Sea snake attacks may be misdirected courtship behaviours
Attacks by venomous Olive sea snakes on scuba divers may be misdirected courtship behaviors, according to a study published in Scientific Reports......»»
Is your browser betraying you? Emerging threats in 2023
Network attacks (IPS detections) have remained relatively flat over the last three quarters, technically down a bit more than 3%, according to WatchGuard. “Organisations need to pay more active, ongoing attention to the existing security solutions.....»»
Fileless attacks increase 1,400%
Aggregated honeypot data, over a six-month period, showed that more than 50% of the attacks focused on defense evasion, according to Aqua Security. Threat actors avoid detection These attacks included masquerading techniques, such as files executed f.....»»
The rise in cyber extortion attacks and its impact on business security
In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached the highest vo.....»»
FBI finally tracks “swatting” incidents as attacks increase nationwide
Experts aren't sure the database will reverse troubling swatting trend. Enlarge (credit: Roberto Machado Noa / Contributor | LightRocket) Last month, the FBI created a national online database to finally start coordinati.....»»
Perception Point introduces AI model to detect and prevent BEC attacks
Perception Point reveals its latest detection innovation, developed to counter the emergent wave of AI-generated email threats. The AI-powered technology leverages Large Language Models (LLMs) and Deep Learning architecture to effectively detect and.....»»
Global rise in DDoS attacks threatens digital infrastructure
In 2022, the total number of DDoS attacks worldwide increased by 115.1% over the amount observed in 2021, according to Nexusguard. The data also showed that cyber attackers continued to alter their threat vectors by targeting the application platform.....»»
Cynerio expands the use of generative AI across the 360 platform
Cynerio has unveiled the further integration of generative AI into its existing offerings. “It is clear that the healthcare industry will continue to face increasing cyber attacks,” said Leon Lerman, CEO of Cynerio. “With 89% of hos.....»»
Widespread BEC attacks threaten European organizations
European organizations experienced a greater volume and frequency of BEC attacks over the last year, as compared to organizations in the United States, according to Abnormal Security. BEC attacks volume and frequency The data is based on an analysis.....»»
How hardening Microsoft 365 tenants mitigates potential cloud attacks
Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to mention the deployment of measurable controls to defend.....»»
Diablo 4 and other Blizzard games DDoS attacks "have ended", says Blizzard
Diablo 4 and other Blizzard games DDoS attacks "have ended", says Blizzard.....»»
Week in review: Microsoft confirms DDoS attacks on M365 and Azure Portal, Infosecurity Europe 2023
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unraveling the multifaceted threats facing telecom companies In this Help Net Security interview, Georgia Bafoutsou, Cybersecurity Officer at the Eu.....»»
Wallarm API Abuse Prevention protects organizations against bot-based attacks
Wallarm announced its API Abuse Prevention feature to address one of the most critical API threats: bot-based attacks. Wallarm can now accurately identify and mitigate API bot activity, protecting systems against API abuse, account takeover (ATO), an.....»»
Tanium strengthens threat identification capabilities and enhances endpoint reach
Tanium released major enhancements to the Tanium Software Bill of Materials (SBOM) that now include Common Vulnerability and Exposures (CVE) information. Software supply chain attacks continue to spike due in part to the increasing reliance of organi.....»»
Security investments that help companies navigate the macroeconomic climate
As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must immediately enact cybersecurity solutions that are right for them. Every enter.....»»
Why is it so rare to hear about Western cyber-attacks?
Could a cyber-attack on a Russian technology company provide a rare insight into a Western hack?.....»»
Study shows people condemn hate speech more severely than nonverbal discrimination
Verbal attacks against marginalized groups can do serious harm to the victims. Yet many instances of hate speech are never reported or prosecuted. "We see it in sports, on the street, in schools and in our parliaments," says Jimena Zapata of LMU's Ch.....»»
Unraveling the multifaceted threats facing telecom companies
In today’s interconnected world, telecom companies serve as gateways, connecting individuals, businesses, and governments. However, this role also makes them prime targets for cyberattacks. From DDoS attacks to sophisticated spyware infiltratio.....»»
There"s a new gen AI tool to help workers spot malicious emails
Purge BEC attacks and phishing emails from your workplace with Themis Co-pilot for Microsoft Outlook......»»
Snake genome reveals burrowing past and re-adaptation to surface life
Chromosome-level assembly of 14 snakes in a study led by the Chinese Academy of Sciences, China, has created a high-resolution genomic reference for the study of snake evolution. In a paper, "Large-scale snake genome analyses provide insights into ve.....»»
Austrian regions allow controversial wolf hunting
Several regions of Austria have allowed the controversial killing of wolves after reporting an increase in livestock attacks, sparking debate in the Alpine EU member......»»