September 2024

Organizations are changing cybersecurity providers in wake of Crowdstrike outage

Organizations are changing cybersecurity providers in wake of Crowdstrike outage 2024-09-23 at 15:46 By Zeljka Zorz More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. The recent […]

React to this headline:

Loading spinner

Organizations are changing cybersecurity providers in wake of Crowdstrike outage Read More »

UPS supplier’s password policy flip-flops from unlimited, to 32, then 64 characters

UPS supplier’s password policy flip-flops from unlimited, to 32, then 64 characters 2024-09-23 at 15:16 By Connor Jones That ‘third party’ person sure is responsible for a lot of IT blunders, eh? A major IT hardware manufacturer is correcting a recent security update after customers complained of a password character limit being introduced when there

React to this headline:

Loading spinner

UPS supplier’s password policy flip-flops from unlimited, to 32, then 64 characters Read More »

THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22)

THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22) 2024-09-23 at 15:16 By Hold on tight, folks, because last week’s cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean hackers dangling “dream jobs” to expose a new malware, to a surprising twist in the Apple vs. NSO Group saga. Even the

React to this headline:

Loading spinner

THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22) Read More »

Why ‘Never Expire’ Passwords Can Be a Risky Decision

Why ‘Never Expire’ Passwords Can Be a Risky Decision 2024-09-23 at 15:16 By Password resets can be frustrating for end users. Nobody likes being interrupted by the ‘time to change your password’ notification – and they like it even less when the new passwords they create are rejected by their organization’s password policy. IT teams

React to this headline:

Loading spinner

Why ‘Never Expire’ Passwords Can Be a Risky Decision Read More »

Versa Networks Patches Vulnerability Exposing Authentication Tokens

Versa Networks Patches Vulnerability Exposing Authentication Tokens 2024-09-23 at 15:01 By Ionut Arghire Versa Networks has released patches for a Versa Director vulnerability for which proof-of-concept (PoC) code exists. The post Versa Networks Patches Vulnerability Exposing Authentication Tokens appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Versa Networks Patches Vulnerability Exposing Authentication Tokens Read More »

Cybersecurity Products Conking Out After macOS Sequoia Update

Cybersecurity Products Conking Out After macOS Sequoia Update 2024-09-23 at 15:01 By Ionut Arghire macOS Sequoia updates are causing cybersecurity software failures and breaking network connectivity for many. The post Cybersecurity Products Conking Out After macOS Sequoia Update appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Cybersecurity Products Conking Out After macOS Sequoia Update Read More »

Feel free to ignore GenAI for now – a new kind of software developer is being born

Feel free to ignore GenAI for now – a new kind of software developer is being born 2024-09-23 at 14:31 By Richard Speed Kubernetes whizz says devs can redefine their roles and capitalize on coding ML rewards Interview  Software industry veteran and developer advocate Kelsey Hightower, well known for his contributions to the Kubernetes community,

React to this headline:

Loading spinner

Feel free to ignore GenAI for now – a new kind of software developer is being born Read More »

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk 2024-09-23 at 14:01 By A critical security flaw has been disclosed in the Microchip Advanced Software Framework (ASF) that, if successfully exploited, could lead to remote code execution. The vulnerability, tracked as CVE-2024-7490, carries a CVSS score of 9.5 out of a

React to this headline:

Loading spinner

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk Read More »

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls 2024-09-23 at 14:01 By Popular social messaging platform Discord has announced that it’s rolling out a new custom end-to-end encrypted (E2EE) protocol to secure audio and video calls. The protocol has been dubbed DAVE, short for Discord’s audio and video end-to-end encryption (“E2EE

React to this headline:

Loading spinner

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls Read More »

Axiom Space puts a brave face on claims of dire finances

Axiom Space puts a brave face on claims of dire finances 2024-09-23 at 13:31 By Richard Speed Losing money on missions, space station delayed, but ‘we will not be deterred’ Axiom Space CEO Dr Kam Ghaffarian is attempting to reassure customers after an interview that did not go entirely to plan.… This article is an

React to this headline:

Loading spinner

Axiom Space puts a brave face on claims of dire finances Read More »

Why Do Criminals Love Phishing-as-a-Service Platforms?

