Phishing attacks are getting more and more sophisticated
Callback attacks are confusing people into giving away their hard-earned money......»»
NASA lights "beacon" on moon with autonomous navigation system test
For 30 total minutes in February, NASA lit a beacon on the moon—successfully testing a sophisticated positioning system that will make it safer for Artemis-era explorers to visit and establish a permanent human presence on the lunar surface......»»
Rangers hunt endangered Indonesian tigers after deadly attacks
Indonesian rangers along with an animal whisperer are hunting multiple critically endangered Sumatran tigers after two villagers were recently killed in separate attacks that stoked local anger, officials said Thursday......»»
Stellar Cyber and Torq join forces to deliver automation-driven security operations platform
Stellar Cyber announced a technology partnership with Torq to help security teams dramatically improve their ability to combat advanced attacks. This partnership combines the power of Stellar Cyber Open XDR with Torq Hyperautomation, providing securi.....»»
Lidar sensors vulnerable to spoofing attacks, researchers say
Using a series of high-frequency laser pulses, researchers created a 10-square meter perception dead zone......»»
Thrive Incident Response & Remediation helps organizations contain and remove threats
Thrive launched Thrive Incident Response & Remediation, an on-demand cybersecurity response service to contain and remove threats, along with engineering assistance to rebuild and restore critical systems. Phishing, ransomware and other cyberattacks.....»»
Image-based phishing tactics evolve
While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of.....»»
Political rage on social media is making us cynical: Study
Political anger and cynicism are rising in the United States and in many democracies worldwide, and both are associated with exposure to political attacks on social media, a new University of Michigan study shows......»»
Email security trends in the energy and infrastructure sector
In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security da.....»»
Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What organizations need to know about the Digital Operational Resilience Act (DORA) In this Help Net Security interview, Kris Lovejoy, Global Securi.....»»
Microsoft says Kremlin-backed hackers accessed its source and internal systems
Midnight Blizzard is now using stolen secrets in follow-on attacks against customers. Enlarge (credit: Getty Images) Microsoft said that Kremlin-backed hackers stole its proprietary source code during a January breach of.....»»
Russia’s Starlink use sparks probe into SpaceX compliance with US sanctions
Despite US sanctions, Russia using Starlink "to coordinate attacks" in Ukraine. Enlarge / A Starlink terminal used by the Ukraine army for drone operations in May 2023. (credit: Getty Images | Pacific Press ) Democratic.....»»
Aroma compound found to reduce the effects of drought, improve productivity of tomato plants
Tomato plants emit a scent to resist bacterial attacks. This aroma—or volatile compound—is hexenyl butanoate (HB). A team from the Research Institute for Plant Molecular and Cellular Biology (IBMCP), a joint center of the Universitat Politècnica.....»»
Standing together against hate: A collective responsibility
Hate speech incidents are widespread in all areas of society and are often unchallenged by uninvolved bystanders. LMU researchers have investigated what significance the reactions of bystanders to verbal hate attacks have for the formation of social.....»»
Pentera Cloud empowers security teams to reduce exposure to cloud-native attacks
Pentera launched Pentera Cloud as part of its automated security validation platform to complement its renowned Pentera Core and Surface products. Pentera Cloud is the software product enabling on-demand security testing and resilience assessment of.....»»
Identity fraud is more sophisticated and widespread. Here"s how dealers can fight back
As cases of fraud rise, dealers are getting burned more often......»»
We know the Arctic is warming—what will changing river flows do to its environment?
Scientists at the University of Massachusetts Amherst recently combined satellite data, field observations, and sophisticated numerical modeling to paint a picture of how 22.45 million square kilometers of the Arctic will change over the next 80 year.....»»
Cloudflare announces Firewall for AI to help security teams secure their LLM applications
Cloudflare announced the development of Firewall for AI, a new layer of protection that will identify abuse and attacks before they reach and tamper with Large Language Models (LLMs), a type of AI application that interprets human language and other.....»»
Phishers target FCC, crypto holders via fake Okta SSO pages
A new phishing campaign is using fake Okta single sign-on (SSO) pages for the Federal Communications Commission (FCC) and for various cryptocurrency platforms to target users and employees, Lookout researchers have discovered. The phishing campaign B.....»»
Akamai App & API Protector enhancements detect and mitigate short DDoS attack bursts
Akamai announced significant additions to its flagship Akamai App & API Protector product, including advanced defenses against sophisticated application-layer distributed denial-of-service (DDoS) attacks. The enhanced Layer 7 DDoS protections now pre.....»»
95% believe LLMs making phishing detection more challenging
More than 95% of responding IT and security professionals believe social engineering attacks have become more sophisticated in the last year, according to LastPass. Recent AI advancements, particularly generative AI, have empowered cybercriminals to.....»»