Stolen credentials are the most common attack vector companies face
60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), treading water (13%), or merely running to keep up (27%), according to a survey by.....»»
Professor sues Meta to allow release of feed-killing tool for Facebook
Section 230 immunity isn’t just for Big Tech companies, lawsuit says. Enlarge (credit: themotioncloud/Getty Images) Ethan Zuckerman wants to release a tool that would allow Facebook users to control what appears in the.....»»
Getting dirty to clean up the chemical industry"s environmental impact
The global chemical industry is a major fossil fuel consumer and climate change contributor; however, new Curtin University research has identified how the sector could clean up its green credentials by getting dirty......»»
AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization
AuditBoard announced powerful enhancements for its InfoSec Solutions to help organizations meet their IT compliance, cyber risk, and vendor risk management needs in the face of rising risks and increased regulatory requirements. With these new capabi.....»»
DeepMind adds a diffusion engine to latest protein-folding software
Major under-the-hood changes let AlphaFold handle protein-DNA complexes and more. Enlarge / Prediction of the structure of a coronavirus Spike protein from a virus that causes the common cold. (credit: Google DeepMind) M.....»»
Attackers may be using TunnelVision to snoop on users’ VPN traffic (CVE-2024-3661)
Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can be used to intercept and snoop on VPN users’ traffic by attackers who are on the same local network. .....»»
No one has seen the data behind Tyson’s “climate friendly beef” claim
Millions of taxpayer dollars flow to livestock companies raising "low carbon" beef. Enlarge / The Environmental Working Group published a new analysis on Wednesday outlining its efforts to push the USDA for more transparency, inc.....»»
Liongard unveils Managed Attack Surface Solution for SMBs, mid-market, and enterprise clients
Liongard unveils its latest innovation: the Managed Attack Surface Solution for SMBs, mid-market, and enterprise clients. This solution combines its ASM platform with the expertise of its extensive global managed IT service partner network, providing.....»»
U.S. “Know Your Customer” Proposal Will Put an End to Anonymous Cloud Users
Late January, the U.S. Department of Commerce published a notice of proposed rulemaking for establishing new requirements for Infrastructure as a Service providers (IaaS) . The proposal boils down to a 'Know Your Customer' regime for companies operat.....»»
Court Keeps DMCA Subpoena Shortcut Closed, Restricts Piracy Settlements
Earlier this year, a Hawaiian District Court blocked movie companies' efforts to unmask alleged BitTorrent pirates using a DMCA subpoena 'shortcut'. The filmmakers asked the court to reconsider its position but without success; the 'DMCA shortcut' wi.....»»
Newspapers Sue OpenAI for Copyright Infringement and ‘Fake News’ Hallucinations
Microsoft and OpenAI face yet another lawsuit for alleged copyright infringement. Eight newspapers, including the New York Daily News, Chicago Tribune and the Denver Post, accuse the companies of training ChatGPT models on their content without permi.....»»
Subscene’s Demise is No Surprise But Millions of App Users Face Disruption
After reporting that the site hasn't been financially viable for years, the operator of Subscene, one of the internet's most important subtitle sites, has pulled the plug. The plan had been known for some time and at least two, mostly complete backup.....»»
Why do metaphors of space help us understand time?
Expressions linking space to time are a common part of our day to day lives. You might say the morning "flew by," or that school exams are "fast approaching." Right now, you might say summer is "just around the corner," while anyone with the vaguest.....»»
What are nanoplastics? An engineer explains concerns about particles too small to see
It's become common to read that microplastics—little bits of plastic, smaller than a pencil eraser—are turning up everywhere and in everything, including the ocean, farmland, food and human bodies. Now a new term is gaining attention: nanoplastic.....»»
Researcher analyzes 3,356 signs to see how language use is changing in three Latino neighborhoods in Philly
Signs written in Spanish are becoming less common along North Philadelphia's Golden Block, or El Bloque de Oro—which runs along North Fifth Street from Lehigh Avenue to Allegheny Avenue and is considered the cultural center of the city's long-stand.....»»
Vectra AI Platform enhancements combat GenAI attacks
Vectra AI announced an expansion of the Vectra AI Platform to protect enterprises from new threat vectors introduced by the rapid adoption of GenAI tools. The Vectra AI Platform’s patented Attack Signal Intelligence uses behavior-based AI to de.....»»
Telcos keep using “insecure” Chinese gear because of congressional inaction
Congress only gave 38% of funds needed for "rip and replace," FCC chair says. Enlarge (credit: Getty Images | NurPhoto ) The US government has pressured telcos to rip out network gear made by Chinese companies Huawei and.....»»
Novel attack against virtually all VPN apps neuters their entire purpose
TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Enlarge (credit: Getty Images) Researchers have devised an attack against nearly all virtual private network applications that forc.....»»
Apple unveils new commemorative Pride wallpapers and Solo Loop watch band
Apple today announced its commemorative Pride Collection for 2024, featuring new wallpapers for iPhone and iPad, and a new watch face and matching band for the Apple Watch. The new Pride Edition Braided Solo Loop band will be available to order st.....»»
Strategies for preventing AI misuse in cybersecurity
As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing cybersecurity frameworks. In this Help Net Security interview, Pukar Hamal,.....»»
BlackBasta claims Synlab attack, leaks some stolen documents
The BlackBasta ransomware / cyber extortion gang is behind the recent cyber attack that resulted in the temporary shutdown of operations at Synlab Italia. The group claimed the attack on their leak site on Saturday and says they have exfiltrated appr.....»»