Month: June 2024
Jun 10, 2024NewsroomPhishing Attack / Cybercrime Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, a technique originally detected more than two years ago. The attack, which was unsuccessful, targeted an unnamed company in the industrial services industry in May 2024, Canadian cybersecurity firm eSentire disclosed last…
Read MoreZero trust has transformed cybersecurity by eliminating reliance on traditional perimeter defenses, especially in an era of remote work, cloud services, and advanced cyber threats. Coined in 2009 by Forrester analyst John Kindervag, zero trust operates on the principle of “Never trust, always verify.” It emphasizes strict identity and access management, secure key management, and…
Read MoreTry Tenable Web App Scanning Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.…
Read MoreCisco Go-To-Market President Gary Steele On Splunk-Cisco Integration, This Week’s .Conf24 Event, And Building AI Into Observability
- by nlqip
Gary Steele, who serves as Splunk general manager in addition to his Cisco post, says in an interview with CRN that a major focus for him is not allowing the nitty-gritty of the ongoing Cisco-Splunk integration to disrupt Splunk’s track record of innovation. In mid-March Cisco Systems completed its $28 billion acquisition of Splunk in…
Read MoreCognizant CEO Says $1.3B Belcan Buy Will Help ‘Blue-Chip Clients’ And Create $800M In Sales
- by nlqip
‘Belcan’s deep engineering capabilities and domain expertise across the aerospace and defense market will be complemented by Cognizant’s scale and own multidecade digital engineering expertise, providing Belcan’s blue-chip client roster access to our advanced AI, cloud and data technologies,’ says Cognizant CEO Ravi Kumar. Solution provider powerhouse Cognizant is acquiring engineering services specialist Belcan for…
Read More10up–ElasticPress Cross-Site Request Forgery (CSRF) vulnerability in 10up ElasticPress.This issue affects ElasticPress: from n/a through 5.1.0. 2024-06-08 4.3 CVE-2024-35684audit@patchstack.com 10up–Restricted Site Access Authentication Bypass by Spoofing vulnerability in 10up Restricted Site Access allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Restricted Site Access: from n/a through 7.4.1. 2024-06-04 5.3 CVE-2023-48753audit@patchstack.com 10Web Form Builder…
Read MoreTerms of the acquisition deal for Lacework, which had once been valued at $8.3 billion, weren’t disclosed. Fortinet announced Monday it has reached an agreement to acquire cloud security firm Lacework in a significant consolidation deal for the cybersecurity industry. The terms of the deal, which is expected to be completed in the second half…
Read MorePrivacy authorities in Canada and the United Kingdom have launched a joint investigation to assess the scope of sensitive customer information exposed in last year’s 23andMe data breach. The Privacy Commissioner of Canada and The Information Commissioner’s Office (ICO) will also look into whether the company had adequate safeguards to secure customer data stored on…
Read MoreThe company has become one of the few pure-play cybersecurity vendors to join the benchmark index. CrowdStrike shares surged Monday after the cybersecurity giant was added to the S&P 500 index. As of this writing Monday morning, CrowdStrike’s stock price was up 8 percent to $376.96 a share. [Related: Analysis: CrowdStrike Strikes Back In Platform,…
Read MoreGoogle has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a coordinated influence operation connected to the People’s Republic of China (PRC). “The coordinated inauthentic network uploaded content in Chinese and English about China and U.S. foreign affairs,” Google Threat Analysis Group (TAG) researcher Billy Leonard said in…
Read MoreRecent Posts
- A Vulnerability in Apache Struts2 Could Allow for Remote Code Execution
- CISA Adds One Known Exploited Vulnerability to Catalog | CISA
- Xerox To Buy Lexmark For $1.5B In Blockbuster Print Deal
- Vulnerability Summary for the Week of December 16, 2024 | CISA
- Arm To Seek Retrial In Qualcomm Case After Mixed Verdict