OpenAI claims cyber threats are easier to detect when attackers use ChatGPT. Using ChatGPT to research cyber threats has backfired on bad actors, OpenAI revealed in a report analy.....»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»
What lies ahead for AI in cybersecurity
AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, the.....»»
New research highlights the overlooked dangers of subtle and covert abuse in intimate relationships
New research from the University of East Anglia has uncovered a significant gap in understanding of a harmful form of domestic abuse known as subtle or covert abuse......»»
Tidal Cyber empowers organizations to improve their protection efforts
Tidal Cyber announced that it now incorporates test results from Breach and Attack Simulation (BAS) tools and other sources to complement the company’s existing Threat-Informed Defense capabilities. With this new integration, Tidal Cyber Enterprise.....»»
Commvault Cloud Rewind helps businesses bounce back from cyber incidents
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon to.....»»
Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)
If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an analysis of CVE-2024-45409 and an exploit script.....»»
Two never-before-seen tools, from same group, infect air-gapped devices
It's hard enough creating one air-gap-jumping tool. GoldenJackal did it 2x in 5 years. Researchers have unearthed two sophisticated toolsets that a nation-state hacking group—po.....»»
Nvidia may give the RTX 5080 a sweet consolation prize
A new glimpse at the potential specs for the RTX 5080 tells us that it might have the RTX 5090 beat in one way, but there's still a huge gap between the two......»»
The Tech industry"s vulnerabilities exposed by CrowdStrike outage
The Tech industry"s vulnerabilities exposed by CrowdStrike outage.....»»
Experimental archaeology sheds light on skill and technique in Bronze Age spear combat
How can we tell whether and how a prehistoric weapon was used? How can we better understand the dexterity and combat skills involved in Bronze Age spear fighting?.....»»
Physics team uncovers a quantum Mpemba effect with a host of "cool" implications
Initially investigating out of pure curiosity, researchers have made a discovery that bridges the gap between Aristotle's observations two millennia ago and modern-day understanding, while opening the door to a whole host of "cool"—and "cooling"—.....»»