NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»
Contrast Security ADR enables teams to identify vulnerabilities, detect threats, and stop attacks
Contrast Security introduced Application Detection and Response (ADR), which empowers security teams to identify vulnerabilities, detect threats, and stop attacks that target custom applications and APIs. Today’s layered “detection and respon.....»»
AWS unveils a monster security system to keep it safe from threats
Huge new AWS security system is able to detect and predict cybercriminal behavior before threats arise......»»
AI-fueled phishing scams raise alarm ahead of U.S. presidential election
Highlighting growth of phishing and digital scams targeting United States citizens, Bolster released a research that identified 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the US to interfere wi.....»»
Rapid7 releases Command Platform, unified attack defense and response
Rapid7 launched its Command Platform, a unified threat exposure, detection, and response platform. It allows customers to integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to clo.....»»
The role of AI in cybersecurity operations
Security operation centers (SOCs) need to be better equipped to manage the sheer scale of data to monitor and the increasing sophistication of threats. SOC analysts face a daunting task: sifting through thousands of alerts every day – most of w.....»»
MISP: Open-source threat intelligence and sharing platform
MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professio.....»»
Dealerships warned about phishing scams tied to global cyber event
Two cybersecurity consulting firms are warning dealerships about scams relating to CrowdStrike's catastrophic software update on July 19......»»
Airlines are flying blind on third-party risks
The aviation industry has traditionally focused on physical security threats, but recent revelations about risks on Boeing‘s supply chain have spotlighted the critical need to measure and mitigate supply chain risk, according to SecurityScoreca.....»»
Why CISOs face greater personal liability
In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal liability risks for CISOs. These risks are driven by heightened cybersecurity threats, evolving regulati.....»»
Ornamented dragonflies better equipped to survive human threats
A study by Kim Medley and others found that dragonflies with dark wing markings have a lower risk of extinction......»»
Microsoft 365 users targeted by phishers abusing Microsoft Forms
There has been an uptick in phishing campaigns leveraging Microsoft Forms this month, aiming to trick targets into sharing their Microsoft 365 login credentials. A malicious Microsoft form (Source: Perception Point) Malicious forms leading to phishin.....»»
AI-generated deepfake attacks force companies to reassess cybersecurity
As AI-generated deepfake attacks and identity fraud become more prevalent, companies are developing response plans to address these threats, according to GetApp. In fact, 73% of US respondents report that their organization has developed a deepfake r.....»»
Cloud security threats CISOs need to know about
In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data breaches, misconfiguration, insider threats, advanced.....»»
This new Google Chrome security warning is very important
Chrome changes how it warns users of suspicious downloads by offering easily digestible explanations with it anti-phishing Enhanced protection feature......»»
Network of ghost GitHub accounts successfully distributes malware
Check Point researchers have unearthed an extensive network of GitHub accounts that they believe provides malware and phishing link Distribution-as-a-Service. Set up and operated by a threat group the researchers dubbed as Stargazer Goblin, the ̶.....»»
Natural drylands grossly under-protected: Study predicts major threats due to human land-use conversion
Drylands cover about 42% of the Earth's land surface and are increasingly threatened by human land-use pressures like agriculture, alternative energy sources, overgrazing and climate change. Up to a third of the global human population living in dryl.....»»
How racialized women can tackle backlash when advocating for change
Racialized women are often at the forefront in the struggle for social justice. Yet that advocacy often comes with significant backlash and threats. In the United States, congresswomen like Cori Bush, Ilhan Omar and Alexandria Ocasio-Cortez have face.....»»
Electrified membranes with carbon nanotubes offer faster nitrate removal in drinking water
Nitrate contamination in water has long presented threats to the environment and human health. Now, Yale researchers have developed an efficient and effective way to remove it......»»
CISOs must shift from tactical defense to strategic leadership
Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the expansion of attack surfaces through interconnected systems and devices, accor.....»»
Paris Mayor Defies Poop Threats to Swim in Seine, and Prove a Point
French politicians’ pledge to make swimming possible in the iconic river is a way to ward off criticism about the cost of the cleanup operation......»»