October 2024

Microsoft’s Arm-based Cobalt 100 CPU now live and powering Azure VMs

Microsoft’s Arm-based Cobalt 100 CPU now live and powering Azure VMs 2024-10-21 at 09:46 By Simon Sharwood For general-purpose and memory-optimized workloads Microsoft’s Cobalt 100 Arm CPUs have reached general availability in its Azure cloud, creating another non-x86 option for running VMs in the Redmondian cloud.… This article is an excerpt from The Register View […]

React to this headline:

Loading spinner

Microsoft’s Arm-based Cobalt 100 CPU now live and powering Azure VMs Read More »

Tesla, Intel, deny they’re the foreign company China just accused of making maps that threaten national security

Tesla, Intel, deny they’re the foreign company China just accused of making maps that threaten national security 2024-10-21 at 08:46 By Laura Dobberstein As TSMC defends itself against report it may have helped Huawei Tesla has denied it was involved in illegal-map making activities in China after Beijing asserted an unnamed foreign firm working on

React to this headline:

Loading spinner

Tesla, Intel, deny they’re the foreign company China just accused of making maps that threaten national security Read More »

Building secure AI with MLSecOps

Building secure AI with MLSecOps 2024-10-21 at 07:31 By Mirko Zorz In this Help Net Security interview, Ian Swanson, CEO of Protect AI, discusses the concept of “secure AI by design.” By adopting frameworks like Machine Learning Security Operations (MLSecOps) and focusing on transparency, organizations can build resilient AI systems that are both safe and

React to this headline:

Loading spinner

Building secure AI with MLSecOps Read More »

Navigating the new terrain: Pioneering smart solutions in retail

Navigating the new terrain: Pioneering smart solutions in retail 2024-10-21 at 07:16 By In the dynamic world of retail, the pace of change has accelerated dramatically, driven by technological innovation and a shared commitment to exceeding customer expectations.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to

React to this headline:

Loading spinner

Navigating the new terrain: Pioneering smart solutions in retail Read More »

Evolving cybercriminal tactics targeting SMBs

Evolving cybercriminal tactics targeting SMBs 2024-10-21 at 07:01 By Help Net Security A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net Security video, David Langlands, Chief Security Officer at Todyl, discusses these evolving cyber threats. Here are the

React to this headline:

Loading spinner

Evolving cybercriminal tactics targeting SMBs Read More »

Chinese chipmaker Loongson now just three to five years off the pace on the desktop

Chinese chipmaker Loongson now just three to five years off the pace on the desktop 2024-10-21 at 06:46 By Simon Sharwood Claims forthcoming chip catches up to Alder Lake and Xen 2 Chinese chip designer Loongson last week teased products that it claimed will deliver the same performance that Intel and AMD achieved around five

React to this headline:

Loading spinner

Chinese chipmaker Loongson now just three to five years off the pace on the desktop Read More »

Aranya: Open-source toolkit to accelerate secure by design concepts

Aranya: Open-source toolkit to accelerate secure by design concepts 2024-10-21 at 06:31 By Help Net Security SpiderOak launched its core technology platform as an open-source project called Aranya. This release provides the same level of security as the company’s platform, which is already in use by the Department of Defense. The Aranya project marks a

React to this headline:

Loading spinner

Aranya: Open-source toolkit to accelerate secure by design concepts Read More »

Should the CISOs role be split into two functions?

Should the CISOs role be split into two functions? 2024-10-21 at 06:01 By Help Net Security 84% of CISOs believe the role needs to be split into two functions – one technical and one business-focused, to maximize security and organizational resilience, according to Trellix. Regulatory demands pose a growing challenge for CISOs The research reveals

React to this headline:

Loading spinner

Should the CISOs role be split into two functions? Read More »

Internet Archive exposed again – this time through Zendesk

Internet Archive exposed again – this time through Zendesk 2024-10-21 at 04:46 By Simon Sharwood Org turns its woes into a fundraising opportunity Despite the Internet Archive’s assurances it’s back on its feet after a recent infosec incident, the org still appears to be in trouble after parties unknown claimed to hold access tokens to

React to this headline:

Loading spinner

Internet Archive exposed again – this time through Zendesk Read More »

Global Internet Freedom Declines for the 14th Year in a Row

Global Internet Freedom Declines for the 14th Year in a Row 2024-10-20 at 18:58 View original post at vpnMentor Freedom House’s Freedom on the Net 2024 report exposed a continued global decline in internet freedom for the 14th consecutive year. It found that a significant number of governments across 72 analyzed countries employed censorship and

React to this headline:

Loading spinner

Global Internet Freedom Declines for the 14th Year in a Row Read More »

Open source LLM tool primed to sniff out Python zero-days

Open source LLM tool primed to sniff out Python zero-days 2024-10-20 at 12:40 By Thomas Claburn The static analyzer uses Claude AI to identify vulns and suggest exploit code Researchers with Seattle-based Protect AI plan to release a free, open source tool that can find zero-day vulnerabilities in Python codebases with the help of Anthropic’s

React to this headline:

Loading spinner

Open source LLM tool primed to sniff out Python zero-days Read More »

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials 2024-10-20 at 12:40 By Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as part of a phishing attack designed to steal user credentials. Russian cybersecurity company Positive Technologies said it discovered last month that

React to this headline:

Loading spinner

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials Read More »

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion 2024-10-20 at 11:10 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113) Last week, CISA added

React to this headline:

Loading spinner

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion Read More »

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data 2024-10-20 at 10:55 By North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new

React to this headline:

Loading spinner

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data Read More »

California cops cuff suspect in deadly drone-assisted drug deal

California cops cuff suspect in deadly drone-assisted drug deal 2024-10-19 at 18:46 By Iain Thomson ‘Crany’ also captured with three ‘ghost guns’ A California man has been charged with using a DJI drone to distribute drugs, which resulted in a fatal overdose.… This article is an excerpt from The Register View Original Source React to

React to this headline:

Loading spinner

California cops cuff suspect in deadly drone-assisted drug deal Read More »

Acronym Overdose – Navigating the Complex Data Security Landscape

Acronym Overdose – Navigating the Complex Data Security Landscape 2024-10-19 at 13:01 By In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together

React to this headline:

Loading spinner

Acronym Overdose – Navigating the Complex Data Security Landscape Read More »

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks 2024-10-19 at 11:01 By A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain. “The group under

React to this headline:

Loading spinner

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks Read More »

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites 2024-10-19 at 01:46 By Brandon Vigliarolo Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more in brief  A critical security update for the near-ubiquitous WordPress plugin Jetpack was released last week. Site administrators should ensure

React to this headline:

Loading spinner

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites Read More »

Scroll to Top