The triple threat of coronavirus
Immense research efforts are invested in figuring out how the virus manages to mount an effective invasion while throwing the immune system off course. A new study reveals a multipronged strategy that the virus employs to ensure its quick and efficie.....»»
Modeling study suggests heat-related deaths in Europe could triple by century"s end under current climate policies
Deaths from heat could triple in Europe by 2100 under current climate policies, mostly among people living in southern parts of the continent, according to a study published in The Lancet Public Health journal......»»
From embers to crisis: The expanding threat of wildfires under global warming
Globally, wildfires are on the rise, driven by climate change, which exacerbates droughts and high temperatures. These fires contribute significantly to carbon emissions and particulate matter (PM2.5), with severe consequences for both climate stabil.....»»
PostgreSQL databases under attack
Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»
OpenCTI: Open-source cyber threat intelligence platform
OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web appl.....»»
GuidePoint Security releases Phishing as a Service
GuidePoint Security has launched a new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for threat actors – according to CISA, over 90% of successful cyberattacks start with a phishing email. However, man.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
AI for application security: Balancing automation with human oversight
In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application security, exploring how it’s transforming threat detection and response. Wickert talks about integrating securi.....»»
Climate Change’s Latest Deadly Threat: Lightning Strikes
In rural India, stormy weather, a lack of knowledge, and scant protections are combining to kill thousands every year, with climate change likely to raise the threat as lightning becomes more common......»»
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Mana.....»»
This new threat proves that Macs aren’t immune from malware
The latest malware threat for Mac users targets popular browsers that you could be using this very instant. Which ones are affected?.....»»
During a heat wave, temperatures not the only threat: expert
Spain has just emerged from a 21-day heat wave that engulfed Madrid, Barcelona and Zaragoza, posing a health threat which extends far beyond the actual temperature, according to Julio Diaz, a researcher at Madrid's Carlos III Health Institute......»»
Here’s another look at Huawei’s futuristic folding phone
Another leaked photo of Huawei's unannounced triple-fold phone has emerged in the hands of CEO Richard Yu. Here's what it looks like......»»
Google’s threat team confirms Iran targeting Trump, Biden, and Harris campaigns
Another Big Tech firm seems to confirm Trump adviser Roger Stone was hacked. Enlarge / Roger Stone, former adviser to Donald Trump's presidential campaign, center, during the Republican National Convention (RNC) in Milwaukee on J.....»»
Teacup teaser: Yvonne Strahovski faces deadly threat in Peacock’s sci-fi horror series
Something terrifying is lurking in the new teaser for Teacup, Peacock's sci-fi horror series arriving this fall......»»
Breaking down online shopping"s silent threat
Breaking down online shopping"s silent threat.....»»
IntelOwl: Open-source threat intelligence management
IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I faced a.....»»
Current attacks, targets, and other threat landscape trends
In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. Whil.....»»
Slow Horses season 4 trailer: Jackson Lamb and Slough House tackle new threat
Jackson Lamb and his team of rejects are thrust into a new mission in the trailer for Apple TV+'s Slow Horses season 4......»»
"Killer robots" are becoming a real threat in Africa
The use of drones in the Sahel, a region of Africa that has been plagued by violence driven by jihadist insurgency for much of the past decade, has become a real problem. In April, for example, Al Qaeda's affiliate in the Sahel, Jama'at Nusrat al Isl.....»»
Are Taylor Swift concerts still safe after terrorist threat? Experts explain why stadiums can be "soft targets"
Authorities in Austria say they've subverted a planned terrorist attack targeting several of Taylor Swift's Eras Tour concerts in Vienna, shows that would have drawn as many as 200,000 concertgoers to three stadiums......»»