Author: nlqip

Many solution providers are already seeing a positive impact to their overall business from AI with more 10 percent of solution providers calling the impact “significant,” according to a study from IPED, the channel consulting arm of CRN parent The Channel Company. Many solution providers are already seeing a positive impact to their overall business…

Read More

The Centers for Medicare & Medicaid Services (CMS) federal agency announced earlier this month that health and personal information of more than three million health plan beneficiaries was exposed in the MOVEit attacks Cl0p ransomware conducted last year. The hackers stole the data after breaching the Wisconsin Physicians Service (WPS) health insurance corporation, which provided Medicare…

Read More

Chik, president of identity and network access at Microsoft, tells CRN that the tech giant’s Secure Future Initiative is succeeding at ‘strengthening’ Microsoft’s corporate security in the wake of major nation-state attacks in recent years. Microsoft’s massive engineering effort to lock down its internal corporate cybersecurity in the wake of major nation-state attacks is producing…

Read More

Infostealer malware developers released updates claiming to bypass Google Chrome’s recently introduced feature App-Bound Encryption to protect sensitive data such as cookies. App-Bound Encryption was introduced in Chrome 127 and is designed to encrypt cookies and stored passwords using a Windows service that runs with system privileges. This model does not allow infostealer malware, which runs with the…

Read More

In an email campaign targeting French users, researchers discovered malicious code believed to have been created with the help of generative artificial intelligence services to deliver the AsyncRAT malware. While cybercriminals have used generative AI technology to create convincing emails, government agencies have warned about the potential abuse of AI tools to creating malicious software, despite the safeguards…

Read More

From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. A rare glimpse into the most pressing threats America faces—and a compelling story about Director Easterly’s own…

Read More

‘Without data, the systems are useless. We see this much like what cloud was in the early eras, where cloud was a distinct silo, the on-premises world was a distinct silo, and you needed to bridge the two,’ says NetApp CEO George Kurian. At The Intersection Of Data And Intelligence While businesses have been digitizing…

Read More

CISA has tagged another critical Ivanti security vulnerability, which can let threat actors create rogue admin users on vulnerable Virtual Traffic Manager (vTM) appliances, as actively exploited in attacks. Tracked as CVE-2024-7593, this auth bypass flaw is caused by an incorrect implementation of an authentication algorithm that lets remote unauthenticated attackers circumvent authentication on Internet-exposed…

Read More

‘When we speak to our customers and partners, they are choosing Google Cloud as their strategic GenAI partner and platform for four distinct reasons,’ says Google Cloud CEO Thomas Kurian. Google Cloud CEO Thomas Kurian is bullish about his company’s new AI launches around Gemini, Google Workspace and cybersecurity today, as he says customers of…

Read More

Try Tenable Web App Scanning Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.…

Read More