Author: nlqip

As part of the 2024 Women of the Channel, CRN is highlighting 100 women at solution provider organizations whose insight and influence in their respective companies help drive channel success. CRN’s Women of the Channel list is an annual honoring of the impressive accomplishments of women within the channel. The Solution Provider Power 100, which…

Read More

The attack on the Ascension health system shut down its electronic health records system and forced it to divert emergency care at some of its hospitals. Ascension has added more details to its online site about the recovery from the ransomware attack that impacted the health system, with information now shared on a state-by-state basis.…

Read More

Microsoft has announced significant improvements to its spam filtering capabilities within Outlook, aiming to reduce the amount of unwanted emails reaching users’ inboxes. These enhancements leverage artificial intelligence (AI) and machine learning to better identify and block spam messages, providing a cleaner and more productive email experience. Key Improvements Improved Phishing Protection: Outlook’s spam filter…

Read More

Beth sent more than $26,000 to a man she met on Tinder. It was a romance scam, but one that brought complex storytelling, nuanced psychology and even acting skills to bear in a way that shocked even us. Check out this week’s episode to hear just how “good” romance scammers can be. In this week’s…

Read More

Since June 2023, Microsoft has been tracking activity from multiple Chinese and North Korean nation-state groups. Our observations indicate that these threat actors are doubling down on familiar targets by using novel, more sophisticated influence techniques to achieve their goals. In China, cyber actors have broadly targeted entities across the South Pacific Islands, regional adversaries…

Read More

“As more and more apps are being offered to the public, there is a relative paucity of data on threats to those apps,” Shugrue said. “One of the goals of this report seeks to begin to remedy that situation.” The report also highlighted that gaming and financial services applications face the highest risk of attacks…

Read More

The finding from the Tenable 2024 Cloud Security Outlook study is a clear sign of the need for proactive and robust cloud security. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud infrastructure and the tools they use to measure…

Read More

May 14, 2024NewsroomNetwork Monitoring / Vulnerability The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security flaws, including two critical issues that could lead to the execution of arbitrary code. The most severe of the vulnerabilities are listed below – CVE-2024-25641 (CVSS score: 9.1) – An arbitrary file…

Read More

Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining initial access to their environments for follow-on exploitation. “The incident involves a threat actor overwhelming a user’s email with junk and calling the user, offering assistance,” Rapid7 researchers Tyler McGraw, Thomas Elkins, and Evan McCann…

Read More

May 14, 2024The Hacker NewsCyber Threat / Machine Learning Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication…

Read More