Exploring the persistent threat of cyberattacks on healthcare
In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers can do to protect patientsR.....»»
Exploring political connections of emerging market multinationals: Opportunities and challenges
Emerging market multinational corporations (EMNCs) have been in the headlines recently due to TikTok's travails in the United States. The US Senate voted in late April to ban TikTok in the United States if its owner, the Chinese tech firm ByteDance,.....»»
Exploring hierarchy in dynamic environments
Most organizations operate under command hierarchies: Workers, who know the ground reality, report to managers, who know the big picture. If these views conflict, what happens to organizational performance?.....»»
Researchers develop new method to assess equity implications of carbon taxes
Researchers from the University of Massachusetts Amherst and Smith College have developed a new method to assess the equity implications of carbon taxes, which are among economists' favored solutions to address the looming threat of climate change......»»
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span
An unknown threat actor with equally unknown motives forces ISP to replace routers. Enlarge (credit: Getty Images) One day last October, subscribers to an ISP known as Windstream began flooding message boards with report.....»»
The threat posed by climate change: Study shows among over-40-year-olds, parents worry just as much as non-parents
Future generations will suffer increasingly more from the consequences of climate change than we do today. Presumably, older people with children will be more worried about climate change than those of the same age without children, as they will also.....»»
Moonstone Sleet: A new North Korean threat actor
Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to further goals of the North Korean regime. “Moonstone Sleet uses tactics, techniques, an.....»»
New research approach: Exploring the mouthfeel of food with a microscope
A team led by Melanie Köhler and Veronika Somoza from the Leibniz-Institute for Food Systems Biology has presented a new research approach in the journal Nature Food. The perspectives article focuses on different ways to study the mouthfeel of food.....»»
Key factors that orchestrate mysterious synchronized coral spawning revealed
Corals play an essential role in ocean ecosystems, and like many organisms, they are under threat from climate change and other human activities. To better protect coral, it's first necessary to understand them, in particular their reproductive life.....»»
Cybersecurity teams gear up for tougher challenges in 2024
In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored.....»»
Why are grocery bills so high? A new study looks at the science behind food price reporting
Rising food costs are squeezing Canadians around the country. Nearly everyone is feeling the pinch, and it's not just an inconvenience—high food prices are a major threat to food security for many Canadians. Understanding why food prices are so hig.....»»
The hornet has landed: Scientists combat new honeybee killer in US
Researchers are working to limit the threat while developing better eradication methods. Enlarge / 2023 marked the first sighting of a yellow-legged hornet in the United States, sparking fears that it may spread and devastate hon.....»»
9to5Mac Overtime 019: Look at those bezels, man
Jeff and Fernando share their impressions of the new iPad Pro, Apple Pencil Pro, and Magic Keyboard for iPad Pro. Fully edited on iPad Pro! 9to5Mac Overtime is a weekly video-first podcast exploring fun and interesting observations in the Apple e.....»»
The Artificial Intelligence Era Faces a Threat from Directed Energy Weapons
Autonomous and AI-enabled systems increasingly rely on optical and radio frequency sensors and significant computer power. They face growing vulnerabilities from directed-energy laser and microwave weapons.....»»
Persistent gender imbalances in UK political candidate selections: A call for systemic reform
In a comprehensive analysis by Dr. Sofía Collignon, Senior Lecturer in Comparative Politics at Queen Mary University of London, new light has been shed on the persistent gender disparities in the selection of parliamentary candidates by the U.K.'s C.....»»
Illumio and Netskope join forces to strengthen enterprise resilience against cyberattacks
Illumio and Netskope announced a Zero Trust partnership that brings together the power of Zero Trust Segmentation (ZTS) and Zero Trust Network Access (ZTNA) to protect against breaches and build cyber resilience. The new partnership combines Illumio.....»»
New infosec products of the week: May 24, 2024
Here’s a look at the most interesting products from the past week, featuring releases from CyberArk, OneTrust, PlexTrac, and Strike Graph. CyberArk CORA AI accelerates identity threat detection CyberArk announced CyberArk CORA AI, a new set of AI-p.....»»
Worried about job security, cyber teams hide security incidents
The frequency and severity of cyberattacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, and new sophisticated attack methods, companies are more susceptible than e.....»»
Compromised courtroom recording software was served from vendor’s official site
Courtroom recording software JAVS Viewer has been saddled with loader malware and has been served from the developer’s site since at least April 2, a threat researcher has warned last month. After analyzing a flagged installer detected in a cus.....»»
Machine identities lack essential security controls, pose major threat
Siloed approaches to securing human and machine identities are driving identity-based attacks across enterprises and their ecosystems, according to CyberArk. The CyberArk 2024 Identity Security Threat Landscape Report was conducted across private and.....»»
2024 sees continued increase in ransomware activity
In this Help Net Security video, Ryan Bell, Threat Intelligence Manager at Corvus Insurance, discusses how ransomware will continue to grow in 2024. In January, Corvus reported that global ransomware attacks in 2023 set a record high, surpassing 2022.....»»