Cybersecurity and other IT news aggregator
LATEST FEEDS
-
xAI picked Ethernet over InfiniBand for its H100 Colossus training cluster
xAI picked Ethernet over InfiniBand for its H100 Colossus training cluster 2024-10-29 at 21:35 By Tobias Mann Work already underway to expand system to 200,000 Nvidia Hopper chips Unlike most AI training clusters, xAI’s Colossus with its 100,000 Nvidia Hopper GPUs doesn’t use InfiniBand. Instead, the massive system, which Nvidia bills as the “world’s largest…
-
Linus Torvalds: 90% of AI marketing is hype
Linus Torvalds: 90% of AI marketing is hype 2024-10-29 at 20:49 By Paul Kunert Linux kernel creator says let’s see which workloads use GenAI in five years Linus Torvalds, creator of the Linux kernel, thinks the majority of marketing circulated by the industry on Generative AI is simply fluff with no real substance – and…
-
Ford CEO Jim Farley slammed for driving Chinese-made electric vehicle: ‘Slap in the face’
Ford CEO Jim Farley slammed for driving Chinese-made electric vehicle: ‘Slap in the face’ 2024-10-29 at 20:33 By Ariel Zilber Ford CEO Jim Farley gushed about his car — a Chinese-made electric vehicle that he had specially flown in from Shanghai. This article is an excerpt from Latest Technology News and Product Reviews | New…
-
US Army turns to ‘Scylla’ AI to protect depot
US Army turns to ‘Scylla’ AI to protect depot 2024-10-29 at 19:36 By Brandon Vigliarolo Ominously-named bot can spot trouble from a mile away, distinguish threats from false alarms, says DoD The US Army is testing a new AI product that it says can identify threats from a mile away, and all without the need…
-
Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting
Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting 2024-10-29 at 18:51 By Connor Jones US also charges an alleged Redline dev, no mention of an arrest International law enforcement officials have arrested two individuals and charged another in connection with the use and distribution of the Redline and Meta infostealer malware strains.……
-
Elon Musk shares bold prediction on humanoid robots that could make Tesla a ‘$25T company’
Elon Musk shares bold prediction on humanoid robots that could make Tesla a ‘$25T company’ 2024-10-29 at 18:22 By Reuters The Optimus robot is the humanoid robot under development by Tesla and could multiply the company’s valuation, according to Musk. This article is an excerpt from Latest Technology News and Product Reviews | New York Post…
-
US charges suspected Redline infostealer developer, admin
US charges suspected Redline infostealer developer, admin 2024-10-29 at 18:22 By Zeljka Zorz The identity of a suspected developer and administrator of the Redline malware-as-a-service operation has been revealed: Russian national Maxim Rudometov. Infrastructure takedown As promised on Monday when they announced the disruption of the Redline and Meta infostealer operations, law enforcement Operation Magnus…
-
The troublesome economics of CPU-only AI
The troublesome economics of CPU-only AI 2024-10-29 at 17:33 By Tobias Mann At the end of the day, it all boils down to tokens per dollar Analysis Today, most GenAI models are trained and run on GPUs or some other specialized accelerator, but that doesn’t mean they have to be. In fact, several chipmakers have…
-
Admins better Spring into action over latest critical open source vuln
Admins better Spring into action over latest critical open source vuln 2024-10-29 at 16:49 By Connor Jones Patch up: The Spring framework dominates the Java ecosystem If you’re running an application built using the Spring development framework, now is a good time to check it’s fully updated – a new, critical-severity vulnerability has just been…
-
Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts
Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts 2024-10-29 at 16:18 By daksh sharma Overview The Ransomware Vulnerability Matrix, a vital repository on GitHub, represents a new step forward in understanding ransomware vulnerabilities. This invaluable repository catalogs known Common Vulnerabilities and Exposures (CVEs) that ransomware groups exploit, providing insights into ransomware types, vulnerable technologies,…
-
The Cloud Latency Map measures latency across 100+ cloud regions
The Cloud Latency Map measures latency across 100+ cloud regions 2024-10-29 at 16:03 By Industry News Kentik launched The Cloud Latency Map, a free public tool allowing anyone to explore the latencies measured between over 100 cloud regions worldwide. Users can identify recent changes in latencies globally between various public clouds and data center regions…
-
Chinese chips, quantum and AI now on US investment blacklist
Chinese chips, quantum and AI now on US investment blacklist 2024-10-29 at 15:50 By Laura Dobberstein Wouldn’t want to inadvertently fund the PLA The US treasury department finalized a rule on Monday that limits domestic entities’ investment in Chinese semiconductors and microelectronics, quantum information technologies, and AI.… This article is an excerpt from The Register…
