2024

Axiom Space shuffles space station assembly sequence – to get it standalone sooner

Axiom Space shuffles space station assembly sequence – to get it standalone sooner 2024-12-19 at 23:33 By Richard Speed Aiming to be freeflying by 2028. Handy if anything should happen to the ISS Axiom Space has shuffled the assembly sequence of its space station to remove any dependence it would have on the International Space […]

React to this headline:

Loading spinner

Axiom Space shuffles space station assembly sequence – to get it standalone sooner Read More »

US bipartisan group publishes laundry list of AI policy requests

US bipartisan group publishes laundry list of AI policy requests 2024-12-19 at 21:33 By Brandon Vigliarolo Chair Jay Obernolte urges Congress to act – whether it will is another matter After 10 months of work, the bipartisan Task Force on Artificial Intelligence in the US house of Congress has unveiled its report, outlining recommendations for

React to this headline:

Loading spinner

US bipartisan group publishes laundry list of AI policy requests Read More »

Million GPU clusters, gigawatts of power – the scale of AI defies logic

Million GPU clusters, gigawatts of power – the scale of AI defies logic 2024-12-19 at 19:40 By Tobias Mann It’s not just one hyperbolic billionaire – the entire industry is chasing the AI dragon Comment  Next year will see some truly monstrous compute projects get underway as the AI boom enters its third year. Among

React to this headline:

Loading spinner

Million GPU clusters, gigawatts of power – the scale of AI defies logic Read More »

Texas Tech University Data Breach Affects 1.4M Patients

Texas Tech University Data Breach Affects 1.4M Patients 2024-12-19 at 19:18 View original post at vpnMentor Texas Tech University Health Sciences Center (TTUHSC) and its El Paso division have suffered a massive data breach impacting the personal information of over 1.4 million patients. The cyberattack, which occurred between September 17 and September 29, 2024, disrupted

React to this headline:

Loading spinner

Texas Tech University Data Breach Affects 1.4M Patients Read More »

Stranded in space: Starliner crew to remain in orbit even longer as SpaceX faces delays

Stranded in space: Starliner crew to remain in orbit even longer as SpaceX faces delays 2024-12-19 at 17:38 By Brandon Vigliarolo Week-long mission set to stretch into ninth month Two astronauts who traveled to the International Space Station aboard Boeing’s problem-plagued Starliner are facing another extended delay. … This article is an excerpt from The Register

React to this headline:

Loading spinner

Stranded in space: Starliner crew to remain in orbit even longer as SpaceX faces delays Read More »

Feds issue another warning about texting dangers — the scary reason to stop using two-factor authentication now

Feds issue another warning about texting dangers — the scary reason to stop using two-factor authentication now 2024-12-19 at 17:19 By Brooke Kato The warning comes a week after the FBI said cybercriminals, suspected to be from China, hacked into AT&T, T-Mobile and Verizon to spy on customers. This article is an excerpt from Latest Technology News and Product

React to this headline:

Loading spinner

Feds issue another warning about texting dangers — the scary reason to stop using two-factor authentication now Read More »

Cryptocurrency hackers stole $2.2 billion from platforms in 2024

Cryptocurrency hackers stole $2.2 billion from platforms in 2024 2024-12-19 at 17:18 By Zeljka Zorz $2.2 billion worth of cryptocurrency was stolen from various platforms in 2024, Chainalysis’ 2025 Crypto Crime Report has revealed. Of that sum, $1.34 billion was stolen by North Korea-affiliated hackers, across 47 hacking incidents (out of 303). Most targeted organizations

React to this headline:

Loading spinner

Cryptocurrency hackers stole $2.2 billion from platforms in 2024 Read More »

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools 2024-12-19 at 17:18 By Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve

React to this headline:

Loading spinner

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools Read More »

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture 2024-12-19 at 16:03 By Email is the #1 attack vector, responsible for 90% of phishing incidents. Business Email Compromise (BEC) attacks led to $3 billion in losses in 2023. A multi-layered email security solution like Trustwave MailMarshal can reduce risks effectively. Fact: An organization

React to this headline:

Loading spinner

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture Read More »

Apple and Meta trade barbs over interoperability requests

Apple and Meta trade barbs over interoperability requests 2024-12-19 at 15:48 By Richard Speed Both are only thinking about the best interests of users, of course The European Commission (EC) has continued pushing Apple to open up more of iOS to third parties, and Apple has pushed back, warning that doing so risks user privacy.…

