Security News > 2024 > April

Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- to mid-sized teams.

While every organization across every vertical is at risk of advanced email attacks, certain industries periodically become the go-to target for threat actors. In this Help Net Security video, Mick Leach, Field CISO at Abnormal Security, discusses why the automotive industry is the new most popular target for business email compromise and vendor email compromise attacks.

Any password under seven characters can be cracked within a matter of hours, according to Hive Systems. Due to the widespread use of stronger password hashing algorithms to protect data, the time it takes hackers to crack passwords has increased.

Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. Security analysts maintain that up to 57% of their daily tasks could be automated - while 76% of respondents think that AI technology will deliver faster threat detection and personal productivity gains.

Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in the cybersecurity...

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Discovered by Infoblox, the activity does not have a clear goal or motivation but demonstrates sophistication and advanced capabilities to manipulate global DNS systems. Muddling Meerkat manipulates DNS queries and responses by targeting the mechanism by which resolvers return the IP addresses.

The Federal Communications Commission has fined the largest U.S. wireless carriers almost $200 million for sharing their customers' real-time location data without their consent. The fines imposed on Monday include $12 million for Sprint and $80 million for T-Mobile, more than $57 million for AT&T, and an almost $47 million fine for Verizon.

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.