Mozilla has issued an emergency security update for the Firefox browser to address a critical use-after-free vulnerability that is currently exploited in attacks. The vulnerability, tracked as CVE-2024-9680, and discovered by ESET researcher Damien Schaeffer, is a use-after-free in Animation timelines. This type of flaw occurs when memory that has been freed is still used…
Read More‘Think about a Zoom meeting and identifying the people and making sure that the system understands when the last conversation we had was. All those things can come into play by this integration. We’re making sure that our partners can build on top of the Now Assist platform, and we feel this integration makes both…
Read MoreLongtime channel leader Dave Guzzi is taking over as Intel’s global channel chief after a short stint by his predecessor, and the semiconductor plans to introduce a new regional engagement model for partners among other changes coming in 2025, Intel exclusively tells CRN. Intel has appointed a new global channel chief for a second time…
Read MoreMicrosoft has fixed a known issue that was causing Word to delete some Windows users’ documents instead of saving them. On affected systems, locally saved files were deleted after saving because of this Word bug issue if their filenames included the # symbol or had a capitalized filename extension, such as .DOCX or .RTF. This…
Read MoreAWS AI Vice President Matt Wood, who helped launched everything from Lambda and SageMaker to DeepRacer and EMR, is leaving Amazon after 15 years. Here’s what you need to know. Longtime Amazon Web Services AI innovator and frequent on-stage keynote speaker Matt Wood is leaving the cloud computing giant. “After 15 incredible years, it’s time…
Read MoreToday’s AI PCs are moving power-hungry, GPU-driven AI training and inference tasks, leading to potential big performance and sustainability gains. Today’s AI PCs are moving some of the power-hungry, GPU-driven AI training and inference tasks from the data center to the edge, leading to potential big performance and sustainability gains. HP Inc. and Dell Technologies…
Read MoreIn today’s cybersecurity landscape, evolving threats require security solutions that match the sophistication of modern threats. As businesses rapidly adopt emerging technologies, their exposure to cyberattacks increases. To mitigate these risks, cybersecurity teams need adaptable and comprehensive tools to protect their digital ecosystems effectively. Security Information and Event Management (SIEM) and Extended Detection and Response…
Read MoreA group of pro-Ukrainian hacktivists has claimed responsibility for the September breach of Russian security company Doctor Web (Dr.Web). Dr.Web confirmed last month that its network was breached on September 14, which forced it to disconnect all internal servers and stop pushing virus database updates to customers while investigating the incident. In a Tuesday Telegram…
Read MoreCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-23113 Fortinet Multiple Products Format String Vulnerability CVE-2024-9379 Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability CVE-2024-9380 Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…
Read MoreOct 09, 2024Ravie LakshmananIndustrial Security / Critical Infrastructure Details have emerged about multiple security vulnerabilities in two implementations of the Manufacturing Message Specification (MMS) protocol that, if successfully exploited, could have severe impacts in industrial environments. “The vulnerabilities could allow an attacker to crash an industrial device or in some cases, enable remote code execution,”…
Read More