USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
Commvault Cloud Rewind helps businesses bounce back from cyber incidents
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon to.....»»
BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities
BreachLock strengthens continuous threat exposure management (CTEM) capabilities for enterprise customers with its new Attack Surface Analytics feature. Time is of the essence when Fortune 500 security teams find themselves waking up to a Code Red vu.....»»
SpaceX’s Hera launch offers sublime view of Earth
A SpaceX rocket that launched a planetary defense mission on Monday captured a breathtaking view of Earth shortly after reaching orbit......»»
New infosec products of the week: October 4, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and Legit Security. SAFE X equips CISOs with integrated data from all their existing cyber.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Earth Defense Force 6 just removed its controversial requirement
Sci-fi shooter Earth Defense Force 6 just removed an account requirement on Steam that led players to review-bomb it at launch......»»
Spotting AI-generated scams: Red flags to watch for
In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims an.....»»
Filament structure found to activate and regulate CRISPR-Cas "protein scissors"
CRISPR-Cas systems help to protect bacteria from viruses. Several different types of CRISPR-Cas defense systems are found in bacteria, which differ in their composition and functions. Among them, the most studied proteins today are Cas9 and Cas12, al.....»»
Researchers determine how a protein contributes to human immune defense against RNA viruses
An international research team led by Prof. Dr. Janosch Hennig from the University of Bayreuth has discovered how the TRIM25 protein contributes to defense against RNA viruses whose genetic material is contained as ribonucleic acid (RNA)......»»
Catalogic DPX 4.11 strengthens data security
Catalogic Software announced the newest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.11 provides enhanced capabilities in data recovery and data security. With this new release, Catalogic DPX continues to incre.....»»
Veeam Recon Scanner identifies adversary tactics, techniques, and procedures
Veeam Software announced the addition of new Veeam Recon Scanner technology to Veeam Data Platform. This technology, developed by Coveware by Veeam, draws on years of experience in cyber-extortion incident response and the largest database of cyber i.....»»
Password management habits you should unlearn
Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a st.....»»
Cybersecurity teams struggling to keep up with growing threat levels
Cybersecurity teams report struggling with the pressures and stress of increased cyber attacks.....»»
QR Code phishing is advancing to a new level, so be on your guard
New phishing campaigns employ two QR codes - a 'clean' one, and a malicious one......»»
The most common authentication method is also the least secure
Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the ex.....»»
“Not a good look”: Google’s ad tech monopoly defense widely criticized
“Not a good look”: Google’s ad tech monopoly defense widely criticized.....»»
Active Directory compromise: Cybersecurity agencies provide guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Companies mentioned on the dark web at higher risk for cyber attacks
The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and breach correlation Marsh McLennan Cyber Risk Intelligence Center analyzed th.....»»
Active Directory compromise: Cybersecurity agencies provde guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Planetary defense research mission readies for asteroid visit
The European Space Agency is about to launch a spacecraft on an important research mission designed to bolster planetary defense......»»