TXOne Networks partners with AFRY to protect vulnerable OT environments
TXOne Networks and AFRY join forces in protecting the OT (Operational Technology) systems of their joint industrial clients in the Nordics against all kinds or cyber-attacks. The combination of TXOne Networks’ comprehensive solutions and servic.....»»
CUPS vulnerabilities could be abused for DDoS attacks
While the Common UNIX Printing System (CUPS) vulnerabilities recently disclosed by researcher Simone “evilsocket” Margaritelli are not easily exploited for remote command execution on vulnerable systems, they could offer more opportunity.....»»
Darktrace brings real-time cloud detection and response to Microsoft Azure customers
Darktrace announced the expansion of Darktrace / CLOUD to support Microsoft Azure environments. The AI-driven Cloud Detection and Response (CDR) system leverages Microsoft’s virtual network flow logs for agentless deployment, slashing deploymen.....»»
To really be greener, businesses need to look to the boardroom
Greenwashing scandals—the practice of misleading the public about what action a company or organization is taking to protect the environment—are on the rise. As the climate crisis intensifies, greenwashing represents a significant obstacle to mee.....»»
Early foster care gave poor women power, 17th-century records reveal
A rare collection of 300-year-old petitions gives voice to the forgotten women who cared for England's most vulnerable children while battling their local authorities......»»
Sidney Wolk, roadside assistance company founder who dreamed big, dies at 89
Sidney Wolk, who founded Cross Country Motor Club in 1972 and turned it into one of the country's largest networks of independent service providers, died at age 89......»»
Filament structure found to activate and regulate CRISPR-Cas "protein scissors"
CRISPR-Cas systems help to protect bacteria from viruses. Several different types of CRISPR-Cas defense systems are found in bacteria, which differ in their composition and functions. Among them, the most studied proteins today are Cas9 and Cas12, al.....»»
Ukraine Is Decentralizing Energy Production to Protect Itself From Russia
The Energy Act for Ukraine Foundation is equipping schools and hospitals with solar panels and energy storage systems to nullify Russian attacks on the country's power plants......»»
How higher-order interactions can remodel the landscape of complex systems
Networks, which include nodes and connections, can help researchers model dynamic systems like the spread of disease or how the brain processes information......»»
Ring Protect rebrands to Ring Home and adds 24/7 recording
Ring Protect is now Ring Home, and while its pricing structure is the same, it benefits from several cool new features -- including 24/7 recording......»»
Toxic chemicals from Ohio train derailment lingered in buildings for months
New study offers lessons on how to better protect communities from disasters. On February 3, 2023, a train carrying chemicals jumped the tracks in East Palestine, Ohio, rupturing.....»»
Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519)
Attackers are actively exploiting CVE-2024-45519, a critical Zimbra vulnerability that allows them to execute arbitrary commands on vulnerable installations. Proofpoint’s threat researchers say that the attacks started on September 28 – s.....»»
What bots mean for businesses and consumers
Simple bots have existed since the early to mid-2000s when organizations had no means to protect themselves or their website’s users from them. Yet today, despite having tools to protect against these simple bots, two in three organizations have ma.....»»
Research highlights global plant diversity "darkspots" where scientific efforts are urgently needed
An ambitious project led by scientists from the Royal Botanic Gardens, Kew, along with global partners, seeks to shed light on the planet's "plant diversity darkspots"—regions teeming with biodiversity but where geographic and taxonomic data remain.....»»
Snakes in the city: Ten years of wildlife rescues reveal insights into human-reptile interactions
A new analysis of a decade-long collection of wildlife rescue records in NSW has delivered new insights into how humans and reptiles interact in urban environments......»»
Toxic chemicals from Ohio train derailment lingered in buildings for months
New study offers lessons on how to better protect communities from disasters. Enlarge / This video screenshot released by the US National Transportation Safety Board (NTSB) shows the site of a derailed freight train in East Pale.....»»
Are plants and fungi trading carbon for nutrients? Not likely, say researchers
Every year, plants move 3.58 gigatons of carbon to mycorrhizal fungi, their underground partners—enough, in fact, that if it were ice, it would cover 112 million NHL hockey rinks. However, a dominant scientific theory explaining that huge transfer.....»»
Halcyon offers ransomware protection for Linux environments
As an integral part of the Halcyon Anti-Ransomware Platform, Halcyon Linux offers protection against ransomware attacks targeting Linux systems. While ransomware operators were once almost exclusively focused on targeting Windows environments, the in.....»»
Dragos acquires Network Perception to boost security in OT environments
Dragos announced the acquisition of Network Perception, makers of NP-View, a network visualization platform for OT networks. The acquisition will bolster the Dragos Platform with industry-leading OT network visibility along with compliance and segmen.....»»
Apono raises $15.5 million to accelerate product development
Apono announced the successful completion of its Series A funding round, raising $15.5 million. The funding round was led by New Era Capital Partners, with participation from Mindset Ventures, Redseed Ventures, Silvertech Ventures, initial seed inves.....»»
Infosec products of the month: September 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, anecdotes, ArmorCode, Binarly, Bitdefender, Druva, F5 Networks, Gcore, Guardsquare, Huntress, Ketch, LOKKER, Malwarebytes, NETGEAR, Nudge Securit.....»»