Month: October 2024

In an interview with CRN, Rubrik CEO Bipul Sinha discusses data security in the GenAI era and why ‘nobody else from our space is even daring’ to go public. The well-known data security challenges posed by the arrival of generative AI have accelerated the already strong growth opportunities at Rubrik, which is positioned at the…

Read More

For the fifth year, we present CRN’s Next-Gen Solution Provider Leaders list, recognizing today’s up-and-coming solution provider executives, directors and managers who are poised to be tomorrow’s channel leaders. The IT industry thrives on innovation. Not just the technology itself, but how that IT is delivered to businesses to help them utilize it to its…

Read More

According to a New York Times report, hackers working for the Chinese government sought to access the devices through a previously reported compromise of Verizon. Hackers believed to be working on behalf of the Chinese government sought to access devices belonging to Donald Trump and JD Vance, in connection with a previously reported compromise of…

Read More

The Dutch National Police seized the network infrastructure for the Redline and Meta infostealer malware operations in “Operation Magnus,” warning cybercriminals that their data is now in the hands of the law enforcement. Operation Magnus was announced on a dedicated website that disclosed the disruption of the Redline and Meta operations, stating that legal actions based on the seized…

Read More

Oct 28, 2024Ravie LakshmananCyber Security / Hacking News Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your…

Read More

Oct 28, 2024The Hacker NewsOperational Technology / Cybersecurity Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types of security challenges. Ships come to shore every six months on average. Container cranes are mostly automated.…

Read More

Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. “The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials…

Read More

Security Information and Event Management (SIEM) systems play a crucial role in modern cybersecurity strategies. These powerful tools collect, analyze, and correlate data from various sources across an organization’s IT infrastructure to detect and respond to security threats. However, the effectiveness of a SIEM solution heavily depends on how well an organization manages and retains…

Read More

Oct 28, 2024Ravie LakshmananVulnerability / Windows Security A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks. “This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network…

Read More

Fog and Akira ransomware operators are increasingly breaching corporate networks through SonicWall VPN accounts, with the threat actors believed to be exploiting CVE-2024-40766, a critical SSL VPN access control flaw. SonicWall fixed the SonicOS flaw in late August 2024, and roughly a week later, it warned that it was already under active exploitation. At the…

Read More