DOJ Says It Won"t Prosecute White Hat Security Researchers
The Department of Justice announced today a policy shift in that it will no longer prosecute good-faith security research that would have violated the country's federal hacking law the Computer Fraud and Abuse Act (CFAA). Motherboard: The move is sig.....»»
How CISOs tackle business payment fraud
In this Help Net Security video, Shai Gabay, CEO of Trustmi, discusses why payments are a source of cyber worry for CISOs. CISOs are worried about Business Email Compromise (BEC), cyber attackers’ use of AI, and securing the supply chain. These.....»»
Enterprises increasingly block AI transactions over security concerns
Enterprises must secure a transformation driven by generative AI (GenAI) bidirectionally: by securely adopting GenAI tools in the enterprise with zero trust while leveraging it to defend against the new AI-driven threat landscape, according to Zscale.....»»
Thousands of servers hacked in ongoing attack targeting Ray AI framework
Researchers say it's the first known in-the-wild attack targeting AI workloads. Enlarge (credit: Getty Images) Thousands of servers storing AI workloads and network credentials have been hacked in an ongoing attack campa.....»»
Researcher creates algorithm to aid in discovery of new medicines
Ph.D. candidate Jeroen Methorst has developed a computer system that helps researchers find the protein they need to create new medicines. "Our whole group is now using this program," says Methorst. He will defend his Ph.D. thesis on April 2......»»
Scientists warn that the Baltic Sea gray seal hunt is too large
Researchers at the University of Gothenburg warn that today's hunting quotas of about 3,000 animals pose a risk to the long-term survival of the gray seal in the Baltic Sea. The conclusions of this new study are based on statistics from 20th century.....»»
Researchers find the more flood driving factors there are, the more extreme a flood is
There are several factors that play an important role in the development of floods: air temperature, soil moisture, snow depth, and the daily precipitation in the days before a flood. In order to better understand how individual factors contribute to.....»»
Researchers identify new method to boost laser processing resolution
Focusing a tailored laser beam through transparent glass can create a tiny spot inside the material. Researchers at Tohoku University have reported on a way to use this small spot to improve laser material processing, boosting processing resolution......»»
Researchers demonstrate that forests trap airborne microplastics, acting as terrestrial sinks
A research group led by Japan Women's University finds that airborne microplastics adsorb to the epicuticular wax on the surface of forest canopy leaves, and that forests may act as terrestrial sinks for airborne microplastics......»»
Apple quietly releases revised build of iOS 17.4.1 and iPadOS 17.4.1
Apple last week released iOS 17.4.1 and iPadOS 17.4.1 to iPhone and iPad users. Although the updates don’t add any new features, they do bring two important security patches. For some unknown reason, Apple has now quietly released a revised build o.....»»
CyberArk Secure Browser helps prevent breaches resulting from cookie theft
CyberArk launched CyberArk Secure Browser, an identity-centric secure browser, providing enhanced security and privacy alongside a familiar, productive user experience. Backed by intelligent privilege controls and simple to deploy across devices, Cyb.....»»
Malwarebytes adds AI functionality to ThreatDown Security Advisor
Malwarebytes has added AI functionality to its Security Advisor, available in every ThreatDown Bundle. Leveraging generative AI technology, the new capabilities will transform Security Advisor into a dynamic experience that allows customers to use si.....»»
Bedrock Security protects sensitive data within one unified platform
Bedrock Security unveiled its data security platform. Empowering organizations to manage data risk introduced by cloud and generative AI, Bedrock continuously discovers, manages, and protects sensitive data. The platform is powered by data AI Reasoni.....»»
Drozer: Open-source Android security assessment framework
Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. Drozer features The solution enables the identification of security vulnerabilities in applicati.....»»
Essential elements of a strong data protection strategy
In this Help Net Security interview, Matt Waxman, SVP and GM for data protection at Veritas Technologies, discusses the components of a robust data protection strategy, emphasizing the escalating threat of ransomware. He highlights the importance of.....»»
Cybersecurity jobs available right now: March 27, 2024
Cyber Product Owner UBS | Israel | On-site – View job details Your primary responsibilities will include owning and managing application security testing products, collaborating with the cyber hygiene operational team, and understandi.....»»
How security leaders can ease healthcare workers’ EHR-related burnout
Staff experiencing burnout in healthcare settings is not something that security leaders typically worry about – unless, maybe, it is the security team itself that is suffering from it. Healthcare CISOs and privacy officers worry more about the con.....»»
Genetic secrets from 4,000-year-old teeth illuminate the impact of changing human diets over the centuries
Researchers at Trinity College Dublin have recovered remarkably preserved microbiomes from two teeth dating back 4,000 years, found in an Irish limestone cave. Genetic analyses of these microbiomes reveal major changes in the oral microenvironment fr.....»»
Sniffing out bacteria: Team develops a novel approach for rapid bacterial species identification
Do you ever wonder how researchers identify bacterial infections? Traditionally, they collect samples from the infected site, grow the bacteria in a lab, and analyze them using a method called MALDI-ToF-MS. Although accurate, this method is time-cons.....»»
Researchers obtain promising results for control of pollutants in water
An article published in the journal Catalysis Communications describes a simple, efficient and sustainable approach to the degradation and quantitative monitoring of a mixture of polycyclic aromatic hydrocarbons (PAHs), emerging pollutants that conta.....»»
Researchers uncover the microbial secrets of dry eye
Researchers have used advanced sequencing technology to determine how the mix of microbes present in patients with healthy eyes differs from the mix found in patients with dry eye. The new work could lead to improved treatments for various eye proble.....»»