Dangerous misconceptions about emerging cyber threats
Organizations are leaving common attack paths exposed in their quest to combat emergent threats, according to Cymulate. The most concerning cyber threats The report delves into the efficacy of different security controls, the most concerning threats.....»»
SSHamble: Open-source security testing of SSH services
runZero published new research on Secure Shell (SSH) exposures and unveiled a corresponding open-source tool, SSHamble. This tool helps security teams validate SSH implementations by testing for uncommon but dangerous misconfigurations and software b.....»»
AI security 2024: Key insights for staying ahead of threats
In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the industry. Oshiba highlights vulnerabilities in technology systems and the p.....»»
Download: CIS Critical Security Controls v8.1
Version 8.1 of the CIS Critical Security Controls (CIS Controls) is an iterative update to version 8.0. It offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a clear path to improve your organization’s cyber.....»»
Science is Solving Iceland"s Dangerous Volcanic Mystery
We take you down below Iceland's erupting surface with the researchers who are trying to understand what's going to happen next......»»
American Science is in Dangerous Decline while Chinese Research Surges, Experts Warn
The U.S. sorely needs a coordinated national research strategy, says Marcia McNutt, president of the U.S. National Academy of Sciences.....»»
What Happened in Crypto Today: Bullish Signals Are Finally Emerging!
What Happened in Crypto Today: Bullish Signals Are Finally Emerging!.....»»
31% of Republicans say vaccines are more dangerous than diseases they prevent
The partisan divide on vaccine falsehoods threatens the health of children nationwide. Enlarge / Polio victim Larry Montoya is at the airport for the arrival of cases of vaccine, which were distributed as part of the KO Polio cam.....»»
Researchers create new device for on-the-spot water testing
Researchers at University of Galway have developed a new, portable technology for on-the-spot testing of water quality to detect one of the most dangerous types of bacteria......»»
Disaster plant pathology: Solutions to combat agricultural threats from disasters
An often-overlooked component of natural and human-driven disasters is their potential to affect plant health and thus food security at domestic and international scales. Most disasters have indirect effects on plant health through factors such as di.....»»
Most existing heat wave indices fail to capture heat wave severity, experts report
Even though climate change is bringing more frequent and severe heat waves, there is no standard, global way to measure heat-wave severity, and existing indices have different thresholds for defining dangerous heat-stress conditions......»»
Cymulate AI Copilot validates security against real-time threats
Cymulate AI Copilot is a generative AI solution designed to deploy, test and tune security controls to evaluate their effectiveness against real-time threats. The solution offers a dynamic attack planner, among other AI-powered features, for greater.....»»
Contrast Security ADR enables teams to identify vulnerabilities, detect threats, and stop attacks
Contrast Security introduced Application Detection and Response (ADR), which empowers security teams to identify vulnerabilities, detect threats, and stop attacks that target custom applications and APIs. Today’s layered “detection and respon.....»»
Stellar Cyber launches Multi-Layer AI platform to enhance threat detection
Stellar Cyber is introducing Multi-Layer AI, incorporating four distinct technologies — machine learning (ML), graph ML, generative AI, and hyper automation — into a single unified platform that reduces threat detection and response time. This ne.....»»
AWS unveils a monster security system to keep it safe from threats
Huge new AWS security system is able to detect and predict cybercriminal behavior before threats arise......»»
The Higgs particle could have ended the universe by now—here"s why we"re still here
Although our universe may seem stable, having existed for a whopping 13.7 billion years, several experiments suggest that it is at risk—walking on the edge of a very dangerous cliff. And it's all down to the instability of a single fundamental part.....»»
Researchers identify global hotspots for flows of "dirty money", with Dubai and Hong Kong emerging as focal points
New research from the University of Sussex, published August 5 has identified a large-scale shift from the UK to what researchers are terming the "Dubai-Kong axis" as a new hotspot for illicit financial flows (IFFs)—money tied to corruption, organi.....»»
Rapid7 releases Command Platform, unified attack defense and response
Rapid7 launched its Command Platform, a unified threat exposure, detection, and response platform. It allows customers to integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to clo.....»»
Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) released
A partnership of 28 industry leaders serving public and private organizations across the vendor and consumer community volunteered their time, effort, and experience to launch the first version of the Cyber Threat Intelligence Capability Maturity Mod.....»»
The role of AI in cybersecurity operations
Security operation centers (SOCs) need to be better equipped to manage the sheer scale of data to monitor and the increasing sophistication of threats. SOC analysts face a daunting task: sifting through thousands of alerts every day – most of w.....»»
MISP: Open-source threat intelligence and sharing platform
MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professio.....»»