Jumio Liveness detects various sophisticated spoofing attacks
Jumio unveiled Jumio Liveness, an enhanced, in-house technology designed to address increasingly sophisticated fraud tactics. This solution expands beyond traditional presentation attacks, such as paper or screen copies, and employs sophisticated AI.....»»
2024 saw a surge in malicious free VPN apps
Cybercriminals increasingly use fake VPN apps to spread malware and launch other attacks. This is what's at stake......»»
Some older D-Link routers are vulnerable to attack
Older D-Link routers suffer a security flaw that exposes users to threats such as malware, DoS attacks, and more. See the reason why there is no fix......»»
"Genetic time machine" reveals complex chimpanzee cultures
In recent decades, scientists have clearly demonstrated that chimpanzees, like humans, pass on complex cultures such as tool use from generation to generation. But human culture has become vastly more sophisticated, from the Stone Age to the Space Ag.....»»
5 charged in “Scattered Spider,” one of the most profitable phishing scams ever
Phishing attacks were so well-orchestrated that they fooled some of the best in the business. Federal prosecutors have charged five men with running an extensive phishing scheme t.....»»
2,000 Palo Alto Networks devices compromised in latest attacks
Attackers have compromised around 2,000 Palo Alto Networks firewalls by leveraging the two recently patched zero-days (CVE-2024-0012 and CVE-2024-9474), Shadowserver Foundation’s internet-wide scanning has revealed. Compromised devices are pred.....»»
HP Enterprise Security Edition protects PC hardware and firmware from physical attacks
HP announced HP Enterprise Security Edition, a suite of security capabilities designed to enhance the physical security of HP business class PCs. HP Enterprise Security Edition includes multilayered safeguards to protect PC hardware and firmware from.....»»
Arkose Device ID detects suspicious activity patterns
Arkose Labs launched Arkose Device ID, a device identification solution that raises the bar in fraud detection by combining precise device tracking with session-based risk signals and anti-spoofing technology. Arkose Device ID is designed to address.....»»
Hornetsecurity DMARC Manager protects against fraud and phishing attacks
Hornetsecurity launched DMARC Manager, an advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and im.....»»
Why AI alone can’t protect you from sophisticated email threats
In this Help Net Security interview, Riaz Lakhani, CISO at Barracuda Networks, discusses the effectiveness of AI-based behavioural analysis in combating sophisticated email threats like BEC and VEC. Lakhani also explains how AI tools help detect mali.....»»
Ranchers again ask Colorado wildlife officials to delay release of next round of wolves
Colorado ranchers are renewing their demand for state wildlife officials to delay the release of more wolves until they finalize more programs to prevent attacks on livestock......»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
IBM boosts the amount of computation you can get done on quantum hardware
Incremental improvements across the hardware and software stacks add up. There's a general consensus that we won't be able to consistently perform sophisticated quantum calculatio.....»»
GoIssue phishing tool targets GitHub developer credentials
Researchers discovered GoIssue, a new phishing tool targeting GitHub users, designed to extract email addresses from public profiles and launch mass email attacks. Marketed on a cybercrime forum, GoIssue allows attackers to send bulk emails while kee.....»»
Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks
Zscaler announced a Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public clou.....»»
North Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat L.....»»
LED light strategy deters Great White shark attacks
Surfers could be protected from future shark attacks following new discoveries about how to trick sharks' visual systems made by Professor Nathan Hart, head of Macquarie University's Neurobiology Lab, Dr. Laura Ryan and colleagues......»»
Why AI-enhanced threats and legal uncertainty are top of mind for risk executives
AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third consecutive quarter with these attacks being the top of emerging risk. IT.....»»
Zywave enhances Cyber Quoting to provide insight into coverage limit adequacy and potential loss gaps
Zywave announced an enhancement to its Cyber Quoting solution with the addition of embedded benchmarking. Brokers can now leverage industry data and loss profiles from similar organizations to provide their clients with more sophisticated insight int.....»»
Key cybersecurity predictions for 2025
In this Help Net Security video, Chris Gibson, CEO at FIRST, discusses the evolving threat landscape and provides a unique take on where data breaches and cyber attacks will be in 2025. The post Key cybersecurity predictions for 2025 appeared first o.....»»