Month: July 2024
Google has scrapped its plan to kill third-party cookies in Chrome and will instead introduce a new browser experience that allows users to limit how these cookies are used. A third-party cookie is data stored in your web browser by a website other than the website you are currently visiting and is usually dropped by…
Read MoreAs one partner tells CRN, the CrowdStrike update that led to a global IT outage was meant to protect against new hacker techniques—and wasn’t merely a new software feature update. While it may make little difference to the countless people impacted by the massive CrowdStrike-Microsoft outage that began Friday, it wasn’t merely a new software…
Read MoreThe Land Registry agency in Greece has announced that it suffered a limited-scope data breach following a wave of 400 cyberattacks targeting its IT infrastructure over the last week. The agency said hackers managed to compromise employee terminals and steal 1.2 GB of data, corresponding to roughly 0.0006% of the total data held by the…
Read MoreVictor Peng’s retirement was announced as AMD seeks to challenge Nvidia’s dominance in AI chips for data centers with an expanded road map of Instinct processors. AMD announced on Monday that President Victor Peng, who has been leading the chip designer’s company-wide AI strategy, will retire next month. Peng (pictured) joined AMD in 2022 when…
Read MoreIn today’s fast-paced organizations, end-users will sometimes try to take a shortcut. We’ve all been there — rushing to meet a deadline, juggling multiple tasks, or just trying to be helpful. But the reality is that letting even well-intentioned actions can come back to bite you. Picture this: an employee innocently lets a family member…
Read MoreDigital forensics plays a vital role in investigating a wide range of cybercrimes and cybersecurity incidents. This field involves uncovering, analyzing, and interpreting digital evidence to piece together the story behind various cybercrimes, data breaches, and even traditional crimes with digital elements. Digital forensics encompasses several stages, beginning with the collection of evidence from various…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-083 DATE(S) ISSUED: 07/22/2024 OVERVIEW: A vulnerability has been discovered in Cisco Secure Email Gateway that could allow for remote code execution. Cisco Secure Email Gateway is an email security product that uses signature analysis and machine learning to identify and block malicious emails before they reach recipients inboxes. Successful exploitation could…
Read MorePlay ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines. Cybersecurity company Trend Micro, whose analysts spotted the new ransomware variant, says the locker is designed to first check whether it’s running in an ESXi environment before executing and that it can evade detection on…
Read MoreUsing just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege. By granting permissions on a time-limited, as-needed basis only, just-in-time (JIT) controls are an important security mechanism for protecting access to cloud resources. JIT access is becoming a popular cloud security…
Read More‘We let down the very people we committed to protect,’ wrote Shawn Henry, longtime CSO at CrowdStrike, in a LinkedIn post. The massive global IT outage caused by a faulty CrowdStrike update has been a “gut punch” for the company, though it “pales in comparison” to what customers and partners have been going through, CrowdStrike…
Read MoreRecent Posts
- Hackers abuse Avast anti-rootkit driver to disable defenses
- Microsoft testing Windows 11 support for third-party passkeys
- Windows 11 24H2 update blocked on PCs with Assassin’s Creed, Star Wars Outlaws
- Windows 10 KB5046714 update fixes bug preventing app uninstalls
- Eight Key Takeaways From Kyndryl’s First Investor Day