Sea snake attacks may be misdirected courtship behaviours
Attacks by venomous Olive sea snakes on scuba divers may be misdirected courtship behaviors, according to a study published in Scientific Reports......»»
Tor Project boosts Onion sites" defense against DoS attacks
Tor Project boosts Onion sites" defense against DoS attacks.....»»
Open redirect flaws increasingly exploited by phishers
Phishing attacks using open redirect flaws are on the rise again, according to Kroll’s Cyber Threat Intelligence (CTI) team, which means organizations should consider refreshing employees’ awareness and knowledge on how to spot them. Maliciou.....»»
Cybercriminals turn to AI to bypass modern email security measures
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Oster.....»»
Unintended consequences: Terror attacks cause long-term acceptance of targeted communities
Violent actions intended to provoke opposition to particular communities may paradoxically lead to lasting acceptance, according to a study. On March 15, 2019, a far-right extremist killed 51 Muslims in Christchurch, New Zealand. Immediately followin.....»»
Week in review: VPNs vulnerable to TunnelCrack attacks, Cybertech Africa 2023
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Deception technology and breach anticipation strategies In this Help Net Security interview, Xavier Bellekens, CEO of Lupovis, explains how the impl.....»»
A closer look at the new TSA oil and gas pipeline regulations
The TSA has announced updates to its Security Directive (SD) to strengthen the operational resilience of oil and natural gas pipeline owners and operators against cyber-attacks. In this Help Net Security video, Chris Warner, OT Senior Security Consul.....»»
New species of snake found in Peru named after Harrison Ford
Scientists working in Peru have named a new species of snake after Harrison Ford in honor of the "Indiana Jones" actor's support for conservation work......»»
Kubernetes clusters face widespread attacks across numerous organizations
In this Help Net Security video, Assaf Morag, Lead Threat Intelligence Analyst at Aqua Security, discusses research that discovered openly accessible and unprotected Kubernetes clusters belonging to more than 350 organizations, open-source projects,.....»»
Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks
Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, researchers have discovered. “Our attacks are not computationally expensive.....»»
After a string of shark attacks, here"s how officers at one New York beach use drones to keep swimmers safe
Warmer and cleaner waters off the coast of Long Island, New York, in recent years have brought growing numbers of bait fish to the area — and with them, the bigger fish that eat them, including sharks. In some ways, it's a good sign for the environ.....»»
Bear–human coexistence reconsidered
The media uproar over wolf attacks on livestock in Switzerland and a bear attack in Italy show how charged the issue of large carnivores and humans coexisting in Europe is. ETH Zurich researcher Paula Mayer has now created a participatory model to he.....»»
Product showcase: Free email security test by ImmuniWeb Community Edition
According to an FBI report, in 2022, global losses from business email compromise (BEC) and email account compromise (EAC) attacks attained $43 billion, hitting a historic anti-record. Multiple cybersecurity vendors, including Microsoft and Trend Mic.....»»
APTs use of lesser-known TTPs are no less of a headache
APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against small- and medium-sized businesses has increased significantly. Everyone i.....»»
Illinois just made it possible to sue people for doxxing attacks
States crack down on doxxing, but there's still no federal law. Enlarge (credit: gladder | iStock / Getty Images Plus) Last Friday, Illinois became one of the few states to pass an anti-doxxing law, making it possible fo.....»»
How to accelerate and access DDoS protection services using GRE
As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of total attac.....»»
TSMC US chip plant battle deteriorates, with American workers insulted in online attacks
The ongoing TSMC US chip plant battle continues to rage, over the company’s plans to bring in hundreds of Taiwanese workers to speed up construction. The plant is slated to make chips for older Apple devices. The latest development has seen a po.....»»
What do a jellyfish, a cat, a snake, and an astronaut have in common? Math.
Across the animal kingdom there are creatures that move through their environments not by walking or running or climbing but instead by simply changing the shape of their bodies. This kind of locomotion is found in snakes as they slither, in stingray.....»»
37% of third-party applications have high-risk permissions
Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, un.....»»
Dynatrace Security Analytics detects and blocks common application attacks
Dynatrace introduced Security Analytics, a new Dynatrace platform solution designed to help organizations better defend against threats to their hybrid and multicloud environments. Dynatrace Security Analytics leverages Davis AI, which combines predi.....»»
Downfall attacks can gather passwords, encryption keys from Intel processors
A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables attackers to access and steal sensitive data such as passwords, encryption k.....»»