Month: October 2024

Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to steal Windows credentials and data using malicious Remote Desktop Protocol connection files. APT29, also known as “Cozy Bear” and “Midnight Blizzard,” is a Russian state-sponsored cyber-espionage group linked to Russia’s Foreign Intelligence Service (SVR). Amazon clarifies that…

Read More

Tuan Tran is stepping down from his role as president of HP’s printing and imaging business to lead the PC and print giant’s cross-company AI strategy as the leader of a new organization. Taking over the printing business is 30-year HP veteran Anneliese Olson. HP Inc. has tapped the leader of its printing and imaging…

Read More

Gad Rosenthal Gad Rosenthal is a senior product manager at Tenable, where he leads the development of data security posture management (DSPM) capabilities. He joined Tenable after it acquired Eureka, a cloud data security company. Gad has also held cybersecurity roles at Microsoft, Siemplify (now part of Google), and Imperva, and has led cybersecurity and…

Read More

Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild. Background The Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager. Update October 23: The blog has been updated with new information about in-the-wild…

Read More

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Dive into…

Read More

In today’s digital landscape, organizations face an ever-increasing number of cyber threats. To combat these challenges effectively, many businesses are turning to cloud SIEM solutions. This comprehensive guide will explore what cloud-based SIEM solutions are, their benefits, key features, and how they can streamline your threat detection processes.   What are Cloud SIEM Solutions? Security…

Read More

‘Approximately 100 million individual notices have been sent regarding this breach,’ the U.S. Department of Health and Human Services says. UnitedHealth Group disclosed that data belonging to an estimated 100 million individuals was impacted in the widely felt breach of Change Healthcare earlier this year. The insurer had already said in June it believes sensitive…

Read More

Oct 25, 2024Ravie LakshmananVulnerability / Wi-Fi Security A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. “This…

Read More

ESET Research Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world 24 Oct 2024  •  , 1 min. read Some cybercriminal groups are sophisticated, create advanced schemes, cooperate with other attackers and do everything to stay under the radar. Then…

Read More

The cybersecurity powerhouse this week debuted its new cross-practice offering that seeks to help meet the massive need for securing the use of GenAI, Optiv’s Randy Lariar says. With the debut of its new AI Security Services offering this week, cybersecurity powerhouse Optiv is looking to help organizations adopt GenAI at a faster rate while…

Read More