How fast do cybercriminals capitalize on new security weaknesses?
Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how quickly cybercriminals capitalize on new security weaknesses – shrinking the wi.....»»
Space business is evolving fast—a new book provides much-needed insight
Space Business: Emerging Theory and Practice, a new book edited by Professor Arto Ojala, Professor of International Business at the University of Vaasa, Finland, and Professor William W. Baber, University of Kyoto, examines the space business, its bu.....»»
A quantum material could be the future of high-energy X-ray imaging and particle detection
Scintillators are detectors that make high-energy X-rays or particles visible through flashes of light to form an image. Their many applications include particle physics, medical imaging, X-ray security and more......»»
Ubuntu 24.10 Oracular Oriole brings tighter security controls
Canonical released Ubuntu 24.10 Oracular Oriole, which brings notable advancements, including an updated kernel, new toolchains, and the GNOME 47 desktop environment, along with significant enhancements in software security. “Oracular Oriole sets a.....»»
Unlocking the power of cryptographic agility in a quantum world
In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly tran.....»»
Amazon Prime Big Deal Days iPad deals: Savings still available!
With Amazon Prime Big Deal Days coming up fast, we've highlighted all the best iPad deals, using our expert knowledge to know what's best for you......»»
Chery begins producing cars in Russian plants vacated by Western rivals
Chery's car sales in Russia are growing fast, data shows, and Chinese brands account for over half of Russia's new-vehicle deliveries......»»
New discoveries: Three tiny species added to South Africa"s spectacular marine life
South Africa's marine realm is globally unique because of the two major ocean currents that meet here. The cold, slow-moving Benguela and the warm, fast-flowing Agulhas currents create a special environment that supports high levels of biodiversity......»»
Novel visible light communication encryption technology uses chiral nanoparticles
A research team has developed a novel visible light communication encryption technology with high security using chiral nanoparticles......»»
Simbian unveils AI Agents to address the top pain points for SOC analysts
Simbian announced a suite of AI Agents that work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program. The suite of AI Agents, which runs on the Simbian Security Accelerator Platform, addresses th.....»»
Adaptiva improves collaboration between IT and security teams with vulnerability dashboards
Adaptiva announces the latest feature release for OneSite Patch: vulnerability dashboards. These new dashboards provide real-time visibility into Common Vulnerabilities and Exposures (CVEs) in the environment and patches that can remediate them–emp.....»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»
What lies ahead for AI in cybersecurity
AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, the.....»»
Bitwarden integrates with Microsoft Sentinel to strengthen real-time threat detection
Bitwarden expanded its integration capabilities with the release of a Microsoft Sentinel integration to enhance security information and event management (SIEM) for organizations. Security teams can now monitor, detect, and respond to password manage.....»»
Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)
If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an analysis of CVE-2024-45409 and an exploit script.....»»
Prime Big Deal Days smartwatch deals: Apple, Samsung, Fitbit, Garmin
There are discounts from Prime Big Deal Days smartwatch deals for Apple, Google, and Samsung devices, but you should act fast if you don't want to miss out......»»
Samsung quits updating Galaxy Z Fold 2 that came out in 2020 for $2,000
Newer Samsung Galaxy phones are promised seven years of updates. Samsung is no longer providing software or security updates for the Galaxy Z Fold 2 foldable smartphone that it r.....»»
Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572)
For October 2024 Patch Tuesday, Microsoft has released fixes for 117 security vulnerabilities, including two under active exploitation: CVE-2024-43573, a spoofing bug affecting the Windows MSHTML Platform, and CVE-2024-43572, a remote code execution.....»»
OpenBSD 7.6 released: security improvements, new hardware support, and more!
OpenBSD is a free, multi-platform 4.4BSD-based UNIX-like operating system. The 57th release, OpenBSD 7.6, comes with new features, various improvements, bug fixes, and tweaks. Security improvements Added -fret-clean option to the compiler, defaulting.....»»
Security Bite: The concerning popularity of third-rate VPN apps in Russia
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art App.....»»
Chinese hack of US ISPs shows why Apple is right about backdoors for law enforcement
It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US. What’s notable about the attack is that it compromised security backdoors deliberately created t.....»»