Understanding the factors influencing cybercriminal behavior is essential for developing effective cybercrime prevention strategies. Rationality plays a significant role in shaping criminal decisions, particularly through the lens of the rational actor model and deterrence theory. This blog explores how rationality influences cybercriminal behavior, focusing on the rational actor model, the concepts of deterrence theory, their…

Read More

The Federal Trade Commission is sending $5.6 million in refunds to Ring users whose private video feeds were accessed without consent by Amazon employees and contractors, or had their accounts and devices hacked because of insufficient security protections. The action is part of a settlement following a complaint from May 2023 alleging that Ring failed to…

Read More

Artificial intelligence startup FlexAI launched out of stealth mode on Wednesday with $30 million in funding. Here’s what to know about the company’s AI goals. Former engineers and architects from Nvidia, Apple and Intel have launched a new AI startup company called FlexAI with the goal of building innovative AI compute infrastructure to meet the…

Read More

GenAI, Red Hat and potential acquisitions are expected to come up on the vendor’s earnings call Wednesday. Updates on generative artificial intelligence offerings. Growth in the Red Hat business. And the potential acquisition of HashiCorp. These are some of the big topics IBM executives are expected to weigh in on during the Armonk, N.Y.-based vendor’s…

Read More

Part 5 of CRN’s Big Data 100 takes a look at the vendors solution providers should know in the data warehouse and data lake systems and services space. In-House Analytics Data warehouses have been at the center of data analytics systems as far back as the 1980s. Today cloud-based data warehouse services offered by the…

Read More

“A lot of backup companies are buying security companies. Our view is, we want to buy something in the prevention business, not in the ‘aftereffects’ business. If you suffer from an incident, what you do after the incident of course is hugely important. But whatever you can do prior to the incident is even more…

Read More

Apr 24, 2024NewsroomMalware / Endpoint Security Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. “SSLoad is designed to stealthily infiltrate systems, gather sensitive information and transmit…

Read More

Apr 24, 2024NewsroomCyber Attack / Cyber Espionage The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) from at least 2016 to April 2021. This includes the…

Read More

‘Everybody else translates to risk right now. We are, right now, the company in networking. Our vision is clear, our execution is clear. We’re not distracted with an acquisition or something else. That’s translating into a lot of interest from the broader partner space,’ Extreme Networks’ chief product and technology officer tells CRN. There’s a…

Read More

The planned acquisition of 17-year-old Egress will bring together AI-driven capabilities such as anti-phishing with KnowBe4’s widely used security training platform, according to the company. KnowBe4 announced Wednesday it has reached an agreement to acquire Egress, a 17-year-old company focused on providing AI-powered email security. Terms of the acquisition were not disclosed. Egress has 318…

Read More