DNS abuse: Advice for incident responders
What DNS abuse techniques are employed by cyber adversaries and which organizations can help incident responders and security teams detect, mitigate and prevent them? The DNS Abuse Techniques Matrix published by FIRST provides answers. The Domain Nam.....»»
Civilian 911 responders can enhance public safety, study finds
Deploying paramedics, social workers, and others to non-criminal emergency calls could significantly boost a police department's ability to respond to criminal emergencies while reducing negative interactions with the community, according to new Univ.....»»
Cloudflare announces Firewall for AI to help security teams secure their LLM applications
Cloudflare announced the development of Firewall for AI, a new layer of protection that will identify abuse and attacks before they reach and tamper with Large Language Models (LLMs), a type of AI application that interprets human language and other.....»»
Economic abuse affects 1 in 7 Kiwi women, research finds
Economic abuse is common, affecting about 15% or 1 in 7 women who have been in a relationship, new University of Auckland research finds. The study is published in the Journal of Interpersonal Violence......»»
Viewing of child sexual abuse material is often preceded by habitual consumption of adult pornography: Report
Viewing of child sexual abuse material, CSAM, is often preceded by habitual consumption of adult pornography, according to findings from a project conducted in collaboration between the University of Eastern Finland, Protect Children, and the Counci.....»»
X deadnaming and misgendering policy reinstated; not doing well in hate speech lawsuit
In an update to its abuse and harassment page, the X deadnaming and misgendering policy which was quietly removed last year has been equally quietly reinstated … more….....»»
98% of businesses linked to breached third parties
According to the updated SEC regulations on cybersecurity incident disclosure, findings by SecurityScorecard reveal that 98% of companies are associated with a third party that has experienced a breach. It often takes months or longer for breaches to.....»»
Research reveals majority of women experience abuse while running
A project to learn about women's experiences of abuse while out running has found that more than two-thirds of them have been abused in some way......»»
X quietly revived anti-misgendering policy that Musk dropped last year
GLAAD pushes to close loopholes allowing targeted misgendering of celebrities. Enlarge (credit: paul mansfield photography | Moment) Last April, Twitter quietly edited its abuse and harassment policy to no longer explici.....»»
House lawmakers say more research needed to understand EV battery fire risks
A House subcommittee says first responders are not prepared to handle the novel difficulties and dangers of EV fires......»»
From edge of extinction to Australia"s croc "paradise"
If you want a snappy death, one expert's advice is to leap into a river near the Australian city of Darwin—within minutes, you'll be in the jaws of one of the hundreds of crocodiles that stalk its murky waters......»»
Domestic abuse law should cover carmakers, FCC chair says
Cases of technology-enabled stalking involving cars are emerging as automakers add ever more sophisticated features, such as location tracking and remote control of functions......»»
State-sponsored hackers know enterprise VPN appliances inside out
Suspected Chinese state-sponsored hackers leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat h.....»»
League of Legends isn’t as big of a dating don’t as you may think
A running internet meme warns against dating League of Legends players. We asked readers what they really thought of that advice......»»
CSAM scanning would be abused, says Apple – using argument it originally rejected
When Apple announced its own approach to CSAM scanning, many of us warned that the process used to check for child sexual abuse materials would ultimately be abused by repressive governments to scan for things like political protest plans. The Cup.....»»
How to make sense of the new SEC cyber risk disclosure rules
SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in effect since December 18, 2023. For businesses that already harbor conce.....»»
5 free digital forensics tools to boost your investigations
Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information for auditors, legal teams, and law enforcement agencies i.....»»
Senior citizen hit by car saved by his new Apple Watch
An 82-year-old who was given an Apple Watch for Christmas, says it may have saved his life after a car hit him.Setting up Fall Detection in the Apple WatchFootage has now been released of the incident at a roundabout in Kidderminster, in the UK, on J.....»»
TikTok lesbian bar debacle raises question: Who belongs in queer spaces?
TikTokker who went to lesbian bar Cubbyhole sparked discourse about who belongs in queer spaces like it. Queer New York TikTok was in an uproar recently over an incident at Cubbyhole, a famous lesbian bar in Manhattan. The conflict — betw.....»»
Crowd torches Waymo self-driving car in San Francisco
The incident was not the first time people harassed self-driving cars, but its severity signals growing public hostility toward the vehicles......»»
How Apple handles imposter apps that try to sneak onto the App Store
The issue of misleading apps on the App Store surfaced this week after yesterday’s LastPass incident. The folks behind the popular password manager needed to warn customers that an app called LassPass was pretending to be LastPass. While that’s a.....»»