New UEFI firmware vulnerabilities affect several PC vendors
Researchers at enterprise security firm Binarly have discovered no less than 23 high-impact vulnerabilities in the BIOS/UEFI firmware used by several computer vendors like Intel, AMD, Lenovo, Dell, HP, Asus, Microsoft, Fujitsu, Juniper Networks, Acer.....»»
Convergence science in the changing Arctic
The Arctic is undergoing rapid changes that affect its natural environment, its people, and its role in global-scale natural processes. The interplay of climate change, industrialization, and other stressors makes the Arctic an intriguing subject for.....»»
Phantom braking lands troubled EV-maker Fisker in feds’ crosshairs
This makes four open federal safety investigations for the Fisker Ocean. Enlarge (credit: Graham Hughes/Bloomberg via Getty Images) The federal government is looking at a phantom braking problem that appears to be affect.....»»
F5 fixes BIG-IP Next Central Manager flaws with public PoCs (CVE-2024-21793, CVE-2024-26026)
Eclypsium researchers have published details and PoC exploits for two remotely exploitable injection vulnerabilities (CVE-2024-21793, CVE-2024-26026) affecting F5’s BIG-IP Next Central Manager. About the vulnerabilities BIG-IP Next is “a comp.....»»
Affordability to affect new-vehicle purchases, study says
An Urban Science and Harris Poll study found 55 percent of consumers said they're likely to change their vehicle purchase or lease plans due to economic concerns in the near future, lower than dealers' expectations......»»
Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion
Hackers can exploit them to gain full administrative control of internal devices. Enlarge (credit: Getty Images) Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that leave.....»»
How rising treelines can affect Alpine lakes
An EPFL scientist along with colleagues from universities across Europe have completed the first-ever quantitative study of the changes that soil organic matter from forests can cause in high-altitude and high-latitude lakes once it's dissolved in th.....»»
Photos: RSA Conference 2024
RSA Conference 2024 is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this gallery takes you inside the event. The featured vendors are: Sophos, NetSPI, IT-Harvest, Cisco, GitGuardian, Delinea, Splunk, Entrust,.....»»
How workforce reductions affect cybersecurity postures
In its State of Pentesting Report, Cobalt reveals an industry struggling to balance the use of AI and protecting against it, while facing significant resource and staffing constraints. Pentesting plays a key role in addressing this challenge, equippi.....»»
Akamai to acquire Noname for $450 million
Akamai Technologies has announced that it has entered into a definitive agreement to acquire application programming interface (API) security company, Noname Security. Noname, one of the top API security vendors in the market, will enhance Akamai’s.....»»
Forescout AI enables security leaders to make confident, informed decisions
Forescout introduced its AI product strategy built to help business leaders and security operators synthesize connected device threats and make decisions with clarity and confidence. “Many cybersecurity vendors have flooded the market with solution.....»»
Tesla announces fourth round of layoffs in four weeks
The latest cuts affect engineers, HR, and service advisers. Enlarge (credit: Karol Serewis/SOPA Images/LightRocket via Getty Images) On Sunday night, even more Tesla workers learned they were no longer employed by the c.....»»
NinjaOne platform enhancements help security teams identify potential vulnerabilities
NinjaOne has expanded its platform offerings with endpoint management, patch management, and backup capabilities. Now, organizations can easily access the visibility and control needed to ensure confidence in the face of mounting security concerns. E.....»»
Apple has dominated 2024 smartphone sales with iPhone 15 Pro Max
The iPhone 15 Pro Max was the top-selling smartphone in the first quarter of 2024, with iPhones occupying half the spots in the top ten.iPhone 15 Pro MaxApple and Samsung are still the top two highest-selling smartphone vendors in the world, and have.....»»
What to do if your Intel CPU keeps crashing
While Intel and motherboard vendors investigate instability issues, here's what you can do to prevent crashes on your PC......»»
Bug hunters can get up to $450,000 for an RCE in Google’s Android apps
Google has drastically increased the rewards bug hunters can get for reporting vulnerabilities in Android apps it develops and maintains. “We increased reward amounts by up to 10x in some categories (for example Remote Arbitrary Code Execution.....»»
Nokod Security Platform secures low-code/no-code development environments and apps
Nokod Security launched the Nokod Security Platform, enabling organizations to protect against security threats, vulnerabilities, compliance issues, and misconfigurations introduced by LCNC applications and robotic process automations (RPAs). Most or.....»»
Edgio ASM reduces risk from web application vulnerabilities
Edgio launched its Attack Surface Management (ASM) solution. ASM is designed to discover all web assets, provide full inventory of technologies, detect security exposures and manage exposure response across an organization from a centralized manageme.....»»
2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for 14% of all breaches, according to Verizon’s 2024 Data Breach Investigations Report, which analyzed a record-high 30,458 secur.....»»
Study examines US public opinion of "would-be" mass shooters
The unpredictable and widespread threat of mass shootings can affect anyone anywhere. Interrupting the process of planning and conducting a mass shooting is a matter of public safety. However, the public's willingness to both "see something" and "say.....»»
Why cloud vulnerabilities need CVEs
When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and how you manage risk within these different paradigms and environments (e.g., the cloud). Patch net.....»»