Destructive firmware attacks pose a significant threat to businesses
As business workforces become increasingly distributed, IT leaders say it’s harder than ever to defend against firmware attacks, according to HP Wolf Security. The growing threat of destructive firmware attacks The shift to hybrid work models has t.....»»
Bitsight acquires Cybersixgill to help organizations manage cyber exposure
Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack surface,.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
44,000 deaths and $10 billion: Study quantifies annual cost of child marriage in Nigeria
A study authored by Xiangming Fang, a research associate professor in the Georgia State University School of Public Health, provides the first estimates of the significant economic burden that child marriage imposes on the people and economy of Niger.....»»
Android is getting call scam detection and real-time app threat alerts
Two new Android security features are now available for users in the U..S, and will soon make their way to older Android devices as well......»»
Water under Threat, Wooden Satellites and a Mud Bath for Baseballs
Droughts in 48 of 50 U.S. states, evidence of microplastics mucking up wastewater recycling and the science of a baseball mud bath in this week’s news roundup......»»
How to deactivate your X account before it starts training AI on your posts
In October, X (formerly Twitter) made significant changes to its Terms of Service that ruffled the feathers of the site’s user base. Most notably, anything … The post How to deactivate your X account before it starts training AI on your p.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
New York drought conditions fan flames, spur water saving
New York has urged its 8.5 million residents to save water as America's biggest city endures an unprecedented period without significant rainfall, creating potentially dangerous drought conditions and fanning the flames of deadly wildfires......»»
What 2025 holds for user identity protection
In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as esse.....»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
Researchers call for recognition of tire particles as a distinct environmental threat
A new study led by an international team of scientists highlights tire particles (TPs) as the leading contributor to microplastics and calls for urgent, targeted research to address their unique environmental and health risks......»»
How are nanostructures created? Imaging techniques unveil secrets of electrodeposition
Metallic nanoparticles, consisting of a few to several thousand atoms or simple molecules, are attracting significant interest. Electrodes coated with layers of nanoparticles (nanolayers) are particularly useful in areas such as energy production, se.....»»
Discord admin gets 15 years for “one of the most significant leaks” in US history
Former airman's arrest raised questions about who gets access to confidential docs. Former US Air National Guard Jack Teixeira was sentenced to 15 years in prison for leaking conf.....»»
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the gl.....»»
GoIssue phishing tool targets GitHub developer credentials
Researchers discovered GoIssue, a new phishing tool targeting GitHub users, designed to extract email addresses from public profiles and launch mass email attacks. Marketed on a cybercrime forum, GoIssue allows attackers to send bulk emails while kee.....»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
Rakuten Viber unveils new security solutions for businesses
Rakuten Viber has launched new solutions to further protect communication on the platform. Businesses can now quickly authenticate users to enhance trust and reduce fraud, making interactions more secure. Verification messages provide a secure and se.....»»
Apple just released new AirPods Pro 2 and AirPods 4 firmware for all users [U]
Apple has released new firmware for , the first update since iOS 18.1 added support for powerful new hearing health features. got an update too. Here are the details. Update 11/12: One day later, Apple has now released the same firmware builds fo.....»»
Spotify’s Car Thing, due for bricking, is getting an open source second life
It's more of a desktop thing now, but it has picked up some new features. Spotify has lost all enthusiasm for the little music devices it sold for just half a year. Firmware hacke.....»»
Researchers identify two primary tree movement patterns that help them survive high winds and prevent damage
Destructive winds during storms and cyclones often cause tree failures, especially through uprooting and stem breakage. However, how trees respond to wind under various forest configurations and weather conditions remains unclear......»»