Organizations are knowingly releasing vulnerable applications
92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for app.....»»
SecureAuth protects sensitive information with biometric continuous identity assurance
SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the duration of a user’s session — providing additional protection from emerging threats.....»»
Apple hit with $1.2B lawsuit after killing controversial CSAM-detecting tool
Apple knowingly ignoring child porn is a "never-ending nightmare," lawsuit says. Thousands of victims have sued Apple over its alleged failure to detect and report illegal child p.....»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
It’s finally time to stop ignoring Intel GPUs
Intel is releasing its second generation of discrete graphics cards next week. Here's why you should keep an eye on them......»»
Echoworx enhances secure access to encrypted messages
Echoworx announced the addition of 2-Step Verification (2SV) when using OAuth and Passkeys for authentication for encrypted messages. This latest enhancement offers organizations an additional layer of security, addressing the growing demand for iden.....»»
How to choose secure, verifiable technologies?
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
When rescue from modern slavery does not mean freedom: Research flags harsh reality of post-rescue life
People freed from modern slavery are often cast into years of bureaucratic wrangling and legal limbo or forced back into exploitative work, highlighting the need for anti-trafficking organizations to give greater focus to post-rescue support, new res.....»»
Social media platforms are throttling access to news—with far-reaching implications for democracy
Just days out from the United States presidential election last month, X (formerly Twitter) suddenly crippled the ability of many major media and political organizations to reach audiences on the social media platform......»»
Apple issues release candidates for iOS 18.2, iPadOS 18.2, macOS Sequoia 15.2
Apple is getting close to releasing its next OS updates, offering RC builds of iOS 18.2, iPadOS 18.2, macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, and tvOS 18.2 for testing.Examples of Apple Intelligence at work. The latest RC round arrives after.....»»
Google says AI weather model masters 15-day forecast
A new artificial intelligence-based weather model can deliver 15-day forecasts with unrivaled accuracy and speed, a Google lab said, with potentially life-saving applications as climate change ramps up......»»
Polarization photodetector that mimics desert ant offers pathway for more sensitive, miniaturized imaging systems
Polarization photodetectors (pol-PDs) have widespread applications in geological remote sensing, machine vision, and biological medicine. However, commercial pol-PDs usually require bulky and complicated optical components and are difficult to miniat.....»»
Could we use an asteroid to shield astronauts on their way to Mars?
Radiation is a primary concern for long-duration human spaceflight, such as the planned trips to Mars, which are the stated goal of organizations such as NASA and SpaceX. Shielding is the standard way to protect astronauts from radiation during those.....»»
You need an RTX 4090 to play Indiana Jones at max settings; AMD isn’t listed
The upcoming Indiana Jones and the Great Circle is releasing on December 9, but you'll need a specific GPU to play it at max settings......»»
Netography introduces AI-powered ransomware detection capabilities
Netography announced new ransomware detection capabilities that enable organizations to respond to malicious activity in real-time before it disrupts operations or threatens business continuity. These AI-powered enhancements enable Fusion customers t.....»»
Bitdefender GravityZone XDR enhancements protect business data stored in the cloud
Bitdefender announced enhancements to its GravityZone XDR platform with the addition of its new Business Applications sensor, designed to protect corporate data hosted and stored in cloud-based productivity and collaboration applications. The sensor.....»»
Mitel MiCollab zero-day and PoC exploit unveiled
A zero-day vulnerability in the Mitel MiCollab enterprise collaboration suite can be exploited to read files containing sensitive data, watchTowr researcher Sonny Macdonald has disclosed, and followed up by releasing a proof-of-concept (PoC) exploit.....»»
LogicGate helps organizations quantify the value of GRC programs
LogicGate introduced the Governance, Risk, and Compliance (GRC) Program Value Realization Tool, available to customers through the Risk Cloud platform. This new tool provides visibility into the financial value of GRC by automatically tracking key pr.....»»
New pathway found for regulating zinc in E. coli
Cornell researchers have discovered a pathway by which E. coli regulates all-important zinc levels, an insight that could advance the understanding of metal regulation in bacteria generally and lead to antibacterial applications such as in medical in.....»»
42Gears SureAccess secures organizations from unauthorized access
42Gears launched SureAccess, a Zero Trust Network Access (ZTNA) solution. This solution reinforces the company’s commitment to enterprise security by ensuring that only authenticated users and verified devices can access corporate resources fro.....»»