Moonstone Sleet: A new North Korean threat actor
Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to further goals of the North Korean regime. “Moonstone Sleet uses tactics, techniques, an.....»»
Copenhagen takes on its biggest climate threat—water
In low-lying Copenhagen where rising sea levels, groundwater and rainfall pose a risk to infrastructure, the Danish capital is trying to adapt and protect urban areas from climate change......»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Scientists counted 49 ways Australia is destroying the ecosystems we hold dear—but there is hope
Australia's ecosystems face an unprecedented crisis. From rainforests in the continent's north to the alpine bogs and fens of the alps, ecosystems are being pushed towards collapse......»»
Reflecting on 20 years of the Aceh tsunami: From "megathrust" threat to disaster mitigation
20 years have passed since the Aceh tsunami, which left deep scars on Indonesia, especially for those directly affected. Aceh was also recovering from a three-decade armed conflict between the Free Aceh Movement and the national government.....»»
"Exceptional" wildfires across Americas in 2024: EU monitor
Severe drought stoked rampant wildfires across North and South America this year and churned up record carbon pollution in Bolivia, Nicaragua and the Pantanal wetlands, according to new data from Europe's climate monitor......»»
8 US telcos compromised, FBI advises Americans to use encrypted communications
FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks a.....»»
Preparing for Q-day: The essential role of cloud migration in securing enterprise data
As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to u.....»»
How widespread is mercenary spyware? More than you think
A targeted hunt on 2,500 mobile devices for indicators of compromise associated with mercenary spyware has revealed that its use is not as rare as one would hope. The results of the hunt Earlier this year, iVerify added a “Mobile Threat Hunting.....»»
Ralph Fiennes wants this actor to play Voldemort in Harry Potter HBO series
Who will be in the Harry Potter HBO series? Ralph Fiennes, who starred as Voldemort in the movies, believes this Oppenheimer actor could play the Dark Lord......»»
How widespread is mercenary spyware?
A targeted hunt on 2,500 mobile devices for indicators of compromise associated with mercenary spyware has revealed that its use is not as rare as one would hope. The results of the hunt Earlier this year, iVerify added a threat hunting feature to it.....»»
Veeam Data Platform v12.3 encompasses three key objectives for enterprises
Veeam Software released Veeam Data Platform v12.3. This release encompasses three key objectives for enterprises: protecting identity and access management with support for backing up Microsoft Entra ID, powering proactive threat analysis with Recon.....»»
AttackIQ Flex 3.0 empowers security teams to take control of their detection strategies
AttackIQ announced AttackIQ Flex 3.0, agentless security control validation that integrates natively with Splunk to deliver a fully seamless user experience. A growing need for efficient and accurate threat detection As cyber threats grow more sophis.....»»
Security Bite: Threat actors are widely using AI to build Mac malware
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art App.....»»
What a new threat report says about Mac malware in 2024
Apple's macOS has been under siege in 2024 as malware-as-a-service platforms and AI-driven threats make the year a turning point for Mac security.MacBook ProFor years, macOS had a reputation for being malware-resistant, but 2024 has painted a differe.....»»
Model reveals supply chain risks pose major threat to financial stability
The recent Volkswagen crisis underscores how supply chain disruptions can magnify financial risks. A new model, developed by the Complexity Science Hub (CSH), shows how risks spread from the real economy to the financial sector......»»
Scientists uncover new mollusk species co-habiting with an anemone in the North Atlantic abyss
A new species of tusk shell, a burrowing marine mollusk, has been discovered in deep, North Atlantic waters by scientists from the British Antarctic Survey and the Senckenberg Society for Nature Research. The newly discovered mollusk lives in the aby.....»»
Climate researchers find North Atlantic Ocean has a memory of nearly two decades
A research team led by the University of Liverpool has found that the North Atlantic Ocean has a memory of approximately one to two decades, significantly surpassing previous estimates of a few years......»»
Push Security introduces verified stolen credentials detection capability
Push Security unveiled verified stolen credentials detection capability, a new feature designed to reshape how security teams combat identity threats. By analyzing threat intelligence (TI) on stolen credentials and comparing it against active credent.....»»
Thales Data Risk Intelligence identifies risks to sensitive data
Thales launched Data Risk Intelligence, an Imperva Data Security Fabric (DSF) solution that proactively addresses the risks to data wherever it resides. This is the first solution uniting the risk and threat identification capabilities of the Imperva.....»»
Scientists question use of "tipping point" metaphor in climate change discussions
A group of scientists, including researchers from Rutgers University-New Brunswick, Princeton University and Carleton University, has questioned the accuracy and utility of the metaphor "tipping point" in calling attention to the threat of climate ch.....»»