Author: Erik van Klinken

VMware zero-day exploited since at least late 2021

VMware zero-day exploited since at least late 2021

A Chinese hacker group has been exploiting a zero-day in the vCenter Server since at least late 2021. The hackers managed to deploy backdoors on ESXi hosts through the vulnerability and leak data from organisations in critical sectors. Mandiant revealed that the perpetrator behind the cyber camp... Read more

date3 months ago
How the Kotlin programming language has conquered Android

How the Kotlin programming language has conquered Android

When Google announced in 2017 that Kotlin would now be supported as an official Android language, the audience cheered loudly. That enthusiasm has turned into adoption, as 80 percent of all apps on Android now use Kotlin. What's behind the rapid rise of this programming language? The development... Read more

date3 months ago
Meta plans to buy 350,000 Nvidia GPUs to compete in AI arms race

Meta plans to buy 350,000 Nvidia GPUs to compete in AI arms race

Meta plans to purchase 350,000 Nvidia H100 GPUs this year to develop future AI models. In total, the computing power will reach the equivalent of 600,000 H100 chips by the end of 2024, according to CEO Mark Zuckerburg. That'll be needed, as competitors are also buying in bulk to compete. Zuckerb... Read more

date3 months ago
AI data can be stolen from Apple, AMD and Qualcomm chips

AI data can be stolen from Apple, AMD and Qualcomm chips

Many GPUs are vulnerable to leaking data from AI models. An attacker only needs access to the operating system of the device within which the GPU is running. Researchers from security firm Trail of Bits explain to Wired that GPU vulnerabilities are becoming increasingly urgent. AI data in chunks... Read more

date3 months ago
UEFI firmware vulnerabilities hit enterprise environments worldwide

UEFI firmware vulnerabilities hit enterprise environments worldwide

Nine vulnerabilities in EDK II hit enterprise environments worldwide. Researchers at France's Quarkslab discovered that this open-source standard for the UEFI specification can be abused by malicious actors. These exploits are then very difficult to detect or remove. The nine vulnerabilities are... Read more

date3 months ago
Preview: Samsung Galaxy S24, S24+ and S24 Ultra

Preview: Samsung Galaxy S24, S24+ and S24 Ultra

Samsung is launching its latest line of Galaxy smartphones today. With the S24 series, it has asserted that the "era of AI" has begun. The brand new Galaxy AI offerings should make daily phone use more effective and easier. We had an early look to see what it's all about. The differences between... Read more

date3 months ago
When is a critical vulnerability actually dangerous?

When is a critical vulnerability actually dangerous?

Dozens of new vulnerabilities surface every day. These vary widely, with CVE scores ranging from 0 to 10. The higher the score, the more alarming the messaging. Interestingly, the most dangerous cyber threats quite often don't achieve a high score on this scale. As an organization, how do you know ... Read more

date3 months ago
Androxgh0st botnet steals AWS and Microsoft credentials

Androxgh0st botnet steals AWS and Microsoft credentials

CISA and the FBI warn of a campaign aiming to steal cloud credentials. Cybercriminals are attempting to use the Androxgh0st malware to create a botnet that steals credentials from cloud services. This data is then used to deliver malicious payloads. Androxgh0st is known as an "SMTP cracker," whi... Read more

date3 months ago
Hyperscalers’ AI chip capacity is heavily underutilized

Hyperscalers’ AI chip capacity is heavily underutilized

Most of the AI capacity at major cloud providers remains unused. As a result, AWS, Microsoft and Google are missing out on billions of dollars in revenue, TechInsights analyst Owen Rogers asserts. Full utilization of AI hardware, however, is tough to achieve. TechInsights estimates that with sev... Read more

date3 months ago
Microsoft Cloud keeps personal data within the EU: is it enough?

Microsoft Cloud keeps personal data within the EU: is it enough?

A new update from Microsoft should reassure European cloud users. From now on, all personal data will be within the "EU Data Boundary for the Microsoft Cloud", consisting of all EU and EFTA countries. Is that enough to keep data secure? Microsoft makes a number of concrete promises to all Europe... Read more

date3 months ago
1 15 16 17 18 19 72