Month: August 2024
Aug 30, 2024Ravie LakshmananCryptocurrency / Malware Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to target developers with malware and steal cryptocurrency assets. The latest wave, which was observed between August 12 and 27, 2024, involved packages named…
Read MoreThe RansomHub ransomware gang is behind the recent cyberattack on oil and gas services giant Halliburton, which disrupted the company’s IT systems and business operations. The attack caused widespread disruption, and BleepingComputer was told that customers couldn’t generate invoices or purchase orders because the required systems were down. Halliburton disclosed the attack last Friday in…
Read MoreFrom a software perspective, Sovereign SASE supports the same features that are provided as part of Fortinet’s security service edge (SSE) offering, FortiSASE. The difference with Sovereign SASE is how SASE is deployed, Shah said. With Sovereign SASE, customers or partners (including managed security service providers) host the hardware based on Fortinet’s predefined hardware bundles,…
Read MoreThe integrated F5/Intel offering, which is available, will be particularly beneficial for edge applications, such as video analytics and IoT, where low latency and high performance are crucial, wrote Kunal Anand, chief technology officer with F5, in a blog about the technology. “F5 NGINX Plus works as a reverse proxy, offering traffic management and protection…
Read MoreThe exploration of a sale of cybersecurity firm Secureworks by majority owner Dell is reportedly underway. Dell Technologies is mulling the possibility of selling Secureworks to private equity investors, according to a report. According to a Reuters report Thursday, Dell—which is the majority owner of publicly traded Secureworks—has hired a pair of investment bankers as…
Read MoreOpenAI is reportedly courting Apple as an investor. OpenAI is reportedly courting Apple as an investor in a funding round that would take the ChatGPT creator and artificial intelligence innovator to a valuation of more than $100 billion. Apple rival Microsoft – which has invested about $13 billion into OpenAI, owns 49 percent of the…
Read MoreESET researchers discovered a code execution vulnerability in WPS Office for Windows (CVE-2024-7262), as it was being exploited by APT-C-60, a South Korea-aligned cyberespionage group. Upon analyzing the root cause, we subsequently discovered another way to exploit the faulty code (CVE-2924-7263). Following a coordinated disclosure process, both vulnerabilities are now patched – in this blogpost,…
Read MoreDespite the massively disruptive outage caused by a faulty CrowdStrike update in July, the cybersecurity vendor should continue to capture major growth opportunities over the longer term, an equity analyst tells investors. CrowdStrike’s stock price climbed Thursday following the release of quarterly results that beat expectations even in the wake of the massive IT outage…
Read More‘We did a higher percentage of the business through the channel in Q2 than we have during my tenure at any time,’ Citrix channel chief Ethan Fitzsimons tells CRN in an interview. Almost two years after Citrix was taken private and merged with enterprise software vendor Tibco, the virtualization and desktop delivery company is “more…
Read MoreVideo The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28 Aug 2024 Recently, ESET Researchers have discovered a crimeware campaign that targeted the clients of prominent Czech banks. The malware, named NGate by ESET, can relay data from victims’ stored payment cards via a…
Read MoreRecent Posts
- Safeguarding Healthcare Organizations from IoMT Risks
- Broadcom’s VMware Issues ‘Top of Mind’ For Partners, Nutanix Channel Chief Says
- Microsoft just killed the Windows 10 Beta Channel again
- Fraud network uses 4,700 fake shopping sites to steal credit cards
- CISA warns of more Palo Alto Networks bugs exploited in attacks