Reflection DDoS attacks are on the rise again
A specific DDoS operation known as a "reflection attack" is again finding widespread use by cyber-criminals, abusing unprotected Microsoft servers to overload targeted websites with traffic. Black Lotus Labs notes the culprit is the Microsoft variant.....»»
New insights into the evolution and paleoecology of mosasaurs
Mosasaurs are extinct marine lizards, spectacular examples of which were first discovered in 1766 near Maastricht in the Netherlands, fueling the rise of the field of vertebrate paleontology. Paleontologist Michael Polcyn presented the most comprehen.....»»
Image analysis highlights Aldabra Atoll"s remarkable shoreline resilience over 51 years
Despite sea level rise in the Western Indian Ocean, more than 60% of Aldabra Atoll's shoreline remained unchanged from 1960 to 2011, based on aerial and satellite image analysis. On average, the shoreline changed at a rate of 0.25 ± 0.36 meters per.....»»
27 DDoS-for hire platforms seized by law enforcement
As part of an ongoing international crackdown known as Operation PowerOFF, international law enforcement has seized over two dozen platforms used to carry out Distributed Denial-of-Service (DDoS) attacks. These “booter” (aka “stress.....»»
Microsoft enforces defenses preventing NTLM relay attacks
Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less secure and obsolete counterpart. Until NTLM gets disabled by default, Microsoft is working on shoring up defen.....»»
CyTwist’s detection engine combats AI-generated malware
CyTwist launches its patented detection engine to combat the insidious rise of AI-generated malware. Enhancing an organization’s existing security stack, CyTwist’s solution profiles threat actors using field-proven counterintelligence met.....»»
Trellix Drive Encryption enhances security against insider attacks
Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. Customers benefit from the flexibility needed for encryption protection deployment to safeguard their data and devices from unauthorized access. “The major.....»»
US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims were U.....»»
Avian flu cases are on the upswing at big dairy farms
Rise in cases amplifies concerns about consolidation in agriculture. A handful of dairy farms sprawl across the valley floor, ringed by the spikey, copper-colored San Jacinto moun.....»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
Microsoft: “Hack” this LLM-powered service and get paid
Microsoft, in collaboration with the Institute of Science and Technology Australia and ETH Zurich, has announced the LLMail-Inject Challenge, a competition to test and improve defenses against prompt injection attacks. The setup and the challenge LLM.....»»
Plans to stabilize Earth"s climate rely on emerging carbon removal technology—we need to get moving, say researchers
Global carbon emissions from fossil fuels continue to rise and 2024 is likely to be the world's hottest year on record......»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Teenagers leading new wave of cybercrime
Global data breaches show no signs of slowing down as this year has already exceeded 2023 in the number of data breaches and consumers impacted, according to Experian. Younger cybercriminals on the rise Today, the world of cyber hacking is not confin.....»»
Engineered enzymes may help plants adapt to higher temperatures
As global temperatures rise, it's imperative that plants can adapt to new and changing conditions. Michigan State University researchers from the Walker lab are looking at ways to give plants an assist. More specifically, their research aims to help.....»»
Coastal retreat in Alaska is accelerating because of compound climate impacts, researchers warn
The overlapping effects of sea level rise, permafrost thaw subsidence, and erosion may lead to land loss in Arctic coastal regions that dwarfs the land loss from any single one of these climate hazards, scientists say......»»
70% of open-source components are poorly or no longer maintained
The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, according to Lineaje. Open-source code risks rise with anonymous contributi.....»»
SafeLine: Open-source web application firewall (WAF)
SafeLine is an open-source and self-hosted Web Application Firewall (WAF) that protects websites from cyber attacks. “SafeLine WAF was created to protect web applications for small and medium-sized enterprises from cyber threats by monitoring a.....»»
Do you know what populism is? Research suggests most don"t, but some view it with disdain anyway
The rise of populism has received extensive academic and media attention. Research into the uses of "populism" in news media indicates that it predominantly has a disparaging connotation and is rampantly misused......»»
A survey of hundreds of vacationers confirms this ancient wisdom: The journey matters as much as the destination
Americans spent more than US$850 billion on domestic leisure travel in 2023, a sum that looks likely to rise in future years. Whether it's a weekend getaway to a Taylor Swift concert, a long-anticipated holiday visit with family, or a monthlong tour.....»»
N2WS platform enhancements improve restore time for enterprises and MSPs
N2WS has unveiled new enhancements to its cloud-native backup and disaster recovery (BDR) platform. These updates empower enterprises and managed service providers (MSPs) to address the growing threats of ransomware and other malicious attacks while.....»»