Demystifying SOC-as-a-Service (SOCaaS)

Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook breaches until ransomware attacks occur, this makes the threat actors’ job easy. … Continue reading Demystifying SOC-as-a-Service (SOCaaS)

Avocado robot swings from trees to gather canopy data

Swiss researchers are working on an environmental monitoring robot named Avocado that’s been inspired by abseiling spiders. The fruit-shaped bot uses a winch and rotors to lower itself through the canopy and gather data on life in the treetops.Continue… Continue reading Avocado robot swings from trees to gather canopy data

3 ways to combat rising OAuth SaaS attacks

OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam… Continue reading 3 ways to combat rising OAuth SaaS attacks

Helio smart ring designed to help support athletic performance

Budget smartwatch maker Amazfit has unveiled the Helio Ring, a smart wearable that’s designed to monitor the health metrics that athletes need to maximize performance.Continue ReadingCategory: Wearables, TechnologyTags: Health, Tracking, Monitoring, Sp… Continue reading Helio smart ring designed to help support athletic performance

Correct bad network behavior to bolster application experience

Legacy hardware-based applications existed happily in isolation, untethered from a network. The thing that really mattered was the speed of the hard drive and having enough memory. Today, even the software running from personal hard drives relies on ot… Continue reading Correct bad network behavior to bolster application experience

Wearable stethoscope can continuously monitor patients in real time

Whether you’ve booked a health check up or recovering from an illness, your medical professional will likely make use of a stethoscope to hear what’s going on inside the body. But doctors are busy people and can’t keep a constant ear on a patient’s che… Continue reading Wearable stethoscope can continuously monitor patients in real time

Smaller businesses embrace GenAI, overlook security measures

Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT decision makers, although 89% of organizations consider GenAI tools like ChatGPT … Continue reading Smaller businesses embrace GenAI, overlook security measures

Using real-time monitoring to identify and mitigate threats

From identifying unusual behavior patterns to detecting unauthorized access, real-time monitoring provides a view of your digital environment, ensuring that threats are spotted and dealt with before they can cause harm. In this Help Net Security video,… Continue reading Using real-time monitoring to identify and mitigate threats