Gap between OT security assumptions and reality
In the fast-evolving landscape of technology and connectivity, ensuring the security of operational technology (OT) systems has become a paramount concern for organizations worldwide. In this Help Net Security video, Daniel Bren, CEO at OTORIO, discu.....»»
GAZEploit could work out Vision Pro user passwords from watching their avatars [Fixed]
Security researchers came up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a YouT.....»»
Nudge Security unveils SSPM capabilities to strengthen SaaS security
Nudge Security unveiled new SSPM (SaaS security posture management) capabilities for its SaaS security and governance platform. This enhancement creates the industry’s most comprehensive solution of its kind, combining SaaS discovery, security.....»»
Organizations still don’t know how to handle non-human identities
Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of NHIs significantly amplifies the security challenges organizations face. Each.....»»
Security measures fail to keep up with rising email attacks
Organizations must reassess their email security posture as incidents continue to escalate, leading to financial losses. Key findings reveal a significant increase in email attacks, with many successfully bypassing standard security protocols and tar.....»»
New infosec products of the week: September 13, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable, Trellix, and Wing Security. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins T.....»»
Adobe Acrobat Reader has a serious security flaw — so patch now
A bug allows threat actors to launch malicious code on Acrobat Reader remotely, and it's already being used in the wild......»»
Research reveals reality of puberty for Ice Age teens from 25,000 years ago
New research shows Ice Age teens from 25,000 years ago went through similar puberty stages as modern-day adolescents. In a study published today in the Journal of Human Evolution of the timing of puberty in Pleistocene teens, researchers are addressi.....»»
GAZEploit can work out Vision Pro user passwords from watching their avatars
Security researchers have come up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a.....»»
Dru Investigate simplifies cyber investigations and helps users uncover data threats
Druva launched Dru Investigate, a gen AI-powered tool that guides data security investigations using a natural language interface. With Dru Investigate, users across IT, security, legal, and privacy teams can swiftly identify and mitigate data risks,.....»»
Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869)
Among the security updates released by Adobe on Tuesday are those for various versions of Adobe Acrobat and Reader, which fix two critical flaws that could lead to arbitrary code execution: CVE-2024-45112 and CVE-2024-41869. Nothing in the advisory p.....»»
Keeping your eyes on the road is easy with the Engo 2 AR sunglasses
These augmented reality sunglasses work with Apple, Android, and Garmin Enlarge / The Engo 2 smartglasses with heads-up display look slightly bulky. (credit: BradleyWarren Photography) When it comes to working out, I'm a.....»»
Cloudera Private Link Network helps enterprises protect their data
Cloudera launched Cloudera Private Link Network to address critical data security and privacy concerns for highly regulated organizations with strict internal data security policies. Cloudera Private Link Network provides secure, private connectivity.....»»
Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense
In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including funding,.....»»
Kaspersky security tools hijacked to disable online protection systems
RansomHub is using a legitimate tool to disable EDRs and deploy stage-two malware, including infostealers......»»
DNA demethylation boosts tomato resistance to gray mold, study finds
Postharvest decay in fruits, primarily caused by pathogenic fungi, remains a major obstacle to agricultural sustainability and food security. Despite advances in fungicides and storage technologies, losses remain substantial, especially in developing.....»»
Tanium helps organizations automate complex tasks in real-time
Tanium announced Tanium Automate, which provides organizations running Tanium in the cloud with highly accurate, real-time automation for common IT operations and security tasks. Leveraging the Tanium platform’s breadth of endpoint management and s.....»»
Proofpoint expands platform capabilities for broader, adaptive human-centric security controls
Proofpoint has expanded capabilities across its platform to provide customers with broader, adaptive human-centric security controls. These new solutions and integrations shield organizations from incoming threats across messaging, collaboration and.....»»
Opus Security empowers organizations to prioritize the most critical vulnerabilities
Opus Security launched its Advanced Multi-Layered Prioritization Engine, designed to revolutionize how organizations manage, prioritize and remediate security vulnerabilities. Leveraging AI-driven intelligence, deep contextual data and automated deci.....»»
Rogue WHOIS server gives researcher superpowers no one should ever have
.mobi top-level-domain managers changed the location of its WHOIS server. No one got the memo. Enlarge (credit: Aurich Lawson | Getty Images) It’s not every day that a security researcher acquires the ability to genera.....»»
P0 Security raises $15 million to govern and secure cloud access for all identities
P0 Security announced the closing of its $15 million Series A round, bringing its total raised since inception to $20 million. The investment was led by SYN Ventures with participation from Zscaler, the leader in cloud security, and existing investor.....»»