August 2024

Rickety Raptor Lake CPUs won’t lose Turbo-boosted speeds after microcode medicine, Intel claims

Rickety Raptor Lake CPUs won’t lose Turbo-boosted speeds after microcode medicine, Intel claims 2024-08-08 at 10:46 By Matthew Connatser Chipzilla still has ways to stop these processors cooking in their own juices Intel has claimed the microcode update it’s delivering for wonky 13th and 14th generation Raptor Lake CPUs won’t compromise the chips’ top end […]

React to this headline:

Loading spinner

Rickety Raptor Lake CPUs won’t lose Turbo-boosted speeds after microcode medicine, Intel claims Read More »

Rising AI tide lifts price of all chips – HBM, natch, but also slower memory and storage

Rising AI tide lifts price of all chips – HBM, natch, but also slower memory and storage 2024-08-08 at 09:33 By Tobias Mann Thank binary brainboxes for helping to inflate PC and Smartphone prices AI infrastructure is a hot commodity, as is the high bandwidth memory (HBM) on which it depends, driving up prices for

React to this headline:

Loading spinner

Rising AI tide lifts price of all chips – HBM, natch, but also slower memory and storage Read More »

Photos: Black Hat USA 2024 Startup City

Photos: Black Hat USA 2024 Startup City 2024-08-08 at 09:33 By Help Net Security Here’s a look inside Startup City at Black Hat USA 2024. The featured vendors are: BackBox, Cybral, DryRun Security, HackNotice, Heeler Security, Hushmesh, MobileHop, Nagomi Security, Ox Security, Plainsea, Raven, Scribe Security, Spyderbat, and Xygeni. The post Photos: Black Hat USA

React to this headline:

Loading spinner

Photos: Black Hat USA 2024 Startup City Read More »

SSHamble: Open-source security testing of SSH services

SSHamble: Open-source security testing of SSH services 2024-08-08 at 09:33 By Help Net Security runZero published new research on Secure Shell (SSH) exposures and unveiled a corresponding open-source tool, SSHamble. This tool helps security teams validate SSH implementations by testing for uncommon but dangerous misconfigurations and software bugs. Discovered weaknesses During their presentation at Black

React to this headline:

Loading spinner

SSHamble: Open-source security testing of SSH services Read More »

FBI and CISA Warn of BlackSuit Ransomware That Demands Up to $500 Million

FBI and CISA Warn of BlackSuit Ransomware That Demands Up to $500 Million 2024-08-08 at 09:32 By The ransomware strain known as BlackSuit has demanded as much as $500 million in ransoms to date, with one individual ransom demand hitting $60 million. That’s according to an updated advisory from the U.S. Cybersecurity and Infrastructure Security

React to this headline:

Loading spinner

FBI and CISA Warn of BlackSuit Ransomware That Demands Up to $500 Million Read More »

Critical Security Flaw in WhatsUp Gold Under Active Attack – Patch Now

Critical Security Flaw in WhatsUp Gold Under Active Attack – Patch Now 2024-08-08 at 09:32 By A critical security flaw impacting Progress Software WhatsUp Gold is seeing active exploitation attempts, making it essential that users move quickly to apply the latest. The vulnerability in question is CVE-2024-4885 (CVSS score: 9.8), an unauthenticated remote code execution

React to this headline:

Loading spinner

Critical Security Flaw in WhatsUp Gold Under Active Attack – Patch Now Read More »

ICANN reserves .internal for private use at the DNS level

ICANN reserves .internal for private use at the DNS level 2024-08-08 at 08:46 By Simon Sharwood Vint Cerf revealed Google already uses the string, as do plenty of others The Internet Corporation for Assigned Names and Numbers (ICANN) has agreed to reserve the .internal top-level domain so it can become the equivalent to using the

React to this headline:

Loading spinner

ICANN reserves .internal for private use at the DNS level Read More »

Traceeshark: Open-source plugin for Wireshark

Traceeshark: Open-source plugin for Wireshark 2024-08-08 at 08:01 By Mirko Zorz Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents. It enhances the capabilities of Aqua Tracee, an open-source runtime security and forensics tool, and allows users to analyze kernel-level event and behavioral detection alongside network traffic. With Traceeshark,

React to this headline:

Loading spinner

Traceeshark: Open-source plugin for Wireshark Read More »

How network segmentation can strengthen visibility in OT networks

How network segmentation can strengthen visibility in OT networks 2024-08-08 at 07:31 By Help Net Security What role does the firewall play in the protection of operational technology (OT) networks and systems? Many would say that it’s the defensive mechanism to protect that environment from IT and the outside world. For the operators responsible for

React to this headline:

Loading spinner

How network segmentation can strengthen visibility in OT networks Read More »

Would you rather buy space broadband from a billionaire, or Communist China?

