CrowdStrike and Dell Technologies team up to secure businesses
CrowdStrike and Dell Technologies will jointly provide solutions that allow businesses to better secure themselves against cyber threats. These include solutions for preventing, detecting and responding to the threats.
According to CrowdStrike and Dell, the new partnership should provide compani... Read more
Business-grade routers hit by Hiatus malware
Business-grade DrayTek routers are under attack by the Hiatus malware campaign. The successfully attacked routers are transformed into "listening posts" that can intercept email and steal files.
Security experts at Lumen note that the Hiatus malware campaign has been active since July 2022. The ... Read more
Nearly all companies have misconfigurations in cloud environments
Nearly all organizations (98.6 percent) are experiencing worrisome misconfigurations that pose significant risks to data and infrastructure.
According to research by Zscaler, the increasing use of cloud technology is leading to more and more vulnerability problems. In the study, Zscaler finds th... Read more
Study attacks EU cloud security label that excludes US vendors
The study was commissioned by a US non-profit industry group dedicated to "open markets".
This week Reuters reports that a study commissioned by a tech lobbying group concludes that a proposed EU cloud security certification regime that could exclude US tech giants like Amazon, Google, Microsoft... Read more
Hackers hit British retailer WH Smith
The cyberattack resulted in the theft of some company data.
On Thursday, UK retail group WH Smith announced that it had been the victim of a cyberattack. The company did not disclose the exact nature of the attack, but the official "notice of cybersecurity incident" it issued to the London Stock... Read more
Microsoft releases security updates for Intel CPU vulnerabilities
Microsoft has released out-of-band security updates to tackle the 'Memory Mapped I/O Stale Data (MMIO)' information disclosure vulnerabilities affecting Intel CPUs.
The vulnerability, initially disclosed by Intel on June 14, 2022, warned that processes running in a virtual machine could gain acc... Read more
GitHub’s secret scanning alerts service is now generally available
The service is designed to detect leaked secrets across the entire publishing history of a repository, including sensitive data such as API keys, account passwords, authentication tokens, and other confidential information attackers can use to breach networks, steal data, or impersonate a company.
... Read more
Fortinet unveils new cybersecurity products and services for OT
The cybersecurity firm is introducing new range of solutions for Operational Technology environments.
This week cybersecurity firm Fortinet announced new and enhanced products and services for operational technology (OT) environments.
Fortinet specialises in helping organizations to build a ... Read more
WIP26 malware attacks telecom operators
The WIP26 malware uses public cloud environments to launch attacks against telecom operators. The malware tries to appear as legitimate.
These findings come out of research by SentinelOne. The WIP26 malware targets spying activities. Telecom operators in the Middle East are particularly affected... Read more
Hackers steal sensitive data from US federal police
The US Marshals Service (USMS) has been hit by a ransomware attack. Among the affected systems is a computer system containing sensitive information for police operations, such as personal information about targets and ongoing investigations.
The police organization, which takes care of federal ... Read more