DirectDefense partners with SCADAfence to strengthen industrial cybersecurity
DirectDefense announced its partnership with SCADAfence to enhance industrial cybersecurity and safeguard OT Networks in the era of IIoT. The SCADAfence Platform enables critical infrastructure and manufacturing organizations with complex Operational.....»»
Optoelectronic diamond device reveals an unexpected phenomenon reminiscent of lightning in slow motion
Diamond is in many ways the ultimate material. Besides its enduring aesthetic value, diamond is also a highly versatile industrial material. While its claim as the hardest substance known to science has been usurped by ultra-rare minerals and newly d.....»»
Ransomware attacks escalate as critical sectors struggle to keep up
Ransomware remains a concerning cybersecurity threat, with attacks becoming more frequent, severe, and costly. Recent reports highlight alarming trends, including increased attacks on critical sectors like healthcare, education, and manufacturing. Th.....»»
Cybersecurity jobs available right now: September 4, 2024
Cyber Systems Operations United States Air Force | USA | On-site – View job details The United States Air Force is looking for a Cyber Systems Operations Specialist to design, install, and support systems to ensure they operate proper.....»»
Protecting national interests: Balancing cybersecurity and operational realities
With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilienc.....»»
Qilin ransomware targets Google Chrome credentials
Sophos X-Ops reveals a new strategy that harvests credentials from compromised networks, raising significant cybersecurity concerns for organizations......»»
Managing low-code/no-code security risks
Continuous threat exposure management (CTEM) – a concept introduced by Gartner – monitors cybersecurity threats continuously rather than intermittently. This five-stage framework (scoping, discovery, prioritization, validation, and mobili.....»»
ACI Worldwide partners with Red Hat to simplify payment operations
ACI Worldwide announced a collaboration with Red Hat to make ACI’s cloud-native Enterprise Payments Platform available on any cloud infrastructure. With this collaboration, ACI will help customers ease their migration to the cloud to better adapt t.....»»
Cybersecurity is top of mind for consumers when shopping online, according to Experian
The credit reporting agency surveyed consumers in March and roughly 80 percent said they were somewhat or very concerned about conducting activities online......»»
Copper-based catalyst paves the way for sustainable ammonia production
Ammonia plays a critical role in food production and industrial development, with a global market size of approximately 175 million metric tons and a market value of $67 billion. Likewise, it is a high-energy-density carrier, making it a key player i.....»»
Celebrity group"s 4 dealerships sue CDK over cyberattack
Celebrity Motor Car Co.'s four dealerships have all sued CDK Global, accusing it of soliciting business by relating the risks of a dealership breach and the cybersecurity CDK could provide — only to be hacked itself and unavailable to retailers aft.....»»
Accenture expands partnership with Google Cloud to boost AI adoption and cybersecurity
Accenture and Google Cloud announced that their strategic alliance is advancing solutions for enterprise clients and seeing strong momentum across industries in two critical and related areas: GenAI and cybersecurity. As part of the announcement toda.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Cyber threats that shaped the first half of 2024
Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed 3,438.....»»
The impact of human activity on air quality: A look at aerosol pollution before and after the Industrial Revolution
A recent study led by the Institute of Atmospheric Physics at the Chinese Academy of Sciences sheds new light on how human activities have altered the composition of the atmosphere over time, particularly focusing on secondary organic aerosols (SOA)......»»
Exploring functional organic materials for the energy transition
Carbon, of all things, could help us to push forward the decarbonization of our industrial society. Functional carbon particles, known as carbon dots, can transform sunlight into energy and extract hydrogen from water. Prof. Dr. Dirk M. Guldi, a chem.....»»
CrowdStrike reveals impact of calamitous July IT outage on its business
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
RISCPoint RADAR provides real-time vulnerability detection across multiple attack surfaces
RISCPoint Advisory Group launched RADAR, an all-in-one cybersecurity platform. Combining continuous threat discovery with expert-led Penetration Testing as a Service (PTaaS), RADAR represents a significant leap forward in proactive security and risk.....»»
So, how’s CrowdStrike doing?
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
The NIS2 Directive: How far does it reach?
The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»