-
Securiti Gencore AI accelerates GenAI adoption in the enterprise
Securiti Gencore AI accelerates GenAI adoption in the enterprise 2024-10-29 at 15:49 By Industry News Securiti released Gencore AI, a holistic solution to easily build safe, enterprise-grade GenAI systems, copilots and AI agents. This new solution accelerates GenAI adoption in the enterprise by making it easy to build unstructured and structured data + AI pipelines…
-
Researchers Uncover Vulnerabilities in Open-Source AI and ML Models
Researchers Uncover Vulnerabilities in Open-Source AI and ML Models 2024-10-29 at 15:33 By A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and…
-
Data protection made simple
Data protection made simple 2024-10-29 at 15:17 By Bruce Ong Now available: Symantec DLP 16.1 This article is an excerpt from Broadcom Software Blogs View Original Source React to this headline:
-
Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Defining the Cyber Assault on the Retail Sector
Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Defining the Cyber Assault on the Retail Sector 2024-10-29 at 15:17 By The holiday shopping season is almost here, and according to the 2024 Trustwave Risk Radar Report: Retail Sector, threat actors have honed their skills and are prepared to use ransomware and phishing attacks that leverage well-known online brands…
-
2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector
2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector 2024-10-29 at 15:17 By As the holiday shopping season approaches, the 2024 Trustwave Risk Radar Report: Retail Sector reveals that cybercriminals have sharpened their tactics, utilizing ransomware and phishing attacks that exploit well-known online brands to target retailers and consumers directly. This article is an…
-
Aviatrix unveils features to simplify network security management
Aviatrix unveils features to simplify network security management 2024-10-29 at 15:17 By Industry News Aviatrix unveiled new features and functionality designed to fill critical cloud network security gaps in cloud environments. With its latest software release and introduction of new features, including the Hybrid Cloud Transit and Distributed Cloud Firewall (DCF) integration with enhanced threat…
-
Phishers reach targets via Eventbrite services
Phishers reach targets via Eventbrite services 2024-10-29 at 15:17 By Zeljka Zorz Crooks are leveraging the event management and ticketing website Eventbrite to deliver their phishing emails to potential targets. “Since July, these attacks have increased 25% week over week, resulting in a total growth rate of 900%,” Perception Point researchers say. The phishing emails…
-
Datacenter developer says power issues holding up new builds
Datacenter developer says power issues holding up new builds 2024-10-29 at 14:48 By Dan Robinson ‘The single biggest constraint is access,’ says exec looking to invest ‘hundreds of millions’ One of the UK’s major commercial property developers says it would be pumping investment into new datacenters if it could just secure the energy supply needed…
-
Phishing Campaign Targeting Ukraine: UAC-0215 Threatens National Security
Phishing Campaign Targeting Ukraine: UAC-0215 Threatens National Security 2024-10-29 at 14:33 By daksh sharma Overview CERT-UA, the Cyber Emergency Response Team for Ukraine, uncovered a phishing campaign orchestrated by the threat actor UAC-0215. This campaign specifically targeted public institutions, major industries, and military units across Ukraine. The phishing emails were cleverly disguised to promote integration…
-
Zenity raises $38 million to secure agentic AI
Zenity raises $38 million to secure agentic AI 2024-10-29 at 14:33 By Industry News Zenity announced they have received $38 million in Series B funding co-led by Third Point Ventures and DTCP, pushing the total capital raised to over $55 million. It follows the recent strategic investment by Microsoft’s venture arm, M12, with strong support…
-
Security leaders discuss the Cisco security incident
Security leaders discuss the Cisco security incident 2024-10-29 at 14:18 By Security leaders discuss the recent Cisco security incident. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
31 new ransomware groups were discovered in 2024
31 new ransomware groups were discovered in 2024 2024-10-29 at 14:18 By A report by Secureworks revealed a 30% year-over-year rise in active ransomware groups, which demonstrates fragmentation of an established criminal ecosystem. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Akamai strenghtens protection against account abuse
