NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»
NETSCOUT uses AI/ML technology to secure critical IT infrastructure
NETSCOUT updates its Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM) products as part of its Adaptive DDoS Protection Solution to combat AI-enabled DDoS threats and protect critical IT infrastructure. DDoS threats and protect critical IT.....»»
Thousands of SonicWall VPN devices are facing worrying security threats
Many SonicWall VPNs are running outdated and vulnerable software versions......»»
European companies hit with effective DocuSign-themed phishing emails
A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers. The phishing.....»»
CISO accountability: Navigating a landscape of responsibility
What was once primarily a technical role, CISOs now find themselves accountable for organizational risk, regulatory compliance, and even legal liabilities across the entire organization. However, as cyber threats intensify, it’s clear that overseei.....»»
Most coastal Arctic infrastructure faces instability by 2100, study warns
A new study has produced the first map of all coastal communities and infrastructure across the Arctic, showing the vulnerability of the built environment to threats from climate change......»»
Amazon facing strike threats as Senate report details hidden widespread injuries
Amazon ignores strike threats, denies claims of “uniquely dangerous warehouses.” Just as Amazon warehouse workers are threatening to launch the "first large-scale" unfair labo.....»»
Risk Aperture AI360 manages AI-specific vulnerabilities and threats
Risk Aperture launched AI360, a solution designed to address the growing cybersecurity risks posed by artificial intelligence (AI). AI360 leverages proprietary algorithms, predictive analytics, and machine learning to deliver actionable insights, he.....»»
Rising drought frequency poses new threats to US wildlife, study finds
People around the world are dealing with drought, so it's not shocking that it affects wildlife, too: lack of moisture contributes to habitat loss, affects how animals compete for resources, and leads to dehydration and heat stress. The surprising pa.....»»
Schools are facing greater cybersecurity threats than ever before
Most parents are confident in school’s cyber safeguarding, but this trust might be misplaced......»»
A sustainable, circular economy could counter Trump"s tariffs while strengthening international trade
In response to United States President-elect Donald Trump's threats to impose a 25% tariff on Canadian imports and his escalating hostile rhetoric, Canada and its allies must urgently explore new international trade strategies. Trump's proposed tarif.....»»
Only Cynet delivers 100% protection and detection visibility in the 2024 MITRE ATT&CK Evaluation
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to understand.....»»
CyTwist’s detection engine combats AI-generated malware
CyTwist launches its patented detection engine to combat the insidious rise of AI-generated malware. Enhancing an organization’s existing security stack, CyTwist’s solution profiles threat actors using field-proven counterintelligence met.....»»
Stamus Networks Clear NDR uncovers unauthorized activity
Stamus Networks announced Clear NDR, an open and transparent NDR system that empowers cyber defenders to uncover and stop serious threats and unauthorized activity before they cause harm to the organization. It can be deployed as a standalone NDR sol.....»»
SecureAuth protects sensitive information with biometric continuous identity assurance
SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the duration of a user’s session — providing additional protection from emerging threats.....»»
Itch.io platform briefly goes down due to “AI-driven” anti-phishing report
Domain registrar failed to respond after offending content was taken down. Popular indie game platform itch.io says its domain was briefly taken down for a few hours Monday mornin.....»»
Itch.io platform briefly goes down to “AI-driven” anti-phishing report
Domain registrar failed to respond after offending content was taken down. Popular indie game platform itch.io says its domain was briefly taken down for a few hours Monday mornin.....»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Mitek Digital Fraud Defender combats AI generated fraud
Mitek announced Digital Fraud Defender (DFD), an advanced, multi-layered solution to safeguard digital identity verification processes against sophisticated AI-enabled fraud tactics. Designed for financial institutions, fintech, online gaming provide.....»»
How the Shadowserver Foundation helps network defenders with free intelligence feeds
In this Help Net Security interview, Piotr Kijewski, CEO of The Shadowserver Foundation, discusses the organization’s mission to enhance internet security by exposing vulnerabilities, malicious activity, and emerging threats. Kijewski explains the.....»»