Why Do Criminals Love Phishing-as-a-Service Platforms? 2024-09-23 at 13:01 By Rodel Mendrez Phishing-as-a-Service (PaaS) platforms have become the go-to tool for cybercriminals, to launch sophisticated phishing campaigns targeting the general public and businesses, especially in the financial services sector. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why Do Criminals Love Phishing-as-a-Service Platforms? Read More »

NHS drops another billion on tech in the hope of finally going digital

NHS drops another billion on tech in the hope of finally going digital 2024-09-23 at 12:46 By Lindsay Clark Framework promised last year set to reach value of up to £2.5B after chat with supply chain The UK’s health system has added £1 billion to a tech deal for software and infrastructure after an “engagement”

React to this headline:

Loading spinner

NHS drops another billion on tech in the hope of finally going digital Read More »

Bitdefender debuts GravityZone PHASR, enhancing security through user behavior analysis

Bitdefender debuts GravityZone PHASR, enhancing security through user behavior analysis 2024-09-23 at 12:16 By Industry News Bitdefender has unveiled Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), a technology that transforms how defense-in-depth-security is applied and managed across businesses. GravityZone PHASR analyzes individual user behavior such as application use, resource privileges, and others, clustering

React to this headline:

Loading spinner

Bitdefender debuts GravityZone PHASR, enhancing security through user behavior analysis Read More »

AI to power the corporate Windows 11 refresh? Nobody’s buying that

AI to power the corporate Windows 11 refresh? Nobody’s buying that 2024-09-23 at 11:46 By Rupert Goodwins Microsoft should look to Apple for lessons in flogging dead horses Opinion  In the early 2010s, Intel’s PR did the tech press rounds with a hot story. We’re so far ahead in chip fab, they said, that nobody

React to this headline:

Loading spinner

AI to power the corporate Windows 11 refresh? Nobody’s buying that Read More »

Did you hear the one about the help desk chap who abused privileges to prank his mate?

Did you hear the one about the help desk chap who abused privileges to prank his mate? 2024-09-23 at 10:51 By Matthew JC Powell The result was no joke, thanks to a Microsoft glitch Who, Me?  Welcome, dear reader, to another instalment of Who, Me? in which Reg readers share tales of techie woe to

React to this headline:

Loading spinner

Did you hear the one about the help desk chap who abused privileges to prank his mate? Read More »

Undetected Android Spyware Targeting Individuals In South Korea

Undetected Android Spyware Targeting Individuals In South Korea 2024-09-23 at 10:51 By rohansinhacyblecom Key Takeaways Overview Cyble Research and Intelligence Labs (CRIL) has uncovered a previously undetected Android spyware campaign targeting individuals in South Korea, which has been active since June 2024. The spyware leverages an Amazon AWS S3 bucket as its Command and Control

React to this headline:

Loading spinner

Undetected Android Spyware Targeting Individuals In South Korea Read More »

Chinese server-maker Inspur claims it’s on track for better liquid cooling with ‘railway sleeper’ design

Chinese server-maker Inspur claims it’s on track for better liquid cooling with ‘railway sleeper’ design 2024-09-23 at 10:31 By Laura Dobberstein Beijing is happy at surging sales and production capacity, falling energy requirements Chinese server-maker and contract manufacturer Inspur has detailed a memory cooling tech it claims doubles the heat dissipation efficiency of traditional air

React to this headline:

Loading spinner

Chinese server-maker Inspur claims it’s on track for better liquid cooling with ‘railway sleeper’ design Read More »

New PondRAT Malware Hidden in Python Packages Targets Software Developers

New PondRAT Malware Hidden in Python Packages Targets Software Developers 2024-09-23 at 10:31 By Threat actors with ties to North Korea have been observed using poisoned Python packages as a way to deliver a new malware called PondRAT as part of an ongoing campaign. PondRAT, according to new findings from Palo Alto Networks Unit 42,

React to this headline:

Loading spinner

New PondRAT Malware Hidden in Python Packages Targets Software Developers Read More »

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town 2024-09-23 at 10:01 By Jessica Lyons No malware crew linked to this latest red-teaming tool yet Attackers are using Splinter, a new post-exploitation tool, to wreak havoc in victims’ IT environments after initial infiltration, utilizing capabilities such as executing Windows commands, stealing files, collecting

React to this headline:

Loading spinner

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town Read More »

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware 2024-09-23 at 09:16 By A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other countries in the Asia-Pacific (APAC) region, by exploiting a recently patched critical security flaw impacting OSGeo GeoServer GeoTools. The intrusion activity,

React to this headline:

Loading spinner

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware Read More »

Scroll to Top