Akamai strenghtens protection against account abuse 2024-10-29 at 14:03 By Industry News Akamai launched new capabilities to its Account Protector security solution. These enhancements are designed to safeguard user accounts against abuse throughout their entire lifecycle and provide advanced protection against account opening abuse, account takeover attacks, and other attack schemes. The new capabilities enable…
-
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation 2024-10-29 at 14:03 By Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When you have eliminated the impossible, whatever remains, however improbable,…
-
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus 2024-10-29 at 14:03 By The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on October 28, 2024, is the result of an international…
-
FCC chair: Mobile dead spots will end when space-based and ground comms merge
FCC chair: Mobile dead spots will end when space-based and ground comms merge 2024-10-29 at 13:46 By Dan Robinson Jessica Rosenworcel looks at policy challenges for the next decade The chair of America’s Federal Communications Commission (FCC) foresees a single network future where space-based comms will be integrated with terrestrial networks to ensure connectivity anywhere.……
-
Corero CORE turns isolated security events into actionable intelligence
Corero CORE turns isolated security events into actionable intelligence 2024-10-29 at 13:34 By Industry News Corero Network Security launched a new cloud-based availability protection platform, CORE. CORE by Corero Network Security is a cloud-based availability protection platform designed to seamlessly enhance a company’s existing security infrastructure. It delivers advanced defense, leveraging existing infrastructure, offering flexibility…
-
Merde! Macron’s bodyguards reveal his location by sharing Strava data
Merde! Macron’s bodyguards reveal his location by sharing Strava data 2024-10-29 at 12:48 By Iain Thomson It’s not just the French president, Biden and Putin also reportedly trackable The French equivalent of the US Secret Service may have been letting their guard down, as an investigation showed they are easily trackable via the fitness app…
-
Patching problems: The “return” of a Windows Themes spoofing vulnerability
Patching problems: The “return” of a Windows Themes spoofing vulnerability 2024-10-29 at 12:18 By Zeljka Zorz Despite two patching attempts, a security issue that may allow attackers to compromise Windows user’s NTLM (authentication) credentials via a malicious Windows themes file still affects Microsoft’s operating system, 0patch researchers have discovered. The path to discovery The story…
-
UK immigration seeks tech support, development partner for border crossing systems
UK immigration seeks tech support, development partner for border crossing systems 2024-10-29 at 11:34 By Lindsay Clark After years of delay, new systems with ‘diverse tech stacks’ need a hand in £195M deal The UK’s Home Office has launched a procurement for tech support and services to oversee border control and immigration via a contract…
-
PIXM protects MSPs from credential theft and phishing attacks
PIXM protects MSPs from credential theft and phishing attacks 2024-10-29 at 11:04 By Industry News PIXM Security launched its new Managed Service Provider (MSP) program for zero-day phishing protection. With over 500,000 end users already protected, PIXM shields MSPs and their customers from credential theft and zero-day phishing attacks that can lead to malware and…
-
Five Eyes nations tell tech startups to take infosec seriously. Again
Five Eyes nations tell tech startups to take infosec seriously. Again 2024-10-29 at 10:40 By Simon Sharwood Only took ’em a year to dish up some scary travel advice, and a Secure Innovation … Placemat? Cyber security agencies from the Five Eyes nations have delivered on a promise to offer tech startups more guidance on…
-
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing 2024-10-29 at 09:54 By The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. “The USG follows TLP markings…
-
Microsoft accuses Google of creating a lobbying front called ‘Open Cloud Coalition’
Microsoft accuses Google of creating a lobbying front called ‘Open Cloud Coalition’ 2024-10-29 at 09:35 By Simon Sharwood Seemingly dissatisfied with CISPE settlement, new UK-centric cloudy industry group calls for end to ‘restrictive licensing’ Microsoft has alleged that a new group of cloud providers and users is a front for Google – a notion the…
-
Wanted. Top infosec pros willing to defend Britain on shabby salaries
Wanted. Top infosec pros willing to defend Britain on shabby salaries 2024-10-29 at 08:35 By Iain Thomson GCHQ job ads seek top talent with bottom-end pay packets While the wages paid by governments seldom match those available in the private sector, it appears that the UK’s intelligence, security and cyber agency is a long way…
-
New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors
