Tag: network security
Apr 25, 2024NewsroomVulnerability / Zero-Day A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated state-sponsored actor it tracks under the name UAT4356 (aka…
Read MoreApr 25, 2024NewsroomTechnology / Privacy Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy Sandbox initiative. The tech giant said it’s working closely with the U.K. Competition and Markets Authority (CMA) and hopes…
Read MoreThreatLocker CEO $115M In New Funding Will Help Drive R&D, Support, Marketing With Plans To Double Workforce
- by nlqip
“Our priority is to continue improve our zero trust end point platform with continued R&D, making it more and more accessible to more and more MSPs and more businesses that never even dreamed about having proper security in place,” said ThreatLocker co-founder and CEO Danny Jenkins MSP security powerhouse ThreatLocker, which has doubled its revenue…
Read More“We [are] large scale looking for — I’ll call it the ‘unknown unknown breaches’ — that are out there,’ says Eric Harmon, Trustwave CEO. ‘We develop over 1,000 proprietary use cases that are tied to that research that go into our MDR and our product offerings. We’re continuing to differentiate by finding things that others…
Read MoreThe flaws impact Cisco Adaptive Security Appliance and Firepower Threat Defense software and have been exploited in a state-sponsored campaign against global governments as far back as November, the company says. Cisco Systems disclosed two zero-day firewall vulnerabilities Wednesday that the tech giant said have been exploited by a state-sponsored attacker in an espionage campaign…
Read More‘I think we’ve known for a long time that traditional voice had a shelf life. And ultimately it was going to get replaced with integrated communication services and as-a-service capabilities that run over the top of IP. Now we’re seeing that evolution pick up with a degree of steam,’ CEO John Stankey said of business…
Read MoreApr 24, 2024NewsroomMalware / Endpoint Security Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. “SSLoad is designed to stealthily infiltrate systems, gather sensitive information and transmit…
Read MoreApr 24, 2024NewsroomCyber Attack / Cyber Espionage The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) from at least 2016 to April 2021. This includes the…
Read More‘Everybody else translates to risk right now. We are, right now, the company in networking. Our vision is clear, our execution is clear. We’re not distracted with an acquisition or something else. That’s translating into a lot of interest from the broader partner space,’ Extreme Networks’ chief product and technology officer tells CRN. There’s a…
Read MoreApr 24, 2024NewsroomEncryption / Mobile Security Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of nine apps from vendors like Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi. The only vendor whose…
Read More