Author: nlqip

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI Yet another SQUID acronym: SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how AI models analyze the genome. Compared with other analysis tools, SQUID is…

Read More

Russia’s telecommunications watchdog Roskomnadzor has restricted access to the Signal encrypted messaging service for what it describes as violations of Russian anti-terrorism and anti-extremism legislation. “User access to the messenger Signal is restricted due to violations of the requirements of the Russian legislation whose fulfillment is necessary to prevent the use of the messenger for…

Read More

Aug 09, 2024Ravie LakshmananVulnerability / Network Security Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). “This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise,…

Read More

​CSC ServiceWorks, a leading provider of commercial laundry services and air vending solutions, has disclosed a data breach after the personal information of an undisclosed number of individuals was exposed in a 2023 cyberattack. The company discovered the incident on February 4, 2024, after detecting unusual activity on its network. Subsequently, external cybersecurity experts hired…

Read More

Thousands of Cisco employees will be affected by a new layoff round, which could be announced next week, according to a Reuters report. Cisco will reportedly lay off around 4,000 employees in its second round of job cuts this year as the world’s largest networking company doubles down on artificial intelligence. According to a report…

Read More

AMD is warning about a high-severity CPU vulnerability named SinkClose that impacts multiple generations of its EPYC, Ryzen, and Threadripper processors. The vulnerability allows attackers with Kernel-level (Ring 0) privileges to gain Ring -2 privileges and install malware that becomes nearly undetectable. Ring -2 is one of the highest privilege levels on a computer, running…

Read More

​Microsoft has disclosed a high-severity zero-day vulnerability affecting Office 2016 and later, which is still waiting for a patch. Tracked as CVE-2024-38200, this security flaw is caused by an information disclosure weakness that enables unauthorized actors to access protected information such as system status or configuration data, personal info, or connection metadata. The zero-day impacts…

Read More

The top ten biggest Google Cloud news stories of 2024 include capturing a new cloud market share record, failure to acquire Wiz or HubSpot, cutting partner Workspace renewal margins and launching more AI innovation than ever before. From record profitability and rapid AI innovation to antitrust lawsuits and failed blockbuster acquisitions, Google Cloud has consistently…

Read More

For the week ending Aug. 9, CRN takes a look at the companies that brought their ‘A’ game to the channel including Abnormal Security, Fortinet, Avant, Rewst and Hewlett Packard Enterprise. The Week Ending Aug. 9 Topping this week’s Came to Win list is cybersecurity provider Abnormal Security for an impressive $250-million funding round that…

Read More

An ongoing and widespread malware campaign force-installed malicious Google Chrome and Microsoft Edge browser extensions in over 300,000 browsers, modifying the browser’s executables to hijack homepages and steal browsing history. The installer and extensions, which are usually undetected by antivirus tools, are designed to steal data and execute commands on infected devices. ReasonLabs researchers identified the campaign…

Read More