New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors 2024-10-29 at 08:35 By More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible to speculative execution attacks. The attack, disclosed by ETH…
-
How to Stream Nickelodeon Anywhere Without Cable (2024)
How to Stream Nickelodeon Anywhere Without Cable (2024) 2024-10-29 at 08:17 View original post at vpnMentor There are many options available online that let you stream your favorite Nickelodeon shows, like SpongeBob SquarePants and PAW Patrol, in HD. For a free streaming experience, check out platforms like Pluto TV or Tubi. You can also watch…
-
Inside console security: How innovations shape future hardware protection
Inside console security: How innovations shape future hardware protection 2024-10-29 at 08:00 By Mirko Zorz In this Help Net Security interview, security researchers Specter and ChendoChap discuss gaming consoles’ unique security model, highlighting how it differs from other consumer devices. They also share their thoughts on how advancements in console security could shape future consumer…
-
NASA narrows Artemis III landing target list to nine
NASA narrows Artemis III landing target list to nine 2024-10-29 at 07:34 By Laura Dobberstein The Mons Mouton Plateau looks nice this time of year. Or maybe you prefer Slater Plain? NASA has released an updated list of nine potential landing spots near the lunar south pole for Artemis III – the mission that will…
-
OT PCAP Analyzer: Free PCAP analysis tool
OT PCAP Analyzer: Free PCAP analysis tool 2024-10-29 at 07:34 By Mirko Zorz EmberOT’s OT PCAP Analyzer, developed for the industrial security community, is a free tool providing a high-level overview of the devices and protocols in packet capture files. “The OT PCAP Analyzer was designed specifically with critical OT environments in mind. We’ve created…
-
Cybersecurity jobs available right now: October 29, 2024
Cybersecurity jobs available right now: October 29, 2024 2024-10-29 at 07:03 By Anamarija Pogorelec API Gateway Security Engineer Ness Technologies | Israel | Hybrid – View job details As an API Gateway Security Engineer, you will be responsible for managing and implementing API Gateway solutions with a strong focus on information security. Your responsibilities will…
-
The state of password security in 2024
The state of password security in 2024 2024-10-29 at 06:33 By Help Net Security In this Help Net Security video, John Bennett, CEO at Dashlane, discusses their recent Global Password Health Score Report, detailing the global state of password health and hygiene. Poor security habits like password reuse remain widespread. With passwordless technologies like passkeys…
-
Trust and risk in the AI era
Trust and risk in the AI era 2024-10-29 at 06:07 By Help Net Security 55% of organizations say the security risks for their business have never been higher, according to Vanta. Yet the average company only dedicates 11% of its IT budget to security — far from the ideal allocation of 17%, according to business…
-
How organizations can defend against the increasing API attack surface
How organizations can defend against the increasing API attack surface 2024-10-29 at 06:07 By As APIs increase beyond the range of manual control, organizations may face greater security challenges. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Chinese engineers wire Raspberry Pi into 600-meter railway tunnel to find its flaws
Chinese engineers wire Raspberry Pi into 600-meter railway tunnel to find its flaws 2024-10-29 at 05:49 By Simon Sharwood The GPIO turns out to be a neat way to measure the conductivity of concrete Chinese scientists have found a novel use for the Raspberry Pi: detecting voids in the linings of railway tunnels that could…
-
5 Best Kenya VPNs in 2024: Servers for Streaming and Privacy
5 Best Kenya VPNs in 2024: Servers for Streaming and Privacy 2024-10-29 at 05:38 View original post at vpnMentor Navigating the internet in Kenya can be tricky given the many challenges, such as geo-restrictions and privacy concerns. Whether you’re trying to watch your favorite shows safely or secure your connection against hackers and surveillance, a…
-
Tardigrade genes may hold secret to radiation treatments for humans
Tardigrade genes may hold secret to radiation treatments for humans 2024-10-29 at 03:34 By Brandon Vigliarolo Microscopic ‘water bears’ can survive blasts that would kill humans Drugs that prevent or reverse the effects of ionizing radiation have long been a sci-fi pipedream, but the gene sequencing of a newly discovered species of tardigrade could change…
-
iFixit to the rescue: McDonald’s workers can rescue their own ice cream machines
iFixit to the rescue: McDonald’s workers can rescue their own ice cream machines 2024-10-29 at 02:48 By Iain Thomson Burger me! Partial success in chipping away at insane DMCA rules The US Copyright Office has published a new list of exemptions from the Digital Millennium Copyright Act (DMCA), including one for retail food machines that…