Category: AI in news

CRN Executive Editor Steve Burke spotlights All Solutions CEO Nalit Patel and the valuable life lesson that he has used to build a thriving solution provider business. When Nalit Patel was a young boy growing up in Nairobi, Kenya, his grandfather taught him and his father a valuable life lesson that he has used to…

Read More

Security leaders live under the constant pressure of evolving and scaling threats, technology trends, and business requirements. Many of us have had to play the rough catch-up game when we failed to ‘surf the wave’ of a movement and didn’t have quite the right skilled team ready. If it hasn’t happened to you yet, congratulations,…

Read More

The incident has badly affected two National Health Service (NHS) hospital trusts responsible for several of the capital’s busiest centers, including St Thomas’ Hospital, King’s College Hospital, Guy’s Hospital, Royal Brompton Hospital, and Evelina London Children’s Hospital. By June 4, the hospitals started cancelling transplant operations and described blood transfusions as “particularly affected” in an…

Read More

The cloud will become a cornerstone of enterprise operations as IDC estimates that by 2025, there will be over 750 million cloud-native applications globally. Additionally, over 90% of organizations anticipate employing a multi-cloud approach over the next few years. Considering the cloud offers unparalleled flexibility, scalability, and agility, these numbers should be unsurprising. However, the…

Read More

Pax8, GuidePoint Security, Zones, AWS, Oracle and Salesforce were among the tech companies making key executive hires and moves during May 2024. Pax8’s new CEO. A new CMO at GuidePoint Security. And Zones’ new chief commercial officer. Scott Chasin, formerly with ProtectWise; Rachel Haag, formerly of Workato; and Neal Campbell, formerly of CDW, were some…

Read More

Jun 05, 2024NewsroomCyber Espionage / Threat Intelligence An unnamed high-profile government organization in Southeast Asia emerged as the target of a “complex, long-running” Chinese state-sponsored cyber espionage operation codenamed Crimson Palace. “The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests,” Sophos researchers…

Read More

“The NtQuerySystemInformation function allows the caller to obtain information about the current system’s physical details such as the number of logical processors available,” Arctic Wolf said. “This information can be useful when determining how many threads the multi-threaded encryption routine should allocate.” Once critical system information is obtained, encryption is attempted. “Using the system information…

Read More

Online Privacy and Overfishing Microsoft recently caught state-backed hackers using its generative AI tools to help with their attacks. In the security community, the immediate questions weren’t about how hackers were using the tools (that was utterly predictable), but about how Microsoft figured it out. The natural conclusion was that Microsoft was spying on its…

Read More

Jun 05, 2024NewsroomVulnerability / Data Security Zyxel has released security updates to address critical flaws impacting two of its network-attached storage (NAS) devices that have currently reached end-of-life (EoL) status. Successful exploitation of three of the five vulnerabilities could permit an unauthenticated attacker to execute operating system (OS) commands and arbitrary code on affected installations.…

Read More

Jun 05, 2024NewsroomCyber Attack / Online Security Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of high-profile accounts on the platform. The development was first reported by Semafor and Forbes, which detailed a zero-click account takeover campaign that allows malware propagated via direct messages…

Read More