Category: Viral

In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This blog highlights the who and the how of pig butchering scams, and details the pig butchering playbook. Background Pig butchering…

Read More

Frequently asked questions about two vulnerabilities affecting ConnectWise ScreenConnect Update February 23: The blog has been updated to include information about ransomware attacks involving vulnerable ScreenConnect servers. View Change Log Background The Tenable Security Response Team has put together this blog to answer Frequently Asked Questions (FAQ) regarding two vulnerabilities impacting ScreenConnect, a Remote Monitoring…

Read More

Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution. Update March 7: The blog has been updated to include information in-the-wild exploitation of CVE-2024-27198. View Change Log Background On March 4, JetBrains published a blog post regarding two security issues affecting TeamCity…

Read More

Microsoft addresses 59 CVEs in its March 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities. Microsoft patched 59 CVEs in its March 2024 Patch Tuesday release, with 2 rated critical and 57 rated as important. Elevation of privilege (EoP) vulnerabilities accounted for 40.7% of the vulnerabilities patched this month, followed by Remote…

Read More

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software. Update March 21: The Analysis section has been updated to include confirmation by Fortinet that in-the-wild exploitation of this flaw has been observed. View Change Log Background On March 12, Fortinet published an…

Read More

‘We’re not trying to do everything and be a jack of all trades. There’s so much growth and so much opportunity with ServiceNow now. And even in the past few years, when I wasn’t fully focused on ServiceNow, I lived in that world. Literally, I found that I kept turning my clients to ServiceNow,’ Astrica…

Read More

Frequently asked questions about CVE-2024-3094, a supply-chain attack responsible for a backdoor in XZ Utils, a widely used library found in multiple Linux distributions. Update April 1: The “What Linux distributions are affected?” section has been updated to include additional affected and not affected distributions. In addition, updates to the “Has Tenable released any product…

Read More

Part 2 of CRN’s Big Data 100 takes a look at the vendors solution providers should know in the database systems space. Running The Bases By 2025 the total amount of digital data generated, gathered, copied and consumed is expected to be in the range of 175 to 180 zettabytes. And more of that data…

Read More

“I don’t think you could point to another large technology company that’s ever done something like this: 60 percent margin. And that’s not ‘up to’ 60 percent, but actually 60 percent,” Google’s Kevin Ichhpurani tells CRN. Google Cloud is taking channel margins to new heights as Kevin Ichhpurani tells CRN that Google partners who win…

Read More

‘Our network was built for AI. … As we are deploying 5G right now with the mobile edge compute and AI, this is a great long-term opportunity for us using AI. [There are] revenue opportunities with all the new technologies coming,’ says Verizon CEO Hans Vestberg. Fixed wireless and AI are two big pieces of…

Read More