NightDragon and CyberKnight strengthen cybersecurity in the Middle East, Turkey and Africa
NightDragon announced a new strategic partnership with CyberKnight to continue the international expansion capabilities of its portfolio companies and bring the latest CSSP innovations to customers in the Middle East, Turkey, Africa (META) and other.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Cyber threats that shaped the first half of 2024
Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed 3,438.....»»
Lack of competition between petrol stations hits households most in poorest areas: Study
Households in low-income areas face significantly higher increases in petrol prices when rival fuel stations close compared to high-income areas, according to new research led by the University of East Anglia (UEA)......»»
Africa"s "youthquake": Huge numbers of young people have no jobs, the wrong skills and little hope
By 2050, one in every three young people on Earth will be of African origin, according to the 2024 International Labor Organization's (ILO) Global Employment Trends for Youth report. Africa's young people will be key players in the direction of futur.....»»
CrowdStrike reveals impact of calamitous July IT outage on its business
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
South Africa"s coal workers face uncertainty—study shows they"re being left out of the green transition
South Africa is on the path to decarbonization—doing away with burning coal and other fossil fuels and moving towards renewable, clean energy, such as solar and wind power. However, the coal industry employs 91,000 people. If these workers lost the.....»»
RISCPoint RADAR provides real-time vulnerability detection across multiple attack surfaces
RISCPoint Advisory Group launched RADAR, an all-in-one cybersecurity platform. Combining continuous threat discovery with expert-led Penetration Testing as a Service (PTaaS), RADAR represents a significant leap forward in proactive security and risk.....»»
So, how’s CrowdStrike doing?
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
The NIS2 Directive: How far does it reach?
The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»
AI company Midjourney teases hardware product in a new form factor
It hired a hardware chief who previously worked on Apple Vision Pro. Responding to this meme image of a wizard with an orb from the I.C.E. book Middle-earth: Valar and Maiar, Midjourney's founder joked that the new hardware form.....»»
AI image-generation company Midjourney says it’s “getting into hardware”
It hired a hardware chief who previously worked on Apple Vision Pro. Responding to this meme image of a wizard with an orb from the I.C.E. book Middle-earth: Valar and Maiar, Midjourney's founder joked that the new hardware form.....»»
Q&A: How should the labor movement handle the challenges of AI, automation at work?
Robert Bruno is a professor of labor and employment relations at the University of Illinois Urbana-Champaign and the director of the Project for Middle Class Renewal, a research-based initiative tasked with investigating labor policies in today's eco.....»»
STEM program for middle- and high-school girls inspires brilliance
In a classroom on Georgia State's Atlanta Campus, more than a dozen middle and high school girls are wearing lab coats and peering into test tubes. They're conducting an epidemiology experiment—the study of how diseases are spread. It's just one of.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»
Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience
Diligent launched its Network and Information Security Directive (NIS2) Compliance Toolkit, designed to help organizations navigate the complexities of the European Union (EU) NIS2 Directive and bolster their cybersecurity resilience. The toolkit map.....»»
Veeam Data Platform 12.2 extends data resilience to more platforms and applications
Veeam Software released Veeam Data Platform v12.2, broadening support for protecting data on an extensive range of new platforms while continuing to advance end-to-end cybersecurity capabilities. This latest release combines the most comprehensive da.....»»
Dragos Platform updates streamline OT threat and vulnerability workflows
Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in thei.....»»
APT group exploits WPS Office for Windows RCE vulnerability (CVE-2024-7262)
ESET researchers discovered a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262). APT-C-60, a South Korea-aligned cyberespionage group, was exploiting it to target East Asian countries. When examining the root cause, ESET d.....»»
Cybersecurity jobs available right now: August 28, 2024
Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»
RSA Authenticator App improves cybersecurity for federal agencies
RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»