Technology

May 31, 2024NewsroomNetwork Security / Cyber Attack More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users’ access to the internet. The mysterious event, which took place between October 25 and 27, 2023, and impacted a
0 Comments
May 31, 2024NewsroomThreat Detection / Endpoint Security Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across the globe. The sharing of digital content has increased significantly in recent years, mainly via email, digital documents, and chat. In turn, this has created an expansive attack surface and has
0 Comments
Anthropic is rolling out a new feature for Claude-3, its family of artificial intelligence (AI) models. Dubbed ‘Tool Use’ (or Function Calling), this feature enables Claude to interact with external tools and Application Programming Interfaces (APIs) to perform a wide variety of tasks. This way, the AI chatbot can perform tasks which are more specific
0 Comments
May 30, 2024NewsroomLinux / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2024-1086 (CVSS score: 7.8), the high-severity issue relates to a use-after-free bug in the netfilter component that permits
0 Comments
Google unveiled the Fitbit Ace LTE smartband in the US on Wednesday, May 29. It is claimed to be a “new, first-of-its-kind connected smartwatch” for kids above the age of seven. It is said to come with the benefits of a smartphone without needing a phone. It gets support for calling, messaging and location sharing. The smart wearable
0 Comments
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a security operations center (SOC). The hype about generative AI is still everywhere, but security teams have to live in reality. They face constantly incoming alerts from endpoint security platforms, SIEM tools, and phishing emails reported
0 Comments
May 29, 2024NewsroomCybercrime / Cybersecurity The U.S. Department of Justice (DoJ) has sentenced a 31-year-old to 10 years in prison for laundering more than $4.5 million through business email compromise (BEC) schemes and romance scams. Malachi Mullings, 31, of Sandy Springs, Georgia pleaded guilty to the money laundering offenses in January 2023. According to court
0 Comments
Samsung Galaxy Watch X might be the top-of-the-line smartwatch in the South Korean tech giant’s upcoming wearable series, according to a report. The company is expected to introduce the successors to the Galaxy Watch 6 lineup at its next Galaxy Unpacked event in July, alongside the new Samsung foldable smartphones. The Galaxy Ring, which was
0 Comments
You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are essential to the functioning of your organization. If anything happens to these assets, such as application servers, databases, or privileged identities, the ramifications to your security posture can be severe. But is every technology asset
0 Comments
May 27, 2024The Hacker NewsEmail Security / Browser Security The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them – through email protection, firewall rules and employee education – phishing attacks are still
0 Comments