Tanium strengthens threat identification capabilities and enhances endpoint reach
Tanium released major enhancements to the Tanium Software Bill of Materials (SBOM) that now include Common Vulnerability and Exposures (CVE) information. Software supply chain attacks continue to spike due in part to the increasing reliance of organi.....»»
Small vessels underestimated as strike risk to migrating whales, finds study
A new study led by Griffith University researchers has found that current risk assessments of vessel strikes on large whales, such as migrating humpback whales, may be underestimating the threat of smaller vessels, particularly from recreational vess.....»»
Simple table salt enhances new adhesive polymer technology
Adhesives are everywhere, from the tape used in households to the bonding materials in vehicles and electronics. The search for stronger, more adaptable adhesives is ongoing and may come down to adding a dash of salt to two special polymer ingredient.....»»
Oscilar Cognitive Identity Intelligence Platform combats AI-powered fraud
Oscilar unveiled its Cognitive Identity Intelligence Platform to combat the rising tide of AI-powered fraud. The platform’s proprietary “Digital & Behavior Identification” technology transforms digital identity verification in an er.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
Bitsight acquires Cybersixgill to help organizations manage cyber exposure
Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack surface,.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
Android is getting call scam detection and real-time app threat alerts
Two new Android security features are now available for users in the U..S, and will soon make their way to older Android devices as well......»»
Water under Threat, Wooden Satellites and a Mud Bath for Baseballs
Droughts in 48 of 50 U.S. states, evidence of microplastics mucking up wastewater recycling and the science of a baseball mud bath in this week’s news roundup......»»
iOS 18.2’s Genmoji and Image Playground have three key guardrails you should know
The next wave of Apple Intelligence is almost here, bringing some of the most highly anticipated new capabilities. But two such features, Genmoji and Image Playground, come with some key guardrails in iOS 18.2 you should know about. more….....»»
VersaONE unifies security and networking into a single, centrally managed platform
Versa introduced the VersaONE Universal SASE Platform to enhance security and networking capabilities across WAN, LAN, data centers, and cloud. Powered by AI, VersaONE delivers converged SASE, SSE, SD-WAN, and SD-LAN products via a unified platform t.....»»
Deep learning streamlines identification of 2D materials
Researchers have developed a deep learning-based approach that significantly streamlines the accurate identification and classification of two-dimensional (2D) materials through Raman spectroscopy. In comparison, traditional Raman analysis methods ar.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
Researchers call for recognition of tire particles as a distinct environmental threat
A new study led by an international team of scientists highlights tire particles (TPs) as the leading contributor to microplastics and calls for urgent, targeted research to address their unique environmental and health risks......»»
Absolute Security releases Enterprise Edition
Absolute Security launched Enterprise Edition, combining the new Safe Connect for Secure Access and Comply Module for Secure Endpoint. With these innovations, Enterprise Edition is the comprehensive Security Service Edge (SSE) that can ensure only se.....»»
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the gl.....»»
Syteca Account Discovery strengthens privileged access management
Syteca launched Account Discovery, a new feature within its Privileged Access Management (PAM) solution. This enhancement enables organizations to automatically detect and manage privileged accounts across their IT infrastructure, significantly reduc.....»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
Stark warning on emissions as leaders split on climate goals at COP29
Global leaders offered competing views on how to tackle climate change at UN-led talks Wednesday as a new report warned the world must reach carbon neutrality much sooner than planned......»»