Category: Viral
Video, Ransomware ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends 13 Sep 2024 This week, ESET researchers published a deep dive into the recent activities of the CosmicBeetle cybercrime group. Among other notable things, CosmicBeetle was found to abuse the infamy of…
Read MoreAs Intel undergoes major spending cuts, longtime channel advocate Jason Kimrey is leaving the chipmaker along with a few other partner-facing leaders. Longtime Intel channel stalwart Jason Kimrey, a fierce channel advocate admired by partners as one of the most influential channel chiefs in the industry, is leaving the beleaguered semiconductor giant, CRN has learned.…
Read MoreThe high-severity flaw in Ivanti’s Cloud Service Appliance (CSA) can be used to enable remote execution of code, the vendor says. Ivanti said Friday that a previously disclosed vulnerability in its Cloud Service Appliance (CSA) gateway has now seen exploitation by threat actors. As of Ivanti’s disclosure Friday, attacks exploiting the high-severity flaw had only…
Read More‘We have seen, especially in that AI space, these extremely high-powered chips on back order because they can’t make them fast enough. AWS own chips are going to be extremely beneficial on that side of it, especially as these AI workloads increase,’ says ClearScale CEO Jimmy Chui. Solution providers are bullish on Amazon Web Services’…
Read MoreIn the wake of the global Windows outage caused by a faulty CrowdStrike update in July, ‘both our customers and ecosystem partners have called on Microsoft to provide additional security capabilities outside of kernel mode,’ Microsoft’s David Weston says. In the wake of the CrowdStrike-caused outage that led to widespread societal disruptions in July, Microsoft…
Read MoreSep 13, 2024Ravie LakshmananVirtual Reality / Vulnerability Details have emerged about a now-patched security flaw impacting Apple’s Vision Pro mixed reality headset that, if successfully exploited, could allow malicious attackers to infer data entered on the device’s virtual keyboard. The attack, dubbed GAZEploit, has been assigned the CVE identifier CVE-2024-40865. “A novel attack that can…
Read MoreThe percentage equates to a potential 1,500 customers affected in the compromise of Fortinet’s cloud file-share environment. Fortinet disclosed that the breach of its cloud file-share environment impacted “less than 0.3 percent” of customers, while noting that it believes the incident isn’t likely to have a significant impact on its business. The cybersecurity vendor had…
Read MoreSep 13, 2024Ravie LakshmananCyber Attack / Crime British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). “The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September,” the…
Read MoreSep 13, 2024Ravie LakshmananSoftware Security / Threat Intelligence Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS…
Read MoreEven as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible. However, most tools available on the market today cannot offer a complete defense against this attack vector because they…
Read MoreRecent Posts
- Bitfinex hacker gets 5 years in prison for 120,000 bitcoin heist
- Here Are The Stellar Startup Edge Computing/IoT Vendors To Know In 2024
- Five Companies That Came To Win This Week
- Microsoft pulls Exchange security updates over mail delivery issues
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks