October 2024

Productivity suites, Exchange servers in path of Microsoft’s end-of-support wave

Productivity suites, Exchange servers in path of Microsoft’s end-of-support wave 2024-10-16 at 16:19 By Richard Speed Less than a year to go – is your enterprise ready for the change? Office and Exchange Server have joined Windows 10 in a march to obsolescence, with less than a year until support is cut for 2016 and […]

React to this headline:

Loading spinner

Productivity suites, Exchange servers in path of Microsoft’s end-of-support wave Read More »

Inexorable march of progress at SAP threatens to leave users behind

Inexorable march of progress at SAP threatens to leave users behind 2024-10-16 at 15:46 By Lindsay Clark AI hardly a hot topic with some customers calling for more innovation on-prem Nearly a quarter of SAP users in its European heartlands say they cannot keep up with technological, social or economic advances.… This article is an

React to this headline:

Loading spinner

Inexorable march of progress at SAP threatens to leave users behind Read More »

Defenders must adapt to shrinking exploitation timelines

Defenders must adapt to shrinking exploitation timelines 2024-10-16 at 15:16 By Zeljka Zorz A new report from Mandiant reveals that the average time-to-exploit vulnerabilities before or after a patch is released has plunged to just five days in 2023, down from 32 days in 2021 in 2022. One reason for this is the fact that,

React to this headline:

Loading spinner

Defenders must adapt to shrinking exploitation timelines Read More »

New iPhone feature could expose employees’ personal information

New iPhone feature could expose employees’ personal information 2024-10-16 at 15:04 By Cybersecurity researchers have discovered that Apple’s new “Mirroring” feature could expose an employee’s personal applications. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

New iPhone feature could expose employees’ personal information Read More »

Over half of tech leaders cite phishing as a top security concern

Over half of tech leaders cite phishing as a top security concern 2024-10-16 at 15:04 By A report found that 33.9% of tech professionals report a shortage of AI security skills, particularly around emerging vulnerabilities like prompt injection. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to

React to this headline:

Loading spinner

Over half of tech leaders cite phishing as a top security concern Read More »

Windows 7 finally checks out as POSReady 7 closes the till on an era

Windows 7 finally checks out as POSReady 7 closes the till on an era 2024-10-16 at 14:46 By Liam Proven Embedded versions live longer – including Windows 10 LTSC Windows Embedded POSReady 7, the last supported version of Windows 7, has hit the end of the road nearly five years after the desktop edition.… This

React to this headline:

Loading spinner

Windows 7 finally checks out as POSReady 7 closes the till on an era Read More »

Akamai launches Behavioral DDoS Engine for App & API Protection

Akamai launches Behavioral DDoS Engine for App & API Protection 2024-10-16 at 14:46 By Industry News Akamai has unveiled the availability of its Behavioral DDoS Engine for the App & API Protector solution. This new capability leverages machine learning for automatic, proactive protection against application-layer DDoS attacks. Behavioral DDoS Engine offers advanced detection and mitigation

React to this headline:

Loading spinner

Akamai launches Behavioral DDoS Engine for App & API Protection Read More »

From Misuse to Abuse: AI Risks and Attacks

From Misuse to Abuse: AI Risks and Attacks 2024-10-16 at 14:46 By AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs. Hype “AI will not replace humans in the near future. But humans who

React to this headline:

Loading spinner

From Misuse to Abuse: AI Risks and Attacks Read More »

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware 2024-10-16 at 14:46 By The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT. The vulnerability in question is CVE-2024-38178 (CVSS score: 7.5), a memory

React to this headline:

Loading spinner

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware Read More »

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data 2024-10-16 at 14:35 By This article uncovers a Golang ransomware abusing AWS S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions. This article is an excerpt

React to this headline:

Loading spinner

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data Read More »

Lookout offers protection against social engineering and executive impersonation attacks

Lookout offers protection against social engineering and executive impersonation attacks 2024-10-16 at 14:35 By Industry News Lookout announced new features for its Mobile Threat Defense (MTD) solution, Lookout Mobile Endpoint Security. These advancements provide comprehensive protection against two fast-growing advanced social engineering tactics: smishing (SMS phishing) and executive impersonation fraud texts. Lookout offers a defense-in-depth

