Month: May 2024

F5 has fixed two high-severity BIG-IP Next Central Manager vulnerabilities, which can be exploited to gain admin control and create hidden rogue accounts on any managed assets. Next Central Manager allows administrators to control on-premises or cloud BIG-IP Next instances and services via a unified management user interface. The flaws are an SQL injection vulnerability…

Read More

“Among other things, traffic should be appropriately encrypted prior to even entering a VPN. All technology has vulnerabilities. The mere fact that a tool has a particular vulnerability doesn’t mean it can’t be helpful in a robust defense in depth strategy.” Noah Beddome, Leviathan’s CISO in residence, said that CISOs need to remember the origin…

Read More

‘Money is moving away from commodity and old tech to advanced cloud technologies and platforms and generative AI. In fact, I’m talking to many companies now that are pulling money from their R&D budget to put it into the GenAI line item so they can get this going. Think about this: 80 percent of the…

Read More

Image: Midjourney The FBI warned retail companies in the United States that a financially motivated hacking group has been targeting employees in their gift card departments in phishing attacks since at least January 2024. Tracked as Storm-0539, this hacking group targets the personal and work mobile devices of retail department staff using a sophisticated phishing…

Read More

‘ServiceNow and Microsoft are integrating Now Assist and Copilot, bringing the power of two generative AI systems into one seamless experience. This has been made possible by merging the intelligence of Now Assist, the ServiceNow generative AI-powered workflows, with Microsoft Copilot, creating a more holistic, connected experience that allows employees to get the help they…

Read More

“Training techniques that once ran in the hundreds of millions of dollars are now being replicated for a few thousand,” Red Hat CEO Matt Hicks said. Open-source technology has helped academic researchers in artificial intelligence introduce their work to the world faster and will continue to assist in bringing AI to the masses, Red Hat…

Read More

Image: Keeper of the Plains in Wichita (Sepavone) The LockBit ransomware gang has claimed responsibility for a disruptive cyberattack on the City of Wichita, which has forced the City’s authorities to shut down IT systems used for online bill payment, including court fines, water bills, and public transportation. Wichita, Kansas, is the largest city in the state, with a population of…

Read More

Once seen as a viable competitor to Nvidia, Graphcore’s business suffered in 2022 from deteriorating macroeconomic conditions that slowed down sales of systems outfitted with its IPUs, and now it’s reportedly in talks to sell itself to Japanese investment giant SoftBank. Japanese investment giant SoftBank Group is reportedly in advanced talks to acquire Graphcore, a…

Read More

Microsoft has confirmed that last month’s Windows Server security updates may also cause domain controller reboots after the Local Security Authority Subsystem Service (LSASS) process crashes. LSASS is a Windows service that handles security policies, user logins, access token creation, and password changes. The list of impacted Windows versions and buggy security updates includes Windows…

Read More

Alongside a number of major product launches, vendors have announced funding and acquisitions — and signed a new CISA-backed security pledge — during the massive security conference in San Francisco this week. In and around the RSA Conference in San Francisco this week, the majority of the biggest names in the cybersecurity industry have had…

Read More