Raven: Open-source CI/CD pipeline security scanner
Raven (Risk Analysis and Vulnerability Enumeration for CI/CD) is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities woven throughout the pipeline that, when viewed collectively.....»»
Moxie robot may be saved by a last-minute open-sourcing effort
Owners of Embodied's doomed Moxie robot may get a reprieve from the shutdown, thanks to an eleventh-hour open-source attempt to keep the robot running.Moxie the robot - Image credit: EmbodiedEarly in December, it was reported that Embodied, the compa.....»»
Startup set to brick $800 kids robot is trying to open source it first
Most owners still won't be refunded for the emotional support toy. Earlier this month, startup Embodied announced that it is going out of business and taking its Moxie robot with.....»»
Dripstones from Romanian cave offer insights into climate dynamics in Europe
Investigations into precipitation patterns in eastern Central Europe since the end of the last ice age, conducted by an international research team led by Dr. Sophie Warken of Heidelberg University, have shown that dynamic processes in atmospheric ci.....»»
New infosec products of the week: December 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
A new, uncensored AI video model may spark a new AI hobbyist movement
Will Tencent's "open source" HunyuanVideo launch an at-home "Stable Diffusion" moment for uncensored AI video? The AI-generated video scene has been hopping this year (or twirling.....»»
Harmful gas billowing from Texas and New Mexico comes mostly from smaller leaks, researchers say
The blob on the satellite image is a rainbow of colors. An analyst digitally sharpens it and there, highlighted in red, is the source: a concrete oil pad spewing methane......»»
Astronomers detect new 1.9-second pulsar using FAST
Using the Five-hundred-meter Aperture Spherical radio Telescope (FAST) in China, astronomers have discovered a new pulsar with a spin period of about two seconds. The newly detected pulsar, designated PSR J1922+37, was found in the direction of open.....»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Are threat feeds masking your biggest security blind spot?
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»
Enpass simplifies compliance and security controls for password management
Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further enhancing.....»»
Netwrix 1Secure enhances protection against data and identity access risks
Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome the la.....»»
Apple says EU interoperability laws pose severe privacy risks
Apple has published a white paper that backs the European Union's policy of interoperability between rival technology firms, but says the law is open to risky interpretation.EU asks Apple to open up iPhone to competitorsIn a similar move to its March.....»»
Apple collaborates with NVIDIA to research faster LLM performance
In a blog post today, Apple engineers have shared new details on a collaboration with NVIDIA to implement faster text generation performance with large language models. Apple published and open sourced its Recurrent Drafter (ReDrafter) technique.....»»
Thousands of SonicWall VPN devices are facing worrying security threats
Many SonicWall VPNs are running outdated and vulnerable software versions......»»
A critical security flaw in Apache Struts is under attack, so patch now
Criminals are apparently using already available Proof-of-concept to attack Apache Struts......»»
US may ban the most popular home router over Chinese security fears
The Chinese-made TP-Link router used by Amazon, hundreds of ISPs, and 65% of the US market, is facing an investigation that could see it banned by the government.A TP-Link routerUnspecified sources say that the Commerce Department under President Bid.....»»