February 2024

Inside the strategy of Salesforce’s new Chief Trust Officer

Inside the strategy of Salesforce’s new Chief Trust Officer 2024-02-19 at 07:32 By Mirko Zorz Recently, Salesforce named Brad Arkin, previously Chief Security & Trust Officer at Cisco, the company’s new Chief Trust Officer. This was the perfect opportunity to find out more about his plans. In this Help Net Security interview, Arkin discusses a […]

React to this headline:

Loading spinner

Inside the strategy of Salesforce’s new Chief Trust Officer Read More »

RCE vulnerabilities fixed in SolarWinds enterprise solutions

RCE vulnerabilities fixed in SolarWinds enterprise solutions 2024-02-19 at 07:01 By Zeljka Zorz SolarWinds has released updates for Access Rights Manager (ARM) and (Orion) Platform that fix vulnerabilities that could allow attackers to execute code on vulnerable installations. SolarWinds ARM flaws fixed SolarWinds, the company whose Orion IT administration platform has been infamously compromised in

React to this headline:

Loading spinner

RCE vulnerabilities fixed in SolarWinds enterprise solutions Read More »

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor 2024-02-19 at 07:01 By The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with a new backdoor called BASICSTAR by creating a fake webinar portal. Charming Kitten, also called APT35, CharmingCypress, Mint

React to this headline:

Loading spinner

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor Read More »

Fraudsters have found creative ways to scam some businesses

Fraudsters have found creative ways to scam some businesses 2024-02-19 at 06:31 By Help Net Security 70% of businesses report that fraud losses have increased in recent years and over half of consumers feel they’re more of a fraud target than a year ago, according to Experian. To thwart fraudulent activity in 2024, businesses need

React to this headline:

Loading spinner

Fraudsters have found creative ways to scam some businesses Read More »

The double-edged sword of zero trust

The double-edged sword of zero trust 2024-02-19 at 06:01 By Help Net Security In an era defined by relentless cyber threats and evolving attack vectors, traditional security models are proving increasingly inadequate to safeguard sensitive information. Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating every user,

React to this headline:

Loading spinner

The double-edged sword of zero trust Read More »

A visa to fill Australia’s empty tech jobs is getting more expensive, but maybe better value

A visa to fill Australia’s empty tech jobs is getting more expensive, but maybe better value 2024-02-19 at 05:33 By Simon Sharwood Application process gets a massive overhaul For decades, Australia has failed to train enough IT pros to satisfy local employers’ needs. The nation’s solution to the shortfall has involved issuing visas to skilled

React to this headline:

Loading spinner

A visa to fill Australia’s empty tech jobs is getting more expensive, but maybe better value Read More »

Feds post $15 million bounty for info on ALPHV/Blackcat ransomware crew

Feds post $15 million bounty for info on ALPHV/Blackcat ransomware crew 2024-02-19 at 03:32 By Brandon Vigliarolo ALSO: EncroChat crims still getting busted; ransomware takes down CO public defenders office; and crit vulns infosec in brief  The US government is offering bounties up to $15 million as a reward for anyone willing to help it

React to this headline:

Loading spinner

Feds post $15 million bounty for info on ALPHV/Blackcat ransomware crew Read More »

Election security threats in 2024 range from AI to … anthrax?

Election security threats in 2024 range from AI to … anthrax? 2024-02-18 at 18:31 By Jessica Lyons Unsettling reading as Presidents’ Day approaches In time for the long Presidents’ Day weekend in the US there have been multiple warnings about what will undoubtedly be a challenging and potentially dangerous year for voting processes and government

React to this headline:

Loading spinner

Election security threats in 2024 range from AI to … anthrax? Read More »

Tech Companies Sign Accord to Combat AI-Generated Election Trickery

Tech Companies Sign Accord to Combat AI-Generated Election Trickery 2024-02-18 at 15:32 By Associated Press Executives from Adobe, Amazon, Google, IBM, Meta, Microsoft, OpenAI and TikTok gathered at the Munich Security Conference to announce a framework for how they respond to AI-generated deepfakes that deliberately trick voters. The post Tech Companies Sign Accord to Combat

React to this headline:

Loading spinner

Tech Companies Sign Accord to Combat AI-Generated Election Trickery Read More »

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days 2024-02-18 at 11:01 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Integrating cybersecurity into vehicle design and manufacturing In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the

React to this headline:

Loading spinner

Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days Read More »

