Month: June 2024

Tech Data CEO Rich Hume, who led the distributor through the pandemic and the acquisition of rival Synnex, will retire Sept. 1. TD Synnex COO Patrick Zammit will take over. TD Synnex CEO Rich Hume, who led the company through six transformative years of massive growth through acquisition as well as running one of the…

Read More

From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what cloud security posture management (CSPM) can do for their organizations and how to choose the right solution. Source link lol

Read More

Graham Cluley is an award-winning cybersecurity public speaker, podcaster, blogger, and analyst. He has been a well-known figure in the cybersecurity industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Since then he has been employed in senior roles by computer…

Read More

Jun 20, 2024NewsroomCyber Espionage / Hacking News State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities, the country’s information security agency ANSSI said in an advisory. The attacks have been attributed to a cluster tracked by Microsoft under the name Midnight Blizzard (formerly Nobelium), which overlaps…

Read More

Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple families of Intel Core desktop and mobile processors. Tracked as CVE-2024-0762 (CVSS score: 7.5), the “UEFIcanhazbufferoverflow” vulnerability has been described as a case of a buffer overflow stemming from the use…

Read More

CISA released three Industrial Control Systems (ICS) advisories on June 20, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations. Source link lol

Read More

CRN highlights 10 AI startups that are leading in LLMs, cybersecurity and enabling MSPs to drive AI customer wins. From the world’s leading large language model (LLM) providers and AI cybersecurity companies to AI startups targeting MSPs, there are 10 startups that stand out from the crowd in the ever-growing artificial intelligence market. Many AI…

Read More

Businesses’ use of numerous cloud services coupled with rapid software development and delivery practices is creating an explosion in potential attack surfaces — including myriad APIs, applications and data across multiple locations. Attackers are taking advantage, with eight out of the top 10 biggest data breaches in 2023 relating to applications and APIs running in…

Read More

“REPTILE appeared to be the rootkit of choice by UNC3886 as it was observed being deployed immediately after gaining access to compromised endpoints,” Mandiant added. “REPTILE is an open-source Linux rootkit, implemented as a loadable kernel module (LKM), that provides backdoor access to a system.” MEDUSA, too, is an open-source rootkit with capabilities of logging…

Read More

Recovering Public Keys from Signatures Interesting summary of various ways to derive the public key from digitally signed files. Normally, with a signature scheme, you have the public key and want to know whether a given signature is valid. But what if we instead have a message and a signature, assume the signature is valid,…

Read More