Apr 29, 2024NewsroomProgramming / Supply Chain A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS (R Data Serialization) file such that it results in code execution when loaded and referenced. The flaw, assigned the CVE identifier CVE-2024-27322, “involves the use…

Read More

Apr 29, 2024NewsroomDNS Security / Cyber Espionage A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort to evade security measures and conduct reconnaissance of networks across the world since October 2019. Cloud security firm Infoblox described the threat actor as likely affiliated…

Read More

“UK-developed products and services [will] become less appealing, because adopters will fear that they have been designed for Government access, and the UK will become a more appealing target for criminals and hostile nation states,” the groups warned. Encryption backdoors The revised law could have serious repercussions to UK tech innovation, potentially driving tech talent…

Read More

The fast-growing solution provider is bringing Cisco XDR technology into its new managed detection and response (MDR) service, FortisX, Sentinel and Cisco told CRN exclusively. Cisco partner Sentinel Technologies is going big with the tech giant on the security front. The fast-growing solution provider is bringing Cisco’s XDR platform for managed security services into its…

Read More

The three global investment firms are considering investing in a joint venture with Intel to build Intel’s new Ireland-based semiconductor fabrication plant, part of a worldwide effort by Intel to become a global semiconductor manufacturing powerhouse. Several major investment companies are considering investing billions of dollars with Intel to help build that company’s new Ireland…

Read More

It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture,…

Read More

Whale Song Code During the Cold War, the US Navy tried to make a secret code out of whale song. The basic plan was to develop coded messages from recordings of whales, dolphins, sea lions, and seals. The submarine would broadcast the noises and a computer—the Combo Signal Recognizer (CSR)—would detect the specific patterns and…

Read More

Apr 29, 2024NewsroomSandbox / Vulnerability Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain code execution on the target system. The three flaws, all critical in nature, allow an “adversary with sufficient access to perform a sandbox escape and obtain root permissions on…

Read More

The concept of living inside a computer-generated world, much like Neo in The Matrix, has long intrigued minds across science and philosophy. Now, a controversial concept called the Second Law of Infodynamics proposes evidence that the very fabric of our reality might be digital. Dr. Melvin Vopson of the University of Portsmouth believes the universe…

Read More

The key to minimize personal liability for CSOs and CISOs after a data breach is to act responsibly and reasonably. The current state of the law is that those involved in an organization that is threatened or affected by a data breach are expected to react reasonably under the circumstances. To meet this standard, one…

Read More