React to this headline:

Loading spinner

Apple and Meta trade barbs over interoperability requests Read More »

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords 2024-12-19 at 15:48 By Juniper Networks is warning that Session Smart Router (SSR) products with default passwords are being targeted as part of a malicious campaign that deploys the Mirai botnet malware. The company said it’s issuing the advisory after “several customers” reported anomalous

React to this headline:

Loading spinner

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords Read More »

NETSCOUT uses AI/ML technology to secure critical IT infrastructure

NETSCOUT uses AI/ML technology to secure critical IT infrastructure 2024-12-19 at 15:33 By Industry News NETSCOUT updates its Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM) products as part of its Adaptive DDoS Protection Solution to combat AI-enabled DDoS threats and protect critical IT infrastructure. DDoS threats and protect critical IT infrastructure. NETSCOUT’s DDoS

React to this headline:

Loading spinner

NETSCOUT uses AI/ML technology to secure critical IT infrastructure Read More »

CISA orders federal agencies to secure their Microsoft cloud environments

CISA orders federal agencies to secure their Microsoft cloud environments 2024-12-19 at 15:04 By Zeljka Zorz The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implementing Secure Practices for Cloud Services

React to this headline:

Loading spinner

CISA orders federal agencies to secure their Microsoft cloud environments Read More »

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products 

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  2024-12-19 at 14:18 By Ashish Khaitan Europe embarks on a new chapter in cybersecurity with the entry into force of the Cyber Resilience Act (CRA). This marks the first-ever EU legislation addressing cybersecurity across a broad range of digital products. The CRA will

React to this headline:

Loading spinner

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  Read More »

Legit Security provides insights into the enterprise’s secrets posture

Legit Security provides insights into the enterprise’s secrets posture 2024-12-19 at 14:18 By Industry News Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions taken

React to this headline:

Loading spinner

Legit Security provides insights into the enterprise’s secrets posture Read More »

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits 2024-12-19 at 14:03 By Fortinet has issued an advisory for a now-patched critical security flaw impacting Wireless LAN Manager (FortiWLM) that could lead to disclosure of sensitive information. The vulnerability, tracked as CVE-2023-34990, carries a CVSS score of 9.6 out of a

React to this headline:

Loading spinner

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits Read More »

Watchdog deep-sixes job ad that was actually pay-to-play training course

Watchdog deep-sixes job ad that was actually pay-to-play training course 2024-12-19 at 13:48 By Richard Speed Misleading listing on a recruitment site? Whatever next? The UK Advertising Standards Authority (ASA) has slapped IT Career Change Ltd on the wrist over a September 2024 ad promoting a career in Health & Safety.… This article is an

React to this headline:

Loading spinner

Watchdog deep-sixes job ad that was actually pay-to-play training course Read More »

Top 10 Industries Targeted by Threat Actors in 2024 

Top 10 Industries Targeted by Threat Actors in 2024  2024-12-19 at 13:20 By Ashish Khaitan As cyber threats continue to evolve, threat actors are refining their techniques and focusing on industries that hold valuable information or play critical roles in society. From ransomware attacks paralyzing operations to data breaches compromising millions of individuals, no sector

React to this headline:

Loading spinner

Top 10 Industries Targeted by Threat Actors in 2024  Read More »

Critical Zero-Day Vulnerability in Windows Server 2012 Allows MotW Security Bypass

Critical Zero-Day Vulnerability in Windows Server 2012 Allows MotW Security Bypass 2024-12-19 at 12:04 View original post at Safety Detectives A critical zero-day vulnerability has been discovered in Windows Server 2012 and Server 2012 R2, enabling attackers to bypass the Mark of the Web (MotW) security feature. This flaw, undetected for over two years, poses

React to this headline:

Loading spinner

Critical Zero-Day Vulnerability in Windows Server 2012 Allows MotW Security Bypass Read More »

Investigation: North Korean Hackers Behind $50M Radiant Capital Heist

Investigation: North Korean Hackers Behind $50M Radiant Capital Heist 2024-12-19 at 12:04 View original post at Safety Detectives Radiant Capital, a decentralized finance (DeFi) project, has confirmed that a North Korean threat actor orchestrated the $50 million heist it suffered in October. The revelation comes after an in-depth investigation involving cybersecurity firm Mandiant, which attributed

React to this headline:

Loading spinner

Investigation: North Korean Hackers Behind $50M Radiant Capital Heist Read More »

Scroll to Top