Index Engines CyberSense 8.6 detects malicious activity
Index Engines announced the latest release of its CyberSense software, with version 8.6 delivering a revamped user interface to support smarter recovery from ransomware attacks, new custom Advanced Threshold Alerts to proactively detect unusual activ.....»»
Gen Zers and millennials are still big fans of books—even if they don"t call themselves "readers"
Identifying with an activity is different from actually doing it......»»
Infosec products of the month: April 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, Invicti Security, LogRhythm, Netwrix, Owl Cyber Defense Solutions, Privace.....»»
Activity in a room stirs up nanoparticles left over from consumer sprays, study shows
Common household products containing nanoparticles—grains of engineered material so miniscule they are invisible to the eye—could be contributing to a new form of indoor air pollution, according to a Rutgers University study......»»
Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are “not aware at this time of any malicious a.....»»
Global study shows a third more insects come out after dark
A groundbreaking study, led by Dr. Mark Wong of The University of Western Australia, has provided the first global picture of insect activity patterns across the fundamental day–night cycle......»»
Apple @ Work: Dashlane adds Splunk integration to analyze user activity data
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & pr.....»»
Snag a year’s access to Norton’s ‘Secure VPN’ while it’s 75% off
Norton Secure VPN is a great way of ensuring your browsing activity is entirely secure and private. It's available at a great price right now......»»
What AI can tell organizations about their M&A risk
Following the past few years of economic turbulence, merger and acquisition (M&A) activity is on the rise in 2024, with several acquisition deals being announced in the first few months of the year valued at billions of dollars. With the surge of AI.....»»
Breaking down the numbers: Cybersecurity funding activity recap
Here’s a list of interesting cybersecurity companies that received funding so far in 2024. Aim Security January | $10 million Aim Security raised $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club Lond.....»»
Researchers establish a high-throughput multiscale evaluation method for thermal stress in thermal barrier coatings
Thermal barrier coatings (TBCs) are widely used in gas turbine engines to obtain elevated working temperatures and improve engine efficiency. The phase transition of the ceramic layer is accompanied by a large volume difference, causing the concentra.....»»
Sublime Security secures $20 million to strengthen cloud email security and visibility
Sublime Security has raised $20 million in Series A funding, led by Index Ventures with participation from previous investors Decibel Partners and Slow Ventures. Cybersecurity visionary and Crowdstrike Co-founder & former CTO Dmitri Alperovitch is al.....»»
Edgio Client-Side Protection enables organizations to secure critical customer data
Edgio released its Client-Side Protection solution. Designed to monitor scripts and APIs on the browser-side to prevent malicious code from exfiltrating sensitive customer data, Edgio Client-Side Protection allows teams to gain full visibility on cli.....»»
CISOs are nervous Gen AI use could lead to more security breaches
Malicious Gen AI use is on top of everyone's mind, as hackers create convincing phishing emails......»»
Ultrasensitive photonic crystal detects single particles down to 50 nanometers
Using an ultrasensitive photonic crystal, TU/e researchers were able to detect single particles down to 50 nanometers in diameter. The new research has just been published in the journal Optica......»»
International team detects eruption of mega-magnetic star in nearby galaxy
While ESA's satellite INTEGRAL was observing the sky, it spotted a burst of gamma-rays—high-energy photons—coming from the nearby galaxy M82. Only a few hours later, ESA's XMM-Newton X-ray space telescope searched for an afterglow from the explos.....»»
Binarly releases Transparency Platform v2.0 to improve software supply chain security
Binarly releases the Binarly Transparency Platform v2.0 with features for continuous post-build compliance, visibility into the security posture of IoT and XIoT devices, and the ability to identify malicious behavior and hidden backdoors within binar.....»»
Behavioral patterns of ransomware groups are changing
Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS groups attempt to recruit disaffected or displaced affiliates In addition to revealing a nearly 20% yea.....»»
The rising influence of AI on the 2024 US election
We stand at a crossroads for election misinformation: on one side our election apparatus has reached a higher level of security and is better defended from malicious attackers than ever before. On the other side, the rise of artificial intelligence (.....»»
Video Game Violence Statistics 2024 and Facts
Introduction Video Game Violence Statistics: Playing video games is […] Introduction Video Game Violence Statistics: Playing video games is a very popular activity for people of all ages. Video gaming is a huge industry that makes a l.....»»
Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity
Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise and understand console behavior in their environment. “Infrastructure.....»»