The next cyber threat may come from within
71% of business executives worry about accidental internal staff error as one of the top threats facing their companies, almost on par with concern about outside attackers (75%), according to EisnerAmper. An additional 23% said they worry about malic.....»»
apexanalytix Cyber Risk provides instant alerts for supplier data breaches
apexanalytix launched Cyber Risk, a solution that automatically assesses the cybersecurity posture of every supplier, continuously monitors the dark web to uncover risk exposure and responds to threats impacting suppliers in real-time. Business partn.....»»
Lack of skills and budget slow zero-trust implementation
The risk of a cyber breach is the number one global driver for zero trust strategy implementation, according to Entrust. The 2024 State of Zero Trust & Encryption Study surveyed over 4,000 IT security practitioners worldwide. The survey shows that pe.....»»
Researchers develop new method to assess equity implications of carbon taxes
Researchers from the University of Massachusetts Amherst and Smith College have developed a new method to assess the equity implications of carbon taxes, which are among economists' favored solutions to address the looming threat of climate change......»»
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span
An unknown threat actor with equally unknown motives forces ISP to replace routers. Enlarge (credit: Getty Images) One day last October, subscribers to an ISP known as Windstream began flooding message boards with report.....»»
The threat posed by climate change: Study shows among over-40-year-olds, parents worry just as much as non-parents
Future generations will suffer increasingly more from the consequences of climate change than we do today. Presumably, older people with children will be more worried about climate change than those of the same age without children, as they will also.....»»
Moonstone Sleet: A new North Korean threat actor
Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to further goals of the North Korean regime. “Moonstone Sleet uses tactics, techniques, an.....»»
Avoiding the cybersecurity blame game
Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and controls, and fully implemented monitoring and review requirements. Processes and c.....»»
Key factors that orchestrate mysterious synchronized coral spawning revealed
Corals play an essential role in ocean ecosystems, and like many organisms, they are under threat from climate change and other human activities. To better protect coral, it's first necessary to understand them, in particular their reproductive life.....»»
Cybersecurity teams gear up for tougher challenges in 2024
In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored.....»»
Why are grocery bills so high? A new study looks at the science behind food price reporting
Rising food costs are squeezing Canadians around the country. Nearly everyone is feeling the pinch, and it's not just an inconvenience—high food prices are a major threat to food security for many Canadians. Understanding why food prices are so hig.....»»
Human error still perceived as the Achilles’ heel of cybersecurity
While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint. CISOs’ confidence i.....»»
The hornet has landed: Scientists combat new honeybee killer in US
Researchers are working to limit the threat while developing better eradication methods. Enlarge / 2023 marked the first sighting of a yellow-legged hornet in the United States, sparking fears that it may spread and devastate hon.....»»
TORRAS COOLiFY Cyber offers ultimate personal cooling to beat the summer heat
When it's hot and you need to cool down the TORRAS COOLiFY Cyber will help you with ice cold personal AC and localized cooling. Check it out!.....»»
The Artificial Intelligence Era Faces a Threat from Directed Energy Weapons
Autonomous and AI-enabled systems increasingly rely on optical and radio frequency sensors and significant computer power. They face growing vulnerabilities from directed-energy laser and microwave weapons.....»»
US retailers under attack by gift card-thieving cyber gang
Earlier this month, the FBI published a private industry notification about Storm-0539 (aka Atlas Lion), a Morocco-based cyber criminal group that specializes in compromising retailers and creating fraudulent gift cards. Microsoft then went more in-d.....»»
Illumio and Netskope join forces to strengthen enterprise resilience against cyberattacks
Illumio and Netskope announced a Zero Trust partnership that brings together the power of Zero Trust Segmentation (ZTS) and Zero Trust Network Access (ZTNA) to protect against breaches and build cyber resilience. The new partnership combines Illumio.....»»
New infosec products of the week: May 24, 2024
Here’s a look at the most interesting products from the past week, featuring releases from CyberArk, OneTrust, PlexTrac, and Strike Graph. CyberArk CORA AI accelerates identity threat detection CyberArk announced CyberArk CORA AI, a new set of AI-p.....»»
Worried about job security, cyber teams hide security incidents
The frequency and severity of cyberattacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, and new sophisticated attack methods, companies are more susceptible than e.....»»
Compromised courtroom recording software was served from vendor’s official site
Courtroom recording software JAVS Viewer has been saddled with loader malware and has been served from the developer’s site since at least April 2, a threat researcher has warned last month. After analyzing a flagged installer detected in a cus.....»»
Machine identities lack essential security controls, pose major threat
Siloed approaches to securing human and machine identities are driving identity-based attacks across enterprises and their ecosystems, according to CyberArk. The CyberArk 2024 Identity Security Threat Landscape Report was conducted across private and.....»»