Third-party vendors pose serious cybersecurity threat to national security
In this Help Net Security video, Paul Prudhomme, Principal Security Analyst at SecurityScorecard, discusses the findings of the 2024 Redefining Resilience: Concentrated Cyber Risk in a Global Economy Research report. This research details a surge in.....»»
![Google](https://www.google.com/images/poweredby_transparent/poweredby_FFFFFF.gif)
Ally dealer pass-through, SmartAuction programs boomed in 2023
Ally's pass-through and SmartAuction businesses together generated $161 million in revenue for the major national auto lender last year, and the company expects they'll improve this performance to an approximately $190 million combined in 2024, accor.....»»
Addressing LGBTQ+ disparities in STEM and higher education: Making the invisible visible
In May, the National Science Foundation announced plans to add questions about sexual orientation and gender identity to its Survey of Earned Doctorates, an annual exit survey of all individuals who will receive a research doctorate from U.S. institu.....»»
Snapchat is getting critical new security features. Here’s what’s new
Snapchat is finally adding some critical new security features that should help enhance safety for teens and general users. Here's what new......»»
Extreme wildfires are on the rise globally, powered by the climate crisis
Wildfires are the new "polar bear," routinely used by the media to epitomize the climate crisis and the threat of major natural hazards. This is despite most fire on Earth being harmless, even ecologically beneficial......»»
Multidrug-resistant fungi found in commercial soil, compost, flower bulbs
Named a critical public health threat by WHO, Aspergillus fumigatus is potentially deadly to immunocompromised.....»»
Researchers develop MoonIndex, open-source software that allows study of lunar surface
With MoonIndex, researchers from Constructor University and the National Institute of Astrophysics in Italy have developed an open-source software that for the first time gives scientists access to a free tool that creates science-ready products from.....»»
Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach
Ransomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the operations of 200+ Indonesian government agencies and public services. The attackers are asking for a $8 m.....»»
Marine cloud brightening models show unexpected consequences of geoengineering
A combined team of Earth scientists and climate specialists at the University of California San Diego and the National Center for Atmospheric Research has found via modeling that geoengineering projects such as marine cloud brightening can have unexp.....»»
Harvesting microbes for growth: A soybean success story in acidic soils
Acidic soils, characterized by low pH and poor phosphorus availability, pose significant challenges to leguminous plant growth and productivity. Traditional methods to improve soil phosphorus involve chemical fertilization, which can have environment.....»»
New security loophole allows spying on internet users’ online activity
Researchers at Graz University of Technology were able to spy on users’ online activities simply by monitoring fluctuations in the speed of their internet connection. This vulnerability, known as SnailLoad, does not require malicious code to ex.....»»
European airport pollution threatens health of 52 mn people: NGO
High concentrations of tiny particles released when aviation jet fuel is burnt pose a health risk to 52 million people living around Europe's busiest airports, NGO Transport & Environment warned Tuesday......»»
Guide to mitigating credential stuffing attacks
We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the news today, many statistics revolve around the number of detected breaches. Why are credentials so sought after? How can we com.....»»
Breaking down the numbers: Q2 2024 cybersecurity funding activity recap
We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea April | $20 million Alethea closed a $20 million Series B funding round led by GV, with participation from Ballistic.....»»
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative technologies behind Qualys CyberSecurity Asset Management 3.0. Can you explain the k.....»»
Zeek: Open-source network traffic analysis, security monitoring
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a hardware, software, virtual, or cloud platform. This flexibility allows Zeek to qu.....»»
First alternative app store support for iPad is in the second iPadOS 18 beta
Apple will be allowing third-party app marketplaces on the iPad in the European Union in iPadOS 18, with beta testers getting a chance to look at the feature in iPadOS 18 beta 2.The EU is treating the iPad as a gatekeeper platform under its Digital M.....»»
Open-source Rafel RAT steals info, locks Android devices, asks for ransom
The open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to lock them, encrypt their contents, and demand money to restore the device to its original state. Check Point researchers have.....»»
Researchers find unexpected excitations in a kagome layered material
Researchers from the U.S. Department of Energy Ames National Laboratory have discovered an unexpected chiral excitation in the kagome layered topological magnet TbMn6Sn6. This chiral excitation can be viewed as a localized magnetic swirl or vortex. T.....»»
Escalating global cyber threats require robust layered security measures
Escalating global cyber threats require robust layered security measures.....»»
1 out of 3 breaches go undetected
Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security tools were unable to detect breaches when they occur, according to Gigamon.....»»