NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»
Report: Mac security threats on the rise, here’s what to watch out for
Malwarebytes has released its latest report digging into the state of malware to start 2024. The findings include which countries see the most ransomware attacks, the evolution of malware over the last year, how Mac threats are growing, which Mac th.....»»
OpenText Fortify Audit Assistant increases developer efficiency by reducing noise and false positives
OpenText announced the second generation of its advanced cybersecurity auditing technology. Today’s developers are dealing with more complexity and threats in multi-cloud environments. Security teams feel increasing pressure to tackle applicati.....»»
Bitdefender Email Protection identifies potentially dangerous content in webmail
Bitdefender launched Email Protection, a new feature that scans and identifies potentially dangerous content such as phishing attempts and online scams, in webmail accessed from any device. Email Protection allows users to extend one of the world’s.....»»
New method spots cosmic threats by extracting 3D direction of plasma ejections from sun"s 2D ultraviolet images
A team of scientists has unveiled a novel method for the early estimation of coronal mass ejection (CME) direction in 3D space. The groundbreaking technique, named DIRECD—"Dimming InfeRred Estimate of CME Direction"—will provide crucial data to m.....»»
OPSWAT enhances its MetaDefender Kiosk product line
OPSWAT announced new advancements to its MetaDefender Kiosk product line. In response to the escalating challenges faced by organizations in managing and handling threats originating from peripheral media such as USBs and bring-your-own-devices (BYOD.....»»
Varonis MDDR helps organizations prevent data breaches
Varonis introduced Varonis Managed Data Detection and Response (MDDR), a managed service dedicated to stopping threats at the data level. Unlike traditional MDR services that are endpoint- and network-centric, MDDR focuses on threats to data. The off.....»»
How cybersecurity strategies adapt to evolving threats
Cybersecurity strategies are essential components of modern organizations, designed to protect digital assets, sensitive information, and overall business continuity from potential cyber threats. As technology advances, the complexity and frequency o.....»»
Ambitious workers park the office politics when employer is struggling, study suggests
New research from a team at City, University of London sheds light on how perceived threats and opportunities to their teams affect office politics......»»
Spatial model predicts bumblebee exposure to pesticide use
It has long been known that agricultural pesticides are one of the greatest threats to bees and other essential pollinators. What farmers have lacked is an understanding of how different pesticides, applied at various times on a variety of crops, aff.....»»
Opinion: The Australia-Tuvalu deal shows why we need a global framework for climate relocations
The recent climate migration deal signed by Australia and Tuvalu in November 2023 has been touted as providing a "lifeline" to the people of the South Pacific nation who face existential threats from rising sea levels and climate change......»»
AI will increase the number and impact of cyberattacks, intel officers say
Ransomware is likely to be the biggest beneficiary in the next 2 years, UK's GCHQ says. Enlarge (credit: Getty Images) Threats from malicious cyberactivity are likely to increase as nation-states, financially motivated c.....»»
1Kosmos BlockID 1Key secures users in restricted environments
1Kosmos announced BlockID 1Key, a biometric security key to provide a phishing-resistant passwordless multi-factor authentication option for Sensitive Compartmented Information Facilities (SCIF), manufacturing clean rooms, customer help desks, higher.....»»
Fighting insider threats is tricky but essential work
Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats (75%). But which of the two is a bigger threat to a company? External vs insider threats External threats can cause.....»»
Team unravels activation mechanism of a protein that combats bacteria
The human immune system is constantly fending off a wide range of invaders—a feat that requires a diverse array of cellular troops and molecular weaponry. Although a great deal is already known about immune defense cells and the strategies they emp.....»»
New methods show promise for boosting rubber production in US
With disease and high demand posing threats to the world's primary natural rubber supply in Southeast Asia, scientists are working to ramp up the U.S. rubber market by advancing methods to extract latex from two sustainable North American plant sourc.....»»
"Doomsday Clock" remains at 90 seconds to midnight
The symbolic "Doomsday Clock" was held at 90 seconds to midnight Tuesday, reflecting existential threats to humanity posed by potential nuclear escalation from the war in Ukraine and the multiplying impacts of the climate crisis following Earth's hot.....»»
Veriti Odin utilizes AI algorithms to detect and analyze threats
Veriti launched its AI powered contextual cybersearch solution, Veriti Odin. Leveraging advanced AI architecture, Odin is designed to optimize and elevate the way businesses approach cybersecurity, creating certainty that solutions are deployed corre.....»»
The reality of hacking threats in connected car systems
With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity.....»»
Living Security Unify Power Insights identifies vulnerable members within an organization
Living Security announced Unify Power Insights, which combines intelligence across multiple identity management and security tools to pinpoint visibility into which members of the workforce are most vulnerable to phishing, account compromise, malware.....»»
Improved mapping gives decision makers a new tool for protecting infrastructure as Arctic warms
New insights from artificial intelligence about permafrost coverage in the Arctic may soon give policymakers and land managers the high-resolution view they need to predict climate-change-driven threats to infrastructure such as oil pipelines, roads.....»»