Category: Kamban

The Iranian state-sponsored hacking group APT34, aka OilRig, has recently escalated its activities with new campaigns targeting government and critical infrastructure entities in the United Arab Emirates and the Gulf region. In these attacks, spotted by Trend Micro researchers, OilRig deployed a novel backdoor, targeting Microsoft Exchange servers to steal credentials, and also exploited the Windows…

Read More

OpenAI has disrupted over 20 malicious cyber operations abusing its AI-powered chatbot, ChatGPT, for debugging and developing malware, spreading misinformation, evading detection, and conducting spear-phishing attacks. The report, which focuses on operations since the beginning of the year, constitutes the first official confirmation that generative mainstream AI tools are used to enhance offensive cyber operations.…

Read More

Microsoft has officially deprecated the Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) in future versions of Windows Server, recommending admins switch to different protocols that offer increased security. For over 20 years, the enterprise has used the PPTP and L2TP VPN protocols to provide remote access to corporate networks and Windows servers.…

Read More

‘Acquirers of businesses have changed their taste in what they’re looking for as things evolve. Strategic buyers who are really driving the consolidation, particularly in areas like cybersecurity, artificial intelligence and data analytics, are fueling this growth,’ says John Holland, managing director of Corporate Finance Associates. The rise of AI solutions and evolving cybersecurity threats…

Read More

CISA is warning that threat actors have been observed abusing unencrypted persistent F5 BIG-IP cookies to identify and target other internal devices on the targeted network. By mapping out internal devices, threat actors can potentially identify vulnerable devices on the network as part of the planning stages in cyberattacks. “CISA has observed cyber threat actors leveraging…

Read More

CISA is warning that threat actors have been observed abusing unencrypted persistent F5 BIG-IP cookies to identify and target other internal devices on the targeted network. By mapping out internal devices, threat actors can potentially identify vulnerable devices on the network as part of the planning stages in cyberattacks. “CISA has observed cyber threat actors leveraging…

Read More

For the week ending Oct. 11, CRN takes a look at the companies that brought their ‘A’ game to the channel including Presidio, AMD, Intel, Microsoft and the winners of the CRN 2024 Triple Crown Award. The Week Ending Oct. 11 Topping this week’s Came to Win list is solution provider Presidio for a strategic…

Read More

Casio now confirms it suffered a ransomware attack earlier this month, warning that the personal and confidential data of employees, job candidates, and some customers was also stolen. The attack was disclosed Monday when Casio warned that it was facing system disruption and service outages due to unauthorized access to its networks during the weekend.…

Read More

A new TD Synnex report illustrates how the technology landscape is shifting and ‘validates the need for partnership,’ says Calhoun McKinney, senior director of advanced solutions, go-to-market strategy and enablement, at the distributor’s Insipire 2024 conference. IT distribution giant TD Synnex Wednesday published a new report it said shows channel partners how the technology landscape…

Read More

Ukraine’s cyber police have arrested a 28-year-old man who operated a massive virtual private network (VPN) service, allowing people from within the country to access the Russian internet (Runet). Runet is the portion of the internet that includes Russian sites on the “.ru” and “.su” top-level domains, including government sites, social media platforms, search engines, and…

Read More