Month: July 2024

Google has scrapped its plan to kill third-party cookies in Chrome and will instead introduce a new browser experience that allows users to limit how these cookies are used. A third-party cookie is data stored in your web browser by a website other than the website you are currently visiting and is usually dropped by…

Read More

As one partner tells CRN, the CrowdStrike update that led to a global IT outage was meant to protect against new hacker techniques—and wasn’t merely a new software feature update. While it may make little difference to the countless people impacted by the massive CrowdStrike-Microsoft outage that began Friday, it wasn’t merely a new software…

Read More

The Land Registry agency in Greece has announced that it suffered a limited-scope data breach following a wave of 400 cyberattacks targeting its IT infrastructure over the last week. The agency said hackers managed to compromise employee terminals and steal 1.2 GB of data, corresponding to roughly 0.0006% of the total data held by the…

Read More

Victor Peng’s retirement was announced as AMD seeks to challenge Nvidia’s dominance in AI chips for data centers with an expanded road map of Instinct processors. AMD announced on Monday that President Victor Peng, who has been leading the chip designer’s company-wide AI strategy, will retire next month. Peng (pictured) joined AMD in 2022 when…

Read More

In today’s fast-paced organizations, end-users will sometimes try to take a shortcut. We’ve all been there — rushing to meet a deadline, juggling multiple tasks, or just trying to be helpful. But the reality is that letting even well-intentioned actions can come back to bite you. Picture this: an employee innocently lets a family member…

Read More

Digital forensics plays a vital role in investigating a wide range of cybercrimes and cybersecurity incidents. This field involves uncovering, analyzing, and interpreting digital evidence to piece together the story behind various cybercrimes, data breaches, and even traditional crimes with digital elements. Digital forensics encompasses several stages, beginning with the collection of evidence from various…

Read More

MS-ISAC ADVISORY NUMBER: 2024-083 DATE(S) ISSUED: 07/22/2024 OVERVIEW: A vulnerability has been discovered in Cisco Secure Email Gateway that could allow for remote code execution. Cisco Secure Email Gateway is an email security product that uses signature analysis and machine learning to identify and block malicious emails before they reach recipients inboxes. Successful exploitation could…

Read More

Play ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines. Cybersecurity company Trend Micro, whose analysts spotted the new ransomware variant, says the locker is designed to first check whether it’s running in an ESXi environment before executing and that it can evade detection on…

Read More

Using just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege. By granting permissions on a time-limited, as-needed basis only, just-in-time (JIT) controls are an important security mechanism for protecting access to cloud resources. JIT access is becoming a popular cloud security…

Read More

‘We let down the very people we committed to protect,’ wrote Shawn Henry, longtime CSO at CrowdStrike, in a LinkedIn post. The massive global IT outage caused by a faulty CrowdStrike update has been a “gut punch” for the company, though it “pales in comparison” to what customers and partners have been going through, CrowdStrike…

Read More