What is Qilin? Qilin (also known as Agenda) is a ransomware-as-a-service criminal operation that works with affiliates, encrypting and exfiltrating the data of hacked organisations and then demanding a ransom be paid. Qilin seems like a strange name. Where does it come from? The Qilin is a creature from Chinese mythology that combines the features…

Read More

A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named ‘Reptile’ and ‘Medusa’ to remain hidden on VMware ESXi virtual machines, allowing them to conduct credential theft, command execution, and lateral movement. Mandiant has been tracking the threat actor for a long time, previously reporting attacks on government organizations leveraging a Fortinet…

Read More

A Dutch appellate court has ruled that Oracle and Salesforce must continue defending a class-action lawsuit relating to the use of cookies to gather and track personal information for their Data Management Platforms (DMPs). The case raises issues about who is responsible when websites use third-party data platforms to track users, and relies on the…

Read More

In an interview with CRN, CrowdStrike CEO George Kurtz says the now-delayed Recall offering is just the latest case where ‘Microsoft has put profits and features over security.’ As sensational as the recent saga over Microsoft’s Recall feature may be, to anyone who has been following Microsoft’s series of security failures in recent years, it’s…

Read More

‘The overall message is we’re embracing partners and we’re focused on them making money,’ CrowdStrike CEO George Kurtz tells CRN. According to solution provider executive Ryan Morris, behind the stunning growth of cybersecurity vendor CrowdStrike is something that’s been in shockingly short supply lately around the tech industry: long-term vision. From “day one,” CrowdStrike has…

Read More

Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits. Although the attacks do not appear particularly sophisticated, the observed activity underscores the risk posed by unpatched endpoints, emphasizing the urgent need for administrators to apply the security updates. The CVE-2024-28995 flaw The vulnerability, CVE-2024-28995, is a high-severity directory…

Read More

Car dealership SaaS platform CDK Global suffered an additional breach Wednesday night as it was starting to restore systems shut down in an previous cyberattack. CDK Global is a software-as-a-service platform that provides a full suite of applications to handle a car dealership’s operation, including sales, back office, financing, inventory, and service and support. CDK became…

Read More

Tech Data CEO Rich Hume, who led the distributor through the pandemic and the acquisition of rival Synnex, will retire Sept. 1. TD Synnex COO Patrick Zammit will take over. TD Synnex CEO Rich Hume, who led the company through six transformative years of massive growth through acquisition as well as running one of the…

Read More

From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what cloud security posture management (CSPM) can do for their organizations and how to choose the right solution. Source link lol

Read More

Graham Cluley is an award-winning cybersecurity public speaker, podcaster, blogger, and analyst. He has been a well-known figure in the cybersecurity industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Since then he has been employed in senior roles by computer…

Read More