Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks
Peer Software announced the formation of a strategic alliance with Pulsar Security. Through the alliance, Peer Software will leverage Pulsar Security’s team of cyber security experts to continuously monitor and analyze emerging and evolving ransomw.....»»
Faulty Samsung update leaves owners of bricked Galaxy phones with few options
"I just really, really want my photos." Samsung issued a software update on October 2 that bricked some older Galaxy smartphones. While Samsung has stopped the update from rollin.....»»
macOS Sequoia 15.0.1 now available with important bug fixes
macOS 15.0.1 is now rolling out with some key bug fixes for Mac users. The update addresses problems in the Messages app as well as compatibility issues that had affected third-party security software. Head below for the full release notes. more.....»»
iOS 18.0.1 fixes security issues affecting iPhone microphone and Passwords app
In addition to a handful of notable bug fixes and performance improvements, today’s iOS 18.0.1 and iPadOS 18.0.1 updates also include a pair of important security fixes. Apple says that the updates include a fix for microphone access on the iPhone.....»»
New infosec products of the week: October 4, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and Legit Security. SAFE X equips CISOs with integrated data from all their existing cyber.....»»
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Me.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Chevy dealer recalls customer dinner he threw with Pete Rose
Pete Rose, who died Sept. 30, had dinner with customers of a Chevy dealership near Cincinnati as part of a 2010 campaign......»»
Apple has never had a bigger software year, here’s how it’s going
It has been an unprecedented year for Apple software. The company is supporting more platforms and devices than ever, and the number of new features shipped and soon-to-arrive is impressive. So how is all of that going? Here’s a report card-type lo.....»»
Aqara Smart Lock U300 is now available with Apple Home Key, Matter, and Thread support
has officially announced the release of its latest innovation in home security: the Smart Lock U300. This new smart lever lock is the third in Aqara’s lineup to support Apple Home Key. It also includes support for Thread and Matter, so it works pe.....»»
Camera Control video zoom isn’t usable yet, but I expect a software update to fix it
Back in February, I talked about the difficulty of smoothly zooming video footage using the on-screen controls, and said I’d really love a hardware control. The iPhone 16 looked like it might give me what I wanted, with the Camera Control video zoo.....»»
CUPS vulnerabilities could be abused for DDoS attacks
While the Common UNIX Printing System (CUPS) vulnerabilities recently disclosed by researcher Simone “evilsocket” Margaritelli are not easily exploited for remote command execution on vulnerable systems, they could offer more opportunity.....»»
Darktrace brings real-time cloud detection and response to Microsoft Azure customers
Darktrace announced the expansion of Darktrace / CLOUD to support Microsoft Azure environments. The AI-driven Cloud Detection and Response (CDR) system leverages Microsoft’s virtual network flow logs for agentless deployment, slashing deploymen.....»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Tesla reports fifth Cybertruck recall within a year of launch
The carmaker deployed a software remedy last month to fix an issue causing the truck’s backup camera display to be delayed when drivers shift into reverse, according to a recall report posted Thursday. .....»»
Manufacturers are lucrative targets for cybercriminals
Hackers and other bad actors believe manufacturers are behind on security measures and more likely to pay a ransom......»»
Thousands of Zimbra servers attacked following email account compromise
The attacks don't seem to be that effective right now, but a patch should still be installed......»»
AI-driven enterprise: empowering your business through innovation
AI-driven enterprise: empowering your business through innovation.....»»
Legit Posture Score empowers security teams to measure and manage their AppSec posture
Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security teams can proactively measure and manage their AppSec posture instantly with a holistic sco.....»»
Skiing calls on UN climate science to combat melting future
World skiing's governing body joined forces with the UN's weather agency on Thursday in a bid to feed its meteorological expertise into managing the "existential threat" to winter sports posed by climate change......»»
15% of office workers use unsanctioned GenAI tools
Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to s.....»»