Threat actors are experimenting with QR codes
Hackers are diversifying attack methods, including a surge in QR code phishing campaigns, according to HP. From February 2022, Microsoft began blocking macros in Office files by default, making it harder for attackers to run malicious code. Data coll.....»»
Threads testing new option to let users automatically archive old posts
Meta has been experimenting with a lot of new features for Threads, its microblogging platform. Now Instagram boss Adam Mosseri revealed on Wednesday that the platform has started testing an option that will let users automatically hide old posts fro.....»»
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco T.....»»
Hackers are using developing countries for ransomware practice
Businesses in Africa, Asia, and South America hit before moving on to Western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and Sout.....»»
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by au.....»»
Hackers are carrying out ransomware experiments in developing countries
Businesses in Africa, Asia, and South America hit before moving on to western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia and South.....»»
Secureworks enables users to view known vulnerabilities in the context of threat data
Secureworks announced the ability to integrate vulnerability risk context with threat detection to prevent attackers from exploiting known vulnerabilities and expedite response times, improving an organization’s security posture. The integration be.....»»
Judge deals blow to Stellantis in supplier pricing dispute that threatens production
The order filed Tuesday means that the parent company of Jeep and Ram brands must continue paying its supplier under protest — or “hostage threat,” as the automaker’s lawyer put it last week......»»
The relationship between cybersecurity and work tech innovation
As organizations navigate the complexities of hybrid work arrangements and the gradual return to the office, the cybersecurity threat landscape has become increasingly challenging, with issues such as the proliferation of personal devices, the expans.....»»
Netwrix 1Secure enhancements accelerate threat detection
Netwrix released a new version of its IT auditing software-as-a-service (SaaS) solution, Netwrix 1Secure. It enables prompt detection of suspicious activities around data across the Microsoft 365 environment, Entra ID (formerly Azure AD), as well as.....»»
Trellix Email Security for Microsoft Office 365 improves email defense
Trellix announced Trellix Email Security for Microsoft Office 365. Combining threat detection, threat intelligence, and security expertise, Trellix offers Microsoft Office 365 customers more cost-effective alternative to Microsoft Defender for Office.....»»
How to start the Automatron DLC in Fallout 4
A new robot threat has appeared in the commonwealth in Fallout 4's Automatron DLC. If you want to do your part, here's how you can begin the new questline......»»
MITRE breached by nation-state threat actor via Ivanti zero-days
MITRE has been breached by attackers via two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti’s Connect Secure VPN devices. The attackers have also managed to move laterally and compromise the company network’s VMware i.....»»
Green Roofs Are Great. Blue-Green Roofs Are Even Better
Amsterdam is experimenting with roofs that not only grow plants but capture water for a building’s residents. Welcome to the squeezable sponge city of tomorrow......»»
Europe suffered record number of "extreme heat stress" days in 2023: Monitors
Europe endured a record number of "extreme heat stress" days in 2023, two leading climate monitors said Monday, underscoring the threat of increasingly deadly summers across the continent......»»
Fuxnet malware: Growing threat to industrial sensors
In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability of sensor networks and the outsized impact these a.....»»
51% of enterprises experienced a breach despite large security stacks
Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according.....»»
Polystyrene microplastics shown to enhance invasion of exotic submerged macrophytes
Submerged macrophyte invasions and microplastic pollution are major challenges in the context of global change and pose a serious threat to aquatic environments. The presence of microplastics in aquatic ecosystems alters plant function, sediment micr.....»»
Analysis shows lone actors more likely to commit terrorist acts than US extremist groups
Extremist groups like the Ku Klux Klan and the Proud Boys have long been an ugly undercurrent of American culture. But despite these groups' hateful rhetoric, their ranks have largely refrained from committing violent acts over the past three decades.....»»
Gurucul federated search provides insights into data that is not centralized
Gurucul announced enhancements to its federated search capabilities. Gurucul federated search empowers users to run queries from a single console across any data source, including data lakes, cloud object storage, databases, identity systems, threat.....»»
Underestimating the dangers within: mitigating the insider cyber threat
Underestimating the dangers within: mitigating the insider cyber threat.....»»