Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks
Peer Software announced the formation of a strategic alliance with Pulsar Security. Through the alliance, Peer Software will leverage Pulsar Security’s team of cyber security experts to continuously monitor and analyze emerging and evolving ransomw.....»»
Apple has never had a bigger software year, here’s how it’s going
It has been an unprecedented year for Apple software. The company is supporting more platforms and devices than ever, and the number of new features shipped and soon-to-arrive is impressive. So how is all of that going? Here’s a report card-type lo.....»»
Aqara Smart Lock U300 is now available with Apple Home Key, Matter, and Thread support
has officially announced the release of its latest innovation in home security: the Smart Lock U300. This new smart lever lock is the third in Aqara’s lineup to support Apple Home Key. It also includes support for Thread and Matter, so it works pe.....»»
Camera Control video zoom isn’t usable yet, but I expect a software update to fix it
Back in February, I talked about the difficulty of smoothly zooming video footage using the on-screen controls, and said I’d really love a hardware control. The iPhone 16 looked like it might give me what I wanted, with the Camera Control video zoo.....»»
CUPS vulnerabilities could be abused for DDoS attacks
While the Common UNIX Printing System (CUPS) vulnerabilities recently disclosed by researcher Simone “evilsocket” Margaritelli are not easily exploited for remote command execution on vulnerable systems, they could offer more opportunity.....»»
Darktrace brings real-time cloud detection and response to Microsoft Azure customers
Darktrace announced the expansion of Darktrace / CLOUD to support Microsoft Azure environments. The AI-driven Cloud Detection and Response (CDR) system leverages Microsoft’s virtual network flow logs for agentless deployment, slashing deploymen.....»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Tesla reports fifth Cybertruck recall within a year of launch
The carmaker deployed a software remedy last month to fix an issue causing the truck’s backup camera display to be delayed when drivers shift into reverse, according to a recall report posted Thursday. .....»»
Manufacturers are lucrative targets for cybercriminals
Hackers and other bad actors believe manufacturers are behind on security measures and more likely to pay a ransom......»»
Thousands of Zimbra servers attacked following email account compromise
The attacks don't seem to be that effective right now, but a patch should still be installed......»»
AI-driven enterprise: empowering your business through innovation
AI-driven enterprise: empowering your business through innovation.....»»
Legit Posture Score empowers security teams to measure and manage their AppSec posture
Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security teams can proactively measure and manage their AppSec posture instantly with a holistic sco.....»»
Skiing calls on UN climate science to combat melting future
World skiing's governing body joined forces with the UN's weather agency on Thursday in a bid to feed its meteorological expertise into managing the "existential threat" to winter sports posed by climate change......»»
15% of office workers use unsanctioned GenAI tools
Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to s.....»»
Spotting AI-generated scams: Red flags to watch for
In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims an.....»»
Whitepaper: Reach higher in your career with cloud security
The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject matter expert on staff qualified to advise on cloud security requirements is more important now tha.....»»
Ransomware activity shows no signs of slowing down
Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024......»»
Attackers exploit critical Zimbra vulnerability using cc’d email addresses
When successful, attacks install a backdoor. Getting it to work reliably is another matter. Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimb.....»»
Do customers perceive AI-written communications as less authentic?
From Nike and Google to Coca-Cola and McDonald's, major brands are incorporating artificial intelligence (AI) into their advertising campaigns. But how do consumers feel about robots generating emotionally charged marketing content? That's the questi.....»»
Ukraine Is Decentralizing Energy Production to Protect Itself From Russia
The Energy Act for Ukraine Foundation is equipping schools and hospitals with solar panels and energy storage systems to nullify Russian attacks on the country's power plants......»»
PlexTrac unveils new capabilities to prioritize proactive security remediation
PlexTrac announced significant enhancements to its platform. These updates are designed to help enterprises and security service providers harness proactive security by offering business context, automating risk scoring to focus on what matters most,.....»»