Tag: network security

Vendors including Palo Alto Networks, Trellix and Proofpoint debuted new AI-powered security tools and capabilities this week during the conference. Without a doubt, this year’s RSA Conference in San Francisco has lived up to expectations when it comes to the focus on generative AI. RSAC 2024 has seen countless vendors unveil new security tools and…

Read More

‘Our goal is to essentially get in front of every single one of those customers and convert them all, make them all love of us over time,’ says Kaseya CMO Mike Sanders. Mike Sanders believes that Kaseya’s new Kaseya 365 offering is “disruptively priced and gives MSPs that utilize it a competitive advantage is important.”…

Read More

Alongside a number of major product launches, vendors have announced funding and acquisitions — and signed a new CISA-backed security pledge — during the massive security conference in San Francisco this week. In and around the RSA Conference in San Francisco this week, the majority of the biggest names in the cybersecurity industry have had…

Read More

May 08, 2024NewsroomData Encryption / Hardware Security Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard (AES) algorithm. The techniques have been collectively dubbed Pathfinder by a group of academics from the University of California San Diego, Purdue…

Read More

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each user’s base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with.…

Read More

The vendor unveiled its new ‘Precision AI’ capabilities across its product portfolio Tuesday, along with several tools for protecting the use of GenAI itself. Palo Alto Networks unveiled a new set of AI-powered capabilities, dubbed Precision AI, across its cybersecurity product portfolio Tuesday. During a Palo Alto Networks event in San Francisco, CEO Nikesh Arora…

Read More

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them. The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as many as…

Read More

May 08, 2024NewsroomEncryption / Information Stealer A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar. “These enhancements aim to increase the malware’s stealthiness, thereby remaining undetected for longer periods of time,” Zscaler ThreatLabz researcher Muhammed Irfan V A said…

Read More

May 08, 2024NewsroomWeb Security / Vulnerability A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3) has been leveraged to set up bogus admin users with…

Read More

The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31-year-old Russian national named Dmitry Yuryevich Khoroshev. In addition, Khoroshev has been sanctioned by the U.K. Foreign, Commonwealth and Development Office (FCD), the U.S. Department of the Treasury’s Office of Foreign Assets Control…

Read More