Category: Viral
Sep 03, 2024Ravie LakshmananEndpoint Security / Malware Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation. “It appears that Cicada3301 ransomware primarily targets small to medium-sized businesses (SMBs), likely through opportunistic attacks that exploit vulnerabilities as the initial access vector,”…
Read MoreRocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users
- by nlqip
Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. “This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks,” Dutch security company ThreatFabric said.…
Read MoreSalesforce’s Benioff Says Microsoft AI ‘Has Disappointed So Many Customers,’ But Vendor Hits Back
- by nlqip
‘Microsoft has disappointed so many customers with AI,’ Salesforce co-founder and CEO Marc Benioff said. Salesforce CEO and co-founder Marc Benioff said earlier this week that Microsoft’s artificial intelligence products and strategy “has disappointed so many customers,” touting his company’s own platform and upcoming “agent” brand of AI products as superior to Microsoft’s Copilots. Jared…
Read MoreThe options could also include M&A or selling or splitting its foundry division, according to Bloomberg. Intel executives will consider splitting and selling a business unit as part of a turnaround strategy as rival chipmakers capture a greater share of the artificial intelligence wave, according to media reports. The Santa Clara, Calif.-based vendor has enlisted…
Read MoreCrowdStrike’s Adam Meyers is slated to testify before a subcommittee of the House Homeland Security Committee on Sept. 24. The U.S. House Homeland Security committee has scheduled a hearing for late September over the massive IT outage caused by CrowdStrike’s faulty July 19 update, which will include testimony from a top executive at the cybersecurity…
Read More‘We are offering customers choice, flexibility and control of how and where they build, train and run artificial intelligence,’ Dell Vice Chairman and COO Jeff Clarke said on the company’s second fiscal quarter earnings call. Dell Technologies revenue surged to $25 billion in its second fiscal quarter, coming in 9 percent higher than the same…
Read MoreShahin Pirooz, a channel veteran and founder of WhiteDog, says he’s seen the massive need to bring a more-comprehensive detection and response offering to MSPs. WhiteDog Cybersecurity is seeking to drive the expansion of its MDR (managed detection and response) alternative platform through recruiting an array of new MSP partners, the company’s founder told CRN.…
Read MoreCybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that’s…
Read MoreAug 30, 2024Ravie LakshmananCyber Threat / Cyber Espionage Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future’s Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Iran-nexus cyber threat group that overlaps…
Read MoreThe most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate, that it can be very difficult to keep up with. Some vulnerabilities will start ringing alarm bells within your security tooling, while others are far more nuanced, but still pose an…
Read MoreRecent Posts
- Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks
- Tenable Selected by Bank of Yokohama to Secure its Active Directory and Eliminate Attack Paths
- CISA warns of actively exploited Apache HugeGraph-Server bug
- Suspects behind $230 million cryptocurrency theft arrested in Miami
- Ivanti Says ‘Critical’ Cloud Gateway Vulnerability Seeing Exploitation