React to this headline:

Loading spinner

Lookout offers protection against social engineering and executive impersonation attacks Read More »

Open-sourcing of WinAmp goes badly as owners delete entire repo

Open-sourcing of WinAmp goes badly as owners delete entire repo 2024-10-16 at 14:14 By Liam Proven As badly as the later development of WinAmp itself, really The owners of WinAmp have just deleted their entire repo one month after uploading the source code to GitHub. Lots of source code, and quite possibly, not all of

React to this headline:

Loading spinner

Open-sourcing of WinAmp goes badly as owners delete entire repo Read More »

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products 2024-10-16 at 14:14 By daksh sharma Overview The Cybersecurity and Infrastructure Security Agency (CISA) has released a critical advisory report highlighting vulnerabilities recently added to the Known Exploited Vulnerability (KEV) catalog. These vulnerabilities pose risks to organizations and require immediate attention. CISA categorizes vulnerabilities based on

React to this headline:

Loading spinner

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products Read More »

‘Newport would look like Dubai’ if guy could dumpster dive for lost Bitcoin hard drive

‘Newport would look like Dubai’ if guy could dumpster dive for lost Bitcoin hard drive 2024-10-16 at 13:31 By Richard Currie To Wales now, where crypto bro sues to be allowed to excavate landfill site Last time we met 39-year-old James Howells from Newport, Wales, he was petitioning his local council to let him excavate

React to this headline:

Loading spinner

‘Newport would look like Dubai’ if guy could dumpster dive for lost Bitcoin hard drive Read More »

5 Techniques for Collecting Cyber Threat Intelligence

5 Techniques for Collecting Cyber Threat Intelligence 2024-10-16 at 13:31 By To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence. Let’s consider five

React to this headline:

Loading spinner

5 Techniques for Collecting Cyber Threat Intelligence Read More »

Swift launches AI-powered fraud detection service

Swift launches AI-powered fraud detection service 2024-10-16 at 13:20 By Industry News Swift announced that it is rolling out new AI-enhanced fraud detection to help the global payments industry step up its defence as bad actors grow increasingly sophisticated. Available from January 2025, the service is the result of extensive collaboration with banks from around

React to this headline:

Loading spinner

Swift launches AI-powered fraud detection service Read More »

Android 15 unveils new security features to protect sensitive data

Android 15 unveils new security features to protect sensitive data 2024-10-16 at 13:20 By Help Net Security Android 15 brings enhanced security features to protect your sensitive health, financial, and personal data from theft and fraud. It also introduces productivity improvements for large-screen devices and updates to apps like the camera, messaging, and passkeys. Android

React to this headline:

Loading spinner

Android 15 unveils new security features to protect sensitive data Read More »

NHS England warned about plans to extend Covid-era rules for patient data access

NHS England warned about plans to extend Covid-era rules for patient data access 2024-10-16 at 12:31 By Lindsay Clark Governance and public consultation need work before rule change goes ahead A group overseeing UK health data sharing has advised the government not to expand legal rules allowing access to patient information introduced during the Covid

React to this headline:

Loading spinner

NHS England warned about plans to extend Covid-era rules for patient data access Read More »

Netskope extends data security with DSPM capabilities

Netskope extends data security with DSPM capabilities 2024-10-16 at 12:31 By Industry News Netskope announced new enhancements to the Netskope One platform, extending the company’s data protection solutions to include integrated data security posture management (DSPM) capabilities.  Modern data protection continues to be a top priority for organizations as they optimize hybrid work environments, adopt

React to this headline:

Loading spinner

Netskope extends data security with DSPM capabilities Read More »

Akeyless unveils Unified Secrets and Machine Identity Platform

Akeyless unveils Unified Secrets and Machine Identity Platform 2024-10-16 at 12:01 By Industry News Akeyless announced its Unified Secrets and Machine Identity Platform, designed to address the leading cause of breaches—compromised identity credentials. Organizations are more exposed than ever as machine identities far outnumber human identities. High-profile breaches in 2024 demonstrate the risks of unsecured

React to this headline:

Loading spinner

Akeyless unveils Unified Secrets and Machine Identity Platform Read More »

Scroll to Top