Victor Peng’s retirement was announced as AMD seeks to challenge Nvidia’s dominance in AI chips for data centers with an expanded road map of Instinct processors. AMD announced on Monday that President Victor Peng, who has been leading the chip designer’s company-wide AI strategy, will retire next month. Peng (pictured) joined AMD in 2022 when…
Read MoreIn today’s fast-paced organizations, end-users will sometimes try to take a shortcut. We’ve all been there — rushing to meet a deadline, juggling multiple tasks, or just trying to be helpful. But the reality is that letting even well-intentioned actions can come back to bite you. Picture this: an employee innocently lets a family member…
Read MoreDigital forensics plays a vital role in investigating a wide range of cybercrimes and cybersecurity incidents. This field involves uncovering, analyzing, and interpreting digital evidence to piece together the story behind various cybercrimes, data breaches, and even traditional crimes with digital elements. Digital forensics encompasses several stages, beginning with the collection of evidence from various…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-083 DATE(S) ISSUED: 07/22/2024 OVERVIEW: A vulnerability has been discovered in Cisco Secure Email Gateway that could allow for remote code execution. Cisco Secure Email Gateway is an email security product that uses signature analysis and machine learning to identify and block malicious emails before they reach recipients inboxes. Successful exploitation could…
Read MorePlay ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines. Cybersecurity company Trend Micro, whose analysts spotted the new ransomware variant, says the locker is designed to first check whether it’s running in an ESXi environment before executing and that it can evade detection on…
Read MoreUsing just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege. By granting permissions on a time-limited, as-needed basis only, just-in-time (JIT) controls are an important security mechanism for protecting access to cloud resources. JIT access is becoming a popular cloud security…
Read More‘We let down the very people we committed to protect,’ wrote Shawn Henry, longtime CSO at CrowdStrike, in a LinkedIn post. The massive global IT outage caused by a faulty CrowdStrike update has been a “gut punch” for the company, though it “pales in comparison” to what customers and partners have been going through, CrowdStrike…
Read Morenjuy67 njuy67 njuy68 njuy68 njuy69 njuy69 njuy70 njuy70 njuy71 njuy71 njuy72 njuy72 njuy73 njuy73 njuy74 njuy74 njuy75 njuy75 njuy76 njuy76 njuy77 njuy77 njuy78 njuy78 njuy79 njuy79 njuy80 njuy80 njuy81 njuy81 njuy82 njuy82 njuy83 njuy83 njuy84 njuy84 njuy85 njuy85 njuy86 njuy86 njuy87 njuy87 njuy88 njuy88 njuy89 njuy89 njuy90 njuy90 njuy91 njuy91 njuy92 njuy92 njuy93 njuy93 njuy94…
Read MoreThe US government has imposed sanctions on two Russian cybercriminals for cyberattacks targeting critical infrastructure. According to a US Treasury press release, the two sanctioned persons are Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, both key members of the Russia-aligned hacktivist group Cyber Army of Russia Reborn (CARR). Pankratova, known online as ‘YuliYA,’ is allegedly the…
Read MoreFrom Google’s potential blockbuster acquisition of security startup Wiz to the massive CrowdStrike and Microsoft chaos, here’s four big things to watch for during Google Cloud’s earnings results slated for Tuesday. Google Cloud’s parent company Alphabet is releasing the financial earnings results for its second quarter 2024 on Tuesday with potential huge discussions around the…
Read More