Volkswagen Says a Vendor"s Security Lapse Exposed 3.3 Million Drivers" Details
Volkswagen says more than 3.3 million customers had their information exposed after one of its vendors left a cache of customer data unsecured on the internet. From a report: The car maker said in a letter that the vendor, used by Volkswagen, its sub.....»»
North Korea is evading sanctions by animating Max and Amazon shows
Thousands of exposed files on North Korean server tell the tale. Enlarge (credit: Aurich Lawson / Getty) For almost a decade, Nick Roy has been scanning North Korea’s tiny Internet presence, spotting new websites comin.....»»
Daily Telescope: The ambiguously galactic duo
Hubble continues to deliver the goods. Enlarge / This image from the NASA/ESA Hubble Space Telescope features NGC 3783, a bright barred spiral galaxy about 130 million light-years from Earth. (credit: ESA/Hubble & NASA, M. C. Ben.....»»
Trellix Email Security for Microsoft Office 365 improves email defense
Trellix announced Trellix Email Security for Microsoft Office 365. Combining threat detection, threat intelligence, and security expertise, Trellix offers Microsoft Office 365 customers more cost-effective alternative to Microsoft Defender for Office.....»»
iPhone isn"t secure enough for the South Korea military - but Android is
An iPhone ban in the South Korean military that has less to do with security and more to do with a poorly crafted mobile device management suite coupled with nationalism may be expanding to the rank-and-file.iPhone 15 Pro Max and iPhone 14 Pro MaxThe.....»»
Behavioral patterns of ransomware groups are changing
Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS groups attempt to recruit disaffected or displaced affiliates In addition to revealing a nearly 20% yea.....»»
What is multi-factor authentication (MFA), and why is it important?
Setting up MFA can seem daunting for consumers just beginning to clean up their security postures. In this Help Net Security video, Larry Kinkaid, Manager, Cybersecurity Consulting at BARR Advisory, shares tips for consumers who need simple, accessib.....»»
People doubt their own ability to spot AI-generated deepfakes
23% of Americans said they recently came across a political deepfake they later discovered to be fake, according to McAfee. The actual number of people exposed to political and other deepfakes is expected to be much higher given many Americans are no.....»»
The rising influence of AI on the 2024 US election
We stand at a crossroads for election misinformation: on one side our election apparatus has reached a higher level of security and is better defended from malicious attackers than ever before. On the other side, the rise of artificial intelligence (.....»»
What"s next after UAW"s historic win at VW Chattanooga plant
After two close defeats, Volkswagen workers in Chattanooga overwhelmingly voted to join the UAW. Here's what you need to know......»»
High-speed imaging and AI help us understand how insect wings work
Too many muscles working too fast had made understanding insect flight challenging. Enlarge / A time-lapse showing how an insect's wing adopts very specific positions during flight. (credit: Florian Muijres, Dickinson Lab).....»»
Discover if your data have been leaked with Proton Mail"s new tool
Proton Mail's Dark Web Monitoring identifies and alerts you if your credentials appear in a breach. Here's what this means for your communications security......»»
A critical security flaw could affect thousands of WordPress sites
Forminator can be used to upload malware to the site, Japan's researchers say......»»
Trend Micro launches AI-driven cyber risk management capabilities
Trend Micro unveiled AI-driven cyber risk management capabilities across its entire flagship platform, Trend Vision One. This seamlessly integrates more than 10 industry technology categories into one offering, empowering security, cloud and IT opera.....»»
Binary Defense enhances BDVision to improve security for SMBs
Binary Defense announced several important updates to BDVision, the company’s real-time detection and containment Managed Endpoint Detection & Response (mEDR) solution. These critical updates – which include new deception technology, artificial i.....»»
Researchers uncover details of how bacteria build protective barriers, may inform new antibiotics
Yale researchers have uncovered new details on how bacteria like E. coli build their protective barriers, which will inform new antibiotic development......»»
The first steps of establishing your cloud security strategy
In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so by discussing the cloud security impact of individual, concrete actions featured within the CIS Critical Security Controls (CIS C.....»»
How to improve response to emerging cybersecurity threats
Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos fea.....»»
Fuxnet malware: Growing threat to industrial sensors
In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability of sensor networks and the outsized impact these a.....»»
Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity
Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise and understand console behavior in their environment. “Infrastructure.....»»
How to optimize your bug bounty programs
In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying security vulnerabilities and facilitating collaboration with researchers. He off.....»»