Taking his place is Kevin O’Buckley, a veteran of IBM, GlobalFoundries and Marvell Technologies who will now lead the semiconductor giant’s contract chip manufacturing division, which is a key part of CEO Pat Gelsinger’s comeback plan. Intel said on Monday that the head of the company’s contract chip manufacturing division is retiring and handing the…

Read More

A Korean cybersecurity expert has been sentenced to prison for illegally accessing and distributing private videos from vulnerable “wallpad” cameras in 400,000 private households. The 41-year-old man, who has not been officially named, succeeded in remotely accessing 638 apartment complexes in South Korea. He exploited over 400,000 smart home devices used by residents to operate…

Read More

Firstmac Limited is warning customers that it suffered a data breach a day after the new Embargo cyber-extortion group leaked over 500GB of data allegedly stolen from the firm. Firstmac is a significant player in Australia’s financial services industry, focusing primarily on mortgage lending, investment management, and securitization services. Headquartered in Brisbane, Queensland, and employing 460 people,…

Read More

‘The market is still kind of slowing down [but] the number of deals is still better than before the pandemic, so it’s not the end of the world,’ says John Holland, managing director of Corporate Finance Associates. Due in large part to high interest rates, IT services M&A transactions and the aggregate value of those…

Read More

The City of Helsinki is investigating a data breach in its education division, which it discovered in late April 2024, impacting tens of thousands of students, guardians, and personnel. Though information about the attack was circulated on May 2, 2024, the city’s authorities shared more details in a press conference earlier today. According to the details disclosed…

Read More

‘The message that I want everyone to come away with is Avaya is roaring back … the uniqueness of the strategy: Innovation without disruption, so, prem[ise] gives way to cloud over time, or voice gives way to digital, and you can happily move those interactions intra-Avaya without ever having disruption, the UC behemoth’s CEO Alan…

Read More

May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them,” the…

Read More

Phishing remains a pervasive cyber threat, utilizing various channels such as email, SMS, and phone calls to deceive victims into divulging sensitive information or downloading malware. With a history dating back to the 1990s, phishing has evolved into sophisticated techniques like spear phishing, business email compromise (BEC), and vishing. These attacks target individuals and organizations,…

Read More

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-4671 Google Chromium in Visuals Use-After-Free Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known…

Read More

CRN spoke with the CEOs and CTOs of a number of cybersecurity companies, including Proofpoint, Palo Alto Networks, Rubrik and CrowdStrike, during RSA Conference 2024. Here’s what they had to say. While the many implications of GenAI for security continued to be discussed and debated at last week’s RSA Conference, an array of other issues…

Read More