The latest startup acquired by Nvidia is Brev.dev, which helps AI developers find the most cost-effective GPU compute across cloud providers. This comes after Nvidia acquired two other startups with the explicit purpose of expanding the capabilities of its DGX Cloud service. Nvidia has bought a startup that helps AI developers find the most cost-effective…

Read More

The notorious FIN7 hacking group has been spotted selling its custom “AvNeutralizer” tool, used to evade detection by killing enterprise endpoint protection software on corporate networks. FIN7 is believed to be a Russian hacking group that has been active since 2013, initially focusing on financial fraud by hacking organizations and stealing debit and credit cards.…

Read More

Consolidated Communications, Incedo, Cerium Networks, Comcast, Nvidia and Logitech are among the companies to list open positions for channel-related roles in July. This month, Consolidated Communications, Incedo and Cerium Networks are among the solution providers to list open positions while Comcast, Nvidia and Logitech are among the vendors to list open positions for channel-related roles.…

Read More

Microsoft is rolling out inbound SMTP DANE with DNSSEC for Exchange Online in public preview, a new capability to boost email integrity and security. As the Exchange team explained on Wednesday, DNS-based Authentication of Named Entities (DANE) for SMTP and Domain Name System Security Extensions (DNSSEC) work together to defend against downgrade and man-in-the-middle (MiTM)…

Read More

The reported effort by Google to beef up its cloud and AI security offerings by potentially acquiring Wiz shows how central cybersecurity has become in the tech industry, solution provider executives tell CRN. Whether or not the Google’s reported efforts to acquire cloud security unicorn Wiz pan out, the apparent willingness by the tech giant…

Read More

Network security controls are no longer reliable or sufficient. They are easily evaded, prone to false positives, and feed a costly ecosystem of alert management and incident response. According to pen testing by Positive Technologies, an external attacker can breach an organization’s network perimeter in 93% of cases. This is unacceptable, and you no longer…

Read More

Cisco has fixed a maximum severity vulnerability that allows attackers to change any user’s password on vulnerable Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers, including administrators. The flaw also impacts SSM On-Prem installations earlier than Release 7.0, known as Cisco Smart Software Manager Satellite (SSM Satellite). As a Cisco Smart Licensing component,…

Read More

Jul 17, 2024NewsroomCyber Espionage / Cryptocurrency Cybersecurity researchers have discovered an updated variant of a known stealer malware that attackers affiliated with the Democratic People’s Republic of Korea (DPRK) have delivered as part of prior cyber espionage campaigns targeting job seekers. The artifact in question is an Apple macOS disk image (DMG) file named “MiroTalk.dmg”…

Read More

A threat actor has leaked a database containing the personal information of 442,519 Life360 customers collected by abusing a flaw in the login API. Known only by their ’emo’ handle, they said the unsecured API endpoint used to steal the data provided an easy way to verify each impacted user’s email address, name, and phone…

Read More

Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious 6.8%, to be precise. From ZDNet: However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all mitigated traffic. The scale of these attacks is staggering. In the first quarter of 2024 alone, Cloudflare blocked…

Read More