Hezbollah chief denounces Israeli attacks as warplane sonic booms rattle Beirut
Hezbollah chief denounces Israeli attacks as warplane sonic booms rattle Beirut.....»»

TP-Link faces possible US ban as hijacked routers fuel Chinese attacks
Founded in China, TP-Link makes routers popular in US homes and businesses. US government authorities are reportedly investigating whether to ban TP-Link wireless routers, which h.....»»
Assault on DEI: Critics use simplistic terms to attack the programs, but they are key to uprooting workplace bias
Prominent politicians have recently increased their attacks on workplace programs that promote diversity, equity and inclusion, or DEI. They claim that initiatives that seek to be inclusive are divisive and lack merit......»»
Russian space chief says country will fly on space station until 2030
"Space is an area of activity where there is never a 100 percent guaranteed result." In a wide-ranging interview with a Russian television station, the chief executive of Russia's.....»»
In IT? Need cash? Cybersecurity whistleblowers are earning big payouts.
The US government now relies on whistleblowers to bring many cases. Matthew Decker is the former chief information officer for Penn State University’s Applied Research Laborator.....»»
HomeKit exploit used for spyware attacks on iPhones, says Amnesty International
Amnesty International says a security vulnerability in HomeKit was used to target iPhones belonging to Serbian journalists and activists. The civil rights organization conducted an investigation after Apple notified two of the victims that their d.....»»
Deepfakes and AI attacks are worker"s biggest security worries
Workers are more concerned about AI-backed cyberthreats and deepfakes, with many having experienced them first-hand......»»
Identity fraud attacks using AI are fooling biometric security systems
AI-driven identity fraud surges, with deepfake technology complicating verification processes......»»
Habitat loss stokes rabid jackal attacks in Bangladesh
Few in the Jahan family's remote Bangladeshi village had seen a jackal up close before the morning one stalked Musqan through the paddy fields, pounced on her, and maimed the four-year-old for life......»»
New infosec products of the week: December 13, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus Networks, Trellix, and Versa Networks. Trellix Drive Encryption enhances security against insider attacks Trel.....»»
How CEO pay and analyst feedback influence innovation
West Virginia University research shows the stock market shapes chief executive officers' commitments to innovation through mechanisms that range from CEO pay packages to feedback from financial analysts......»»
We must adjust expectations for the CISO role
Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely int.....»»
27 DDoS-for hire platforms seized by law enforcement
As part of an ongoing international crackdown known as Operation PowerOFF, international law enforcement has seized over two dozen platforms used to carry out Distributed Denial-of-Service (DDoS) attacks. These “booter” (aka “stress.....»»
Microsoft enforces defenses preventing NTLM relay attacks
Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less secure and obsolete counterpart. Until NTLM gets disabled by default, Microsoft is working on shoring up defen.....»»
Trellix Drive Encryption enhances security against insider attacks
Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. Customers benefit from the flexibility needed for encryption protection deployment to safeguard their data and devices from unauthorized access. “The major.....»»
US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims were U.....»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
Microsoft: “Hack” this LLM-powered service and get paid
Microsoft, in collaboration with the Institute of Science and Technology Australia and ETH Zurich, has announced the LLMail-Inject Challenge, a competition to test and improve defenses against prompt injection attacks. The setup and the challenge LLM.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Trump names billionaire private astronaut as next NASA chief
US President-elect Donald Trump on Wednesday nominated Jared Isaacman, the online payments billionaire and the first private astronaut to ever perform a spacewalk, as the next head of NASA......»»
70% of open-source components are poorly or no longer maintained
The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, according to Lineaje. Open-source code risks rise with anonymous contributi.....»»