‘These are the most mission-critical applications with the highest performance requirements,’ Josh Lee, chief technology officer at Dell platinum partner VirtuIT, tells CRN. ‘With these boxes, any efficiencies to make the cost-per-terabyte and cost of input output lower is great news for customers.’ Dell Technologies’ newest upgrades to its PowerMax storage arrays give partners faster,…

Read More

Synology, a Taiwanese network-attached storage (NAS) appliance maker, patched two critical zero-days exploited during last week’s Pwn2Own hacking competition within days. Midnight Blue security researcher Rick de Jager found the critical zero-click vulnerabilities in the company’s Synology Photos and BeePhotos for BeeStation software. While they’re yet to receive CVE IDs for easier tracking, Trend Micro’s…

Read More

For the week ending Nov. 1, CRN takes a look at the companies that brought their ‘A’ game to the channel including Cisco Systems, Blue Mantis, Kaseya, ATSG, Evolve IP, and Siemens. The Week Ending Nov. 1 Topping this week’s Came to Win list is Cisco Systems with the launch of Cisco 360, the company’s…

Read More

The Dstat.cc DDoS review platform has been seized by law enforcement, and two suspects have been arrested after the service helped fuel distributed denial-of-service attacks for years. The seizure and arrests were conducted as part of “Operation PowerOFF,” an ongoing international law enforcement operation that targets DDoS-for-hire platforms, aka “booters” or “stressers,” to seize infrastructure and…

Read More

U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel’s participation in the sporting event. The activity has been pinned on an entity that’s known as Emennet Pasargad, which the agencies…

Read More

‘We have a lot more ahead, and we are acting with urgency to deliver on our priorities. We need to fight for every inch and execute better than ever before, and our teams are embracing this mindset as we build a leaner, more profitable Intel,’ says Intel CEO Pat Gelsinger. Intel’s business in its latest…

Read More

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. Dive into six things that are…

Read More

Nov 01, 2024The Hacker NewsSaaS Security / Insider Threat With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections, the SaaS risk possibilities are endless. Critical organizational assets and data are at risk from malicious actors, data breaches, and insider threats, which pose many challenges for security teams.…

Read More

Nov 01, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have flagged a “massive” campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and stored in an Amazon S3 storage bucket…

Read More

Nov 01, 2024Ravie LakshmananThreat Intelligence / Network Security Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called Quad7 to orchestrate highly evasive password spray attacks. The tech giant has given the botnet the name CovertNetwork-1658, stating the password spray operations are used to steal credentials from multiple…

Read More