PolarDNS: Open-source DNS server tailored for security evaluations
PolarDNS is a specialized authoritative DNS server that allows the operator to produce custom DNS responses suitable for DNS protocol testing purposes. What can you do with PolarDNS? PolarDNS can be used for testing of: DNS resolvers (server-side) DN.....»»
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the gl.....»»
Nirmata Control Hub automates security with policy-as-code
Nirmata launched Nirmata Control Hub, a comprehensive platform designed to prevent misconfigurations and automate security through policy-as-code. As Artificial Intelligence (AI) accelerates the adoption of Kubernetes and cloud-native technologies, e.....»»
Rakuten Viber unveils new security solutions for businesses
Rakuten Viber has launched new solutions to further protect communication on the platform. Businesses can now quickly authenticate users to enhance trust and reduce fraud, making interactions more secure. Verification messages provide a secure and se.....»»
CISOs in 2025: Balancing security, compliance, and accountability
In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily decision-making. He outlines the skill sets future CISOs need, their key priorit.....»»
Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)
November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited vulnerabilities.....»»
Spotify’s Car Thing, due for bricking, is getting an open source second life
It's more of a desktop thing now, but it has picked up some new features. Spotify has lost all enthusiasm for the little music devices it sold for just half a year. Firmware hacke.....»»
More evidence that Europe"s ancient landscapes were open woodlands: Study finds oak, hazel and yew were abundant
In 2023 a research group from Aarhus University in Denmark found that light woodland and open vegetation dominated Europe's temperate forests before Homo sapiens. In a new study, recently published in the Journal of Ecology, they take a closer look a.....»»
Carry-On trailer: Taron Egerton must save an airport from holiday destruction
In the new trailer for Netflix's Carry-On, Taron Egerton plays a TSA agent blackmailed into letting a mysterious package through security......»»
Four out of five people in Africa use wood for cooking. A transition would cut emissions and save lives
Four in every five people in Africa cook using wood, charcoal and other polluting fuels in open fires or inefficient stoves. This releases harmful pollutants and leads to respiratory illnesses and heart disease, particularly among children......»»
Young coral use metabolic tricks to resist bleaching, research reveals
Coral larvae reduce their metabolism and increase nitrogen uptake to resist bleaching at high temperatures, according to a study published November 12 in the open-access journal PLOS Biology by Ariana S. Huffmyer of the University of Washington, US,.....»»
Astronomers investigate long-term variability of blazar AO 0235+164
Astronomers have performed a comprehensive multiwavelength study of an extremely variable blazar known as AO 0235+164. Results of the new study, published Nov. 3 on the preprint server arXiv, shed more light on the long-term variability and behavior.....»»
A failed experiment and chance open up new paths to an established reaction for chemists
The original plan of the research groups of Dr. habil. Christian Hering-Junghans and Prof. Torsten Beweries at the Rostock LIKAT was to develop a phosphorus-based ligand. However, the syntheses led to a different substance than expected, namely a tri.....»»
Apple gearing up for ‘first foray into smart home camera market’
Apple is planning to launch a smart home security camera in 2026, a prominent figure with contacts in Apple’s supply chain claimed on Monday......»»
North Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat L.....»»
Apple releasing Vision Pro immersive music experience from The Weeknd this Thursday
Apple has another new piece of immersive video content coming soon to the Vision Pro. The company has released a teaser trailer for ‘Open Hearts,’ a new immersive music experience from The Weeknd that’s debuting exclusively on Vision Pro this T.....»»
iOS 18.1 added a new ‘Inactivity Reboot’ security feature for iPhone
Last week, a report from 404 Media highlighted concerns from law enforcement officials about iPhones rebooting automatically rebooting themselves. While law enforcement officials had erroneously speculated that iPhones were secretly communicating.....»»
iOS 18.2 beta 3 adds new ‘Require Screen On’ toggle for Camera Control
iOS 18.2 beta 3 adds another new toggle for personalizing the iPhone 16’s Camera Control. Now, you can open the Camera app with a single press of the Camera Control even if your display is off. more….....»»
Evaluating your organization’s application risk management journey
In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and robust s.....»»
The changing face of identity security
It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold o.....»»
Ambitious cybersecurity regulations leave companies in compliance chaos
While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also introduced a considerable set of challenges that organizations and their l.....»»