Lookout SAIL improves efficiency for cybersecurity professionals
Lookout launched Lookout SAIL, a new generative artificial intelligence (gen AI) assistant that will reshape the way cybersecurity professionals interact with Lookout Mobile Endpoint Security and Lookout Cloud Security solutions and conduct cybersecu.....»»
Managing low-code/no-code security risks
Continuous threat exposure management (CTEM) – a concept introduced by Gartner – monitors cybersecurity threats continuously rather than intermittently. This five-stage framework (scoping, discovery, prioritization, validation, and mobili.....»»
VIVOTEK RealSight Engine improves images clarity in various scenarios
VIVOTEK has announced an upgrade to its comprehensive AI security solution with the release of the new AI feature, RealSight Engine. This feature transforms images captured by network cameras into clear, visible facial images under any lighting condi.....»»
High-refractive-index-modulation nanocomposites for augmented reality displays
Holographic optical elements (HOEs) are essential in augmented reality (AR) displays, providing benefits such as design flexibility and improved optical efficiency. However, current materials' limited refractive index modulation hampers performance,.....»»
Breaking boundaries: PAM-less genome editing in soybean
CRISPR-Cas9 has transformed crop genetic improvement, yet its reliance on specific protospacer adjacent motif (PAM), sequences limits editing scope and efficiency. In soybean, a critical source of protein and oil, these limitations hinder the develop.....»»
Expanding click chemistry: An eco-friendly conversion process for the synthesis of sulfonyl fluorides
For the first time, thiols and disulfides have been converted into sulfonyl fluorides using SHC5 and KF, expanding click chemistry with high efficiency and low environmental impact......»»
Cybersecurity is top of mind for consumers when shopping online, according to Experian
The credit reporting agency surveyed consumers in March and roughly 80 percent said they were somewhat or very concerned about conducting activities online......»»
Scientists develop multifunctional photocatalyst for wastewater treatment
Water contamination by pharmaceuticals and heavy metals poses severe environmental and health risks. Traditional methods like biodegradation and filtration often lack efficiency and sustainability. Photocatalysis, using solar energy to degrade pollut.....»»
Celebrity group"s 4 dealerships sue CDK over cyberattack
Celebrity Motor Car Co.'s four dealerships have all sued CDK Global, accusing it of soliciting business by relating the risks of a dealership breach and the cybersecurity CDK could provide — only to be hacked itself and unavailable to retailers aft.....»»
NASA"s new solar sail extends its booms and sets sail
Solar sails are an exciting way to travel through the solar system because they get their propulsion from the sun. NASA has developed several solar sails, and their newest, the Advanced Composite Solar Sail System (or ACS3), launched a few months ago.....»»
Accenture expands partnership with Google Cloud to boost AI adoption and cybersecurity
Accenture and Google Cloud announced that their strategic alliance is advancing solutions for enterprise clients and seeing strong momentum across industries in two critical and related areas: GenAI and cybersecurity. As part of the announcement toda.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Cyber threats that shaped the first half of 2024
Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed 3,438.....»»
Daily 5 for Aug. 29: GM hopes to bolster its fleet business by branding BrightDrop vans as Chevrolets
Welcome to today's edition of the Daily 5. Back in July, we ran a report about GM's BrightDrop electric delivery van business folding into the GM Envolve fleet and commercial unit. The idea was greater efficiency. Our story also said that after pa.....»»
Study: Plasmonic copper nanowires boost nitrate reduction efficiency
The electrocatalytic nitrate reduction reaction (NO3RR) has attracted the attention of researchers for its significant value in ammonia synthesis and effluent treatment. Plasmon-assisted electrocatalysis provides a powerful strategy for efficient con.....»»
This optional Windows 11 update is totally worth installing
The latest Windows 11 update, KB5041587, makes Android files sharing easier, improves Windows Narrator, and brings other much-needed improvements......»»
CrowdStrike reveals impact of calamitous July IT outage on its business
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
RISCPoint RADAR provides real-time vulnerability detection across multiple attack surfaces
RISCPoint Advisory Group launched RADAR, an all-in-one cybersecurity platform. Combining continuous threat discovery with expert-led Penetration Testing as a Service (PTaaS), RADAR represents a significant leap forward in proactive security and risk.....»»
So, how’s CrowdStrike doing?
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
The NIS2 Directive: How far does it reach?
The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»