Would you rather buy space broadband from a billionaire, or Communist China? 2024-08-08 at 07:01 By Laura Dobberstein Beijing’s first Starlink-slayers are in orbit, and buyers beyond the Great Firewall are on the agenda The first batch of satellites in China’s answer to Starlink – known as the Qianfan Constellation, sometimes also called G60 –

React to this headline:

Loading spinner

Would you rather buy space broadband from a billionaire, or Communist China? Read More »

AI security 2024: Key insights for staying ahead of threats

AI security 2024: Key insights for staying ahead of threats 2024-08-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the industry. Oshiba highlights vulnerabilities in technology systems and the proactive measures needed to mitigate

React to this headline:

Loading spinner

AI security 2024: Key insights for staying ahead of threats Read More »

Your victim’s Windows PC fully patched? Just force undo its updates and exploit away

Your victim’s Windows PC fully patched? Just force undo its updates and exploit away 2024-08-08 at 06:46 By Brandon Vigliarolo This guy showed the world how today – plus or minus some caveats Black Hat  Techniques to forcibly remove security patches from Windows machines so that fixed vulnerabilities are exploitable again were demonstrated this week.…

React to this headline:

Loading spinner

Your victim’s Windows PC fully patched? Just force undo its updates and exploit away Read More »

Angstrom age angst ameliorated as ASML’s High NA EUV chipmaking kit delivers

Angstrom age angst ameliorated as ASML’s High NA EUV chipmaking kit delivers 2024-08-08 at 06:32 By Dan Robinson Imec tests show Dutch master etcher has markedly boosted transistor density Research org Imec claims it has demonstrated the viability of ASML’s next generation extreme UV technology for next generation chip manufacturing, showing off how it can

React to this headline:

Loading spinner

Angstrom age angst ameliorated as ASML’s High NA EUV chipmaking kit delivers Read More »

Securing against GenAI weaponization

Securing against GenAI weaponization 2024-08-08 at 06:31 By Help Net Security In this Help Net Security video, Aaron Fulkerson, CEO of Opaque, discusses how the weaponization of generative AI (GenAI) has made existing data privacy practices (like masking, anonymization, tokenization, etc.) obsolete. Fulkerson provides recommendations for companies to realize they must proactively plan to mitigate

React to this headline:

Loading spinner

Securing against GenAI weaponization Read More »

Ransomware operators continue to innovate

Ransomware operators continue to innovate 2024-08-08 at 06:01 By Help Net Security Ransomware groups continue to refine their craft, building and scaling business models that resemble legitimate corporate enterprises, according to Rapid7. They market their services to prospective buyers, offer company insiders commissions in exchange for access, and run formal bug bounty programs. In addition,

React to this headline:

Loading spinner

Ransomware operators continue to innovate Read More »

Download: CIS Critical Security Controls v8.1

Download: CIS Critical Security Controls v8.1 2024-08-08 at 05:46 By Help Net Security Version 8.1 of the CIS Critical Security Controls (CIS Controls) is an iterative update to version 8.0. It offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a clear path to improve your organization’s cyber defense program. CIS Controls v8.1 features

React to this headline:

Loading spinner

Download: CIS Critical Security Controls v8.1 Read More »

Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware

Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware 2024-08-08 at 05:01 By Jessica Lyons Why run your own evil infrastructure when Big Tech offers robust tools hosted at trusted URLs? Black Hat  State-sponsored cyber spies and criminals are increasingly using legitimate cloud services to attack their victims, according to

React to this headline:

Loading spinner

Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware Read More »

Samsung boosts bug bug bounty to a cool million for cracks of the Knox Vault subsystem

Samsung boosts bug bug bounty to a cool million for cracks of the Knox Vault subsystem 2024-08-08 at 04:31 By Iain Thomson Good luck, crackers: It’s an isolated processor and storage enclave, and top dollar only comes from a remote attack Samsung has dangled its first $1 million bug bounty for anyone who successfully compromises

React to this headline:

Loading spinner

Samsung boosts bug bug bounty to a cool million for cracks of the Knox Vault subsystem Read More »

Scroll to Top