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty 2024-02-18 at 09:47 By A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May 2009 and February 2021. Vyacheslav Igorevich Penchukov (aka Vyacheslav Igoravich Andreev, father, and tank), 37, was arrested by Swiss authorities in October

React to this headline:

Loading spinner

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty Read More »

How to weaponize LLMs to auto-hijack websites

How to weaponize LLMs to auto-hijack websites 2024-02-17 at 13:46 By Thomas Claburn We speak to professor who with colleagues tooled up OpenAI’s GPT-4 and other neural nets AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that enable automated interaction

React to this headline:

Loading spinner

How to weaponize LLMs to auto-hijack websites Read More »

How Businesses Can Safeguard Their Communication Channels Against Hackers

How Businesses Can Safeguard Their Communication Channels Against Hackers 2024-02-17 at 10:46 By Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses, misunderstandings, delays, and overlaps. Externally, frustration-free customer communication is directly correlated to a positive customer experience and higher satisfaction.  However, business communication

React to this headline:

Loading spinner

How Businesses Can Safeguard Their Communication Channels Against Hackers Read More »

Google Open Sources Magika: AI-Powered File Identification Tool

Google Open Sources Magika: AI-Powered File Identification Tool 2024-02-17 at 09:49 By Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types. “Magika outperforms conventional file identification methods providing an overall 30% accuracy boost and up to 95% higher precision

React to this headline:

Loading spinner

Google Open Sources Magika: AI-Powered File Identification Tool Read More »

Google open sources file-identifying Magika AI for malware hunters and others

Google open sources file-identifying Magika AI for malware hunters and others 2024-02-17 at 04:16 By Katyanna Quach Cool, but it’s 2024 – needs more hype, hand wringing, and flashy staged demos to be proper ML Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims

React to this headline:

Loading spinner

Google open sources file-identifying Magika AI for malware hunters and others Read More »

FTC asks normal folks if they’d like AI impersonation scam protection, too

FTC asks normal folks if they’d like AI impersonation scam protection, too 2024-02-17 at 01:03 By Brandon Vigliarolo Fakers face the wrath of Khan The FTC is moving to make not only the fraudulent AI impersonation of government and business folk illegal but is also now asking the American public if they’d like some protection

React to this headline:

Loading spinner

FTC asks normal folks if they’d like AI impersonation scam protection, too Read More »

Dems are at it again, trying to break open black-box algorithms

Dems are at it again, trying to break open black-box algorithms 2024-02-17 at 00:47 By Thomas Claburn Opening up code used in criminal prosecutions for scrutiny? Where’s the text-to-vid hype and doomsaying Democratic lawmakers once again have proposed legislation to ensure that the software source code used for criminal investigations can be examined and is

React to this headline:

Loading spinner

Dems are at it again, trying to break open black-box algorithms Read More »

Cutting-edge robot space surgeon makes first incision in Zero-G

Cutting-edge robot space surgeon makes first incision in Zero-G 2024-02-17 at 00:16 By Brandon Vigliarolo One giant leap for astronaut medicine The world’s first remote-operated robot space surgeon has been successfully tested, the team behind the device said this week.… This article is an excerpt from The Register View Original Source React to this headline:

React to this headline:

Loading spinner

Cutting-edge robot space surgeon makes first incision in Zero-G Read More »

Oxide reimagines private cloud as… a 3,000-pound blade server?

Oxide reimagines private cloud as… a 3,000-pound blade server? 2024-02-16 at 22:47 By Tobias Mann Rackscale system can be had with up to 2,048 cores, 32TB of RAM, and nearly a petabyte of flash Analysis  Over the past few years we’ve seen a number of OEMs, including Dell, HPE, and others trying to make on-prem

React to this headline:

Loading spinner

Oxide reimagines private cloud as… a 3,000-pound blade server? Read More »

DOJ Disrupts Russian Botnet Created Using Unchanged Admin Credentials

DOJ Disrupts Russian Botnet Created Using Unchanged Admin Credentials 2024-02-16 at 22:47 By The US Justice Department conducted a court-authorized operation in January that thwarted an on-going Russian GRU botnet campaign that used unchanged publicly known default administrator passwords to gain control of hundreds of Ubiquiti Edge OS routers. This activity once again shows how

React to this headline:

Loading spinner

DOJ Disrupts Russian Botnet Created Using Unchanged Admin Credentials Read More »

Scroll to Top