Editorial: Ugly presidential politics, not national security, blocking U.S. Steel acquisition by Nippon Steel
Nippon Steel's proposed $14.9 billion acquisition of U.S. Steel has been wrongly sidetracked by presidential politics. It should be approved......»»
Dual-comb method achieves first precise absolute distance measurement over 100 km
A team of physicists and engineers at China's Hefei National Laboratory has succeeded in conducting the first instance of precise absolute distance measurement over a path exceeding 100 km. The group has written a paper describing how they achieved s.....»»
EPA investigating taconite mine for pollution that threatens wild rice
In a novel attempt to enforce a longstanding Minnesota rule protecting wild rice, the EPA is investigating U.S. Steel's taconite mine, Keetac, for repeatedly releasing a rice-killing pollutant into surface waters......»»
New infosec products of the week: December 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
Apple stops signing iOS 18.1.1, blocking downgrade from 18.2
Apple on Thursday stopped signing iOS 18.1.1, preventing users from downgrading to this version of the operating system if their iPhone or iPad is already running a newer version. The move comes a week after the release of iOS 18.2, which introduced.....»»
Superman teaser trailer previews David Corenswet as a battered Man of Steel
The first teaser trailer for Superman has been released. The Superman footage previews David Corenswet as the Man of Steel......»»
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
A nation exhausted: The neuroscience of why Americans are tuning out politics
"I am definitely not following the news anymore," one patient told me when I asked about her political news consumption in the weeks before the 2024 U.S. presidential election......»»
Prototype sunscreen uses TiO₂ nanoparticles to cool skin while blocking UV rays
Wearing sunscreen is important to protect your skin from the harmful effects of UV radiation but doesn't cool people off. However, a new formula, described in Nano Letters, protects against both UV light and heat from the sun using radiative cooling......»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Are threat feeds masking your biggest security blind spot?
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»
Enpass simplifies compliance and security controls for password management
Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further enhancing.....»»
Netwrix 1Secure enhances protection against data and identity access risks
Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome the la.....»»
Ukrainian hacker gets prison for infostealer operations
Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS)......»»
How one state"s repeal of a prison "pay-to-stay" law could guide national reform
Nearly every state requires incarcerated individuals to pay for room, board and basic services under so-called "pay-to-stay" laws. In 2019, Illinois became one of the first to repeal such a law—a move that prompted Brittany Friedman, assistant prof.....»»
Thousands of SonicWall VPN devices are facing worrying security threats
Many SonicWall VPNs are running outdated and vulnerable software versions......»»
Q&A: Inside the search for dark matter
More than a decade ago, dark matter experts Daniel Akerib and Thomas Shutt joined the Department of Energy's SLAC National Accelerator Laboratory, continuing their mission to uncover the elusive substance. SLAC recently caught up with them to discuss.....»»
A critical security flaw in Apache Struts is under attack, so patch now
Criminals are apparently using already available Proof-of-concept to attack Apache Struts......»»