Security Flaws in Internet-Connected Hot Tubs Exposed Owners" Personal Data
A security researcher found vulnerabilities in Jacuzzi's SmartTub interface that allowed access to the personal data of every hot tub owner. From a report: Jacuzzi's SmartTub feature, like most Internet of Things (IoT) systems, lets users connect to.....»»
Warming Arctic reduces dust levels in parts of the planet, study finds
Climate change is a global phenomenon, but its impacts are felt at a very local level. Take, for example, dust. Dust can have a huge impact on local air quality, food security, energy supply and public health. Yet, little is known about how global cl.....»»
VinFast founder commits $1 billion as EV maker bleeds cash
Vietnamese billionaire Pham Nhat Vuong pledged to invest at least another $1 billion of his personal wealth into VinFast Auto Ltd., providing the capital needed for expansion of the struggling electric vehicle maker......»»
Sublime Security secures $20 million to strengthen cloud email security and visibility
Sublime Security has raised $20 million in Series A funding, led by Index Ventures with participation from previous investors Decibel Partners and Slow Ventures. Cybersecurity visionary and Crowdstrike Co-founder & former CTO Dmitri Alperovitch is al.....»»
ESET integrates with Arctic Wolf to provide greater security visibility
ESET has unveiled a new integration with Arctic Wolf, to ensure increased visibility and protection against modern threats. By integrating ESET Inspect into Arctic Wolf’s Security Operations Platform, Arctic Wolf customers are able to enhance t.....»»
WhyLabs AI Control Center offers teams real-time control over their AI applications
WhyLabs launched a new type of AI operations platform: the AI Control Center. The new platform, which offers teams real-time control over their AI applications, was developed by WhyLabs in response to rising security and reliability threats posed by.....»»
Dropzone AI raises $16.85 million to combat advanced AI attacks
Dropzone AI has raised $16.85 million in Series A funding. Theory Ventures led the round, adding to their cohort of existing investors Decibel Partners, Pioneer Square Ventures, and In-Q-Tel (IQT). Carta CISO Garrett Held, Head of Security at Postman.....»»
Edgio Client-Side Protection enables organizations to secure critical customer data
Edgio released its Client-Side Protection solution. Designed to monitor scripts and APIs on the browser-side to prevent malicious code from exfiltrating sensitive customer data, Edgio Client-Side Protection allows teams to gain full visibility on cli.....»»
Nagomi Security raises $30 million to help security teams improve their level of protection
Nagomi Security emerged from stealth with $30 million in funding to fundamentally redefine how security teams optimize effectiveness and drive efficiency from their existing security tools. The company operated in stealth mode with Seed funding from.....»»
Fireblocks expands DeFi suite with threat detection features
Fireblocks introduced new security features to its DeFi suite: dApp Protection and Transaction Simulation. As the DeFi sector experiences unprecedented growth, the need for proactive security measures has never been more critical. With attackers taki.....»»
AuditBoard AI automates important tasks for security teams
AuditBoard announced that its powerful artificial intelligence capabilities are now generally available. As part of the company’s innovative and award-winning connected risk platform, AuditBoard AI incorporates generative AI, and other private.....»»
Dropbox announces a number of security and data protection features
Dropbox announced new security, organization, and sharing features to give teams the control, flexibility, and speed to get work done from anywhere. In the modern workplace, teams are spread across locations, time zones, and even different companies,.....»»
Anatomy IT’s new Security Suite targets healthcare cybersecurity threats, improves incident response
Anatomy IT has announced the launch of an expanded end-to-end cybersecurity product suite designed to safeguard healthcare delivery organizations from evolving and growing IT system threats. A record 133 million individuals were affected by healthcar.....»»
56% of cyber insurance claims originate in the email inbox
56% of all 2023 claims were a result of funds transfer fraud (FTF) or business email compromise (BEC), highlighting the importance of email security as a critical aspect of cyber risk management, according to Coalition. The 2024 Cyber Claims Report i.....»»
CISOs are nervous Gen AI use could lead to more security breaches
Malicious Gen AI use is on top of everyone's mind, as hackers create convincing phishing emails......»»
Applying DevSecOps principles to machine learning workloads
Protecting data and other enterprise assets is an increasingly challenging task, and one that touches nearly every corner of an organization. As the complexity of digital systems grows, the challenges mount. One method that helps reign in the chaos i.....»»
73% of SME security pros missed or ignored critical alerts
Small and medium-sized enterprises (SMEs) IT staff is overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss critical severity events and weaken their company’s security posture, according.....»»
25 cybersecurity AI stats you should know
In this article, you will find excerpts from reports we recently covered, which offer stats and insights into the challenges and cybersecurity issues arising from the expansion of AI. Security pros are cautiously optimistic about AI Cloud Security Al.....»»
Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the.....»»
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco T.....»»
NASA"s Chandra releases timelapse movies of Crab Nebula and Cassiopeia A
New movies of two of the most famous objects in the sky—the Crab Nebula and Cassiopeia A—are being released from NASA's Chandra X-ray Observatory. Each includes X-ray data collected by Chandra over about two decades. They show dramatic changes in.....»»