TuxCare SecureChain for Java strengthens software supply chain security
TuxCare launched SecureChain for Java service to bolster software supply chain security via continuously secured and free repository service. With 76% of open source code used in the commercial code bases, threat groups see it as an ever-growing oppo.....»»
Aqara Smart Lock U300 is now available with Apple Home Key, Matter, and Thread support
has officially announced the release of its latest innovation in home security: the Smart Lock U300. This new smart lever lock is the third in Aqara’s lineup to support Apple Home Key. It also includes support for Thread and Matter, so it works pe.....»»
Camera Control video zoom isn’t usable yet, but I expect a software update to fix it
Back in February, I talked about the difficulty of smoothly zooming video footage using the on-screen controls, and said I’d really love a hardware control. The iPhone 16 looked like it might give me what I wanted, with the Camera Control video zoo.....»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Tesla reports fifth Cybertruck recall within a year of launch
The carmaker deployed a software remedy last month to fix an issue causing the truck’s backup camera display to be delayed when drivers shift into reverse, according to a recall report posted Thursday. .....»»
Manufacturers are lucrative targets for cybercriminals
Hackers and other bad actors believe manufacturers are behind on security measures and more likely to pay a ransom......»»
Legit Posture Score empowers security teams to measure and manage their AppSec posture
Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security teams can proactively measure and manage their AppSec posture instantly with a holistic sco.....»»
15% of office workers use unsanctioned GenAI tools
Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to s.....»»
Spotting AI-generated scams: Red flags to watch for
In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims an.....»»
Whitepaper: Reach higher in your career with cloud security
The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject matter expert on staff qualified to advise on cloud security requirements is more important now tha.....»»
Ransomware activity shows no signs of slowing down
Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024......»»
Hurricane Helene shuts down North Carolina facilities crucial for microchip production
Facilities in North Carolina operated by two companies that mine a crucial mineral needed for semiconductor production remain down because of the impacts of Hurricane Helene, raising worries about potential long-term effects on microchip supply......»»
Hurricane Helene Will Send Shockwaves Through the Semiconductor Industry
Downpours at Spruce Pine, North Carolina, have taken the biggest known deposit of high-purity quartz offline, leaving the global tech supply chain potentially starved of an ingredient vital for making microchips......»»
PlexTrac unveils new capabilities to prioritize proactive security remediation
PlexTrac announced significant enhancements to its platform. These updates are designed to help enterprises and security service providers harness proactive security by offering business context, automating risk scoring to focus on what matters most,.....»»
Venafi helps organizations solve more machine identity security problems
Venafi introduced new product capabilities in its Control Plane for Machine Identities. This latest version of the Venafi Control Plane will enable security and platform teams to address the most critical machine identity security challenges and help.....»»
Harmonic Security raises $17.5 million to improve data security for organizations
Harmonic Security has secured $17.5 million in Series A funding to bring its “zero-touch data protection” capabilities to enterprises. Total funding has now reached more than $26 million since the company launched in October last year with enterp.....»»
Helene takes ultrapure quartz mines offline, threatens tech supply chains
Spruce Pine, NC contains largest known deposit of high-purity quartz. Millions of people across the US South have gone without power or have been forced to evacuate following days.....»»
T-Mobile pays $16 million fine for three years’ worth of data breaches
Breaches in three consecutive years lead to $16M fine and new security protocols. T-Mobile has agreed to pay a $15.75 million fine and improve its security in a settlement over a.....»»
iOS 18.0.1 coming soon with iPhone and iPad bug fixes [Update]
Update October 2, 2024: The release of iOS 18.0.1 is imminent. The information was shared on social media by a private account with a strong track record. The account has previously shared details about upcoming iOS software updates on multiple diffe.....»»
Catalogic DPX 4.11 strengthens data security
Catalogic Software announced the newest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.11 provides enhanced capabilities in data recovery and data security. With this new release, Catalogic DPX continues to incre.....»»
SAFE X equips CISOs with integrated data from all their existing cybersecurity products
Safe Security launched SAFE X, a generative AI-powered mobile app for CISOs. SAFE X delivers CISOs real-time business impact insights into their cybersecurity posture, enabling better decision-making and risk prioritization. CISOs often invest millio.....»»