Microsoft profiles new threat group with unusual but effective practices
Octo Tempest employs tactics that many of its targets aren't prepared for. Enlarge / This is not what a hacker looks like. Except on hacker cosplay night. (credit: Getty Images | Bill Hinton) Microsoft has been tracking.....»»
Evo—an AI-based model for deciphering and designing genetic sequences
Computer scientists, bioengineers and AI specialists from the Arc Institute and Stanford University have developed an AI-based model capable of decoding and designing genetic sequences. In their paper published in the journal Science, the group descr.....»»
Study confirms Egyptians drank hallucinogenic cocktails in ancient rituals
A University of South Florida professor found the first-ever physical evidence of hallucinogens in an Egyptian mug, validating written records and centuries-old myths of ancient Egyptian rituals and practices. Through advanced chemical analyses, Davi.....»»
Producing high-quality seeds of an heirloom cabbage in different crop management systems
A new study, conducted by the University of Florida, on heirloom cabbage production sheds light on how different crop management systems affect seed quality. The research highlights the potential for sustainable and resilient farming practices to enh.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
FTC to launch investigation into Microsoft’s cloud business
Microsoft is accused of using punitive licensing terms for Azure. The Federal Trade Commission is preparing to launch an investigation into anti-competitive practices at Microsoft.....»»
Bitsight acquires Cybersixgill to help organizations manage cyber exposure
Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack surface,.....»»
NASA tests new AI chatbot to make sense of complex data
NASA has partnered with Microsoft to develop an AI-powered chatbot aimed at making sense of vast amounts of Earth-related science data......»»
Using AI to drive cybersecurity risk scoring systems
In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and mana.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
Android is getting call scam detection and real-time app threat alerts
Two new Android security features are now available for users in the U..S, and will soon make their way to older Android devices as well......»»
Microsoft brought back this feature to the new version of Outlook
Microsoft aims to revamp the new Outlook with a pair of Narrator features that make checking your emails easier......»»
Windows 11 takes a break on updates until 2025
Microsoft won't work on its Preview software with unique features for the rest of the year, but will be sure to roll out security updates......»»
Water under Threat, Wooden Satellites and a Mud Bath for Baseballs
Droughts in 48 of 50 U.S. states, evidence of microplastics mucking up wastewater recycling and the science of a baseball mud bath in this week’s news roundup......»»
Microsoft finally releases generic install ISOs for the Arm version of Windows
Generic install media brings Arm PCs closer to feeling like any old x86 PC. For some PC buyers, doing a clean install of Windows right out of the box is part of the setup ritual......»»
Theoretical model explains the anomalous properties of water in extreme conditions
Water, a molecule essential for life, has unusual properties—known as anomalies—that define its behavior. However, there are still many enigmas about the molecular mechanisms that would explain the anomalies that make the water molecule unique. D.....»»
Lawsuit by US workers accuses Apple chipmaker TSMC of ‘anti-American discrimination’
TSMC’s Arizona plants will enable Apple chips for older devices to be made in the US for the first time, but things haven’t exactly been going to plan. The latest development is that a group of the company’s US workers have filed a lawsuit a.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Consumer group sues Apple for $3.8b over iCloud monopoly
A consumer rights group in the U.K. has filed a lawsuit against Apple, claiming it locks its customers into the iCloud cloud storage service......»»
UK consumer rights group sues Apple for maintaining an ‘unlawful’ iCloud monopoly
UK consumer rights group Which? is leading a lawsuit against Apple, targeting Apple’s dominance over cloud services on iPhone and iPad. Essentially, it argues that Apple forces iOS device users to buy iCloud storage as it does not allow other cloud.....»»
How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)
CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on November 2024 Patch Tuesday, has been exploited since at least April 2024, ClearSky researchers have revealed. About the vulnerability CVE-2024-43451 affects all s.....»»