Who wins in networking in 2025 and beyond?
There’s always plenty written about which networking technologies will be hot as a new year kicks off. Rather...
California man steals $50 million using fake investment sites, gets 7 years
A 59-year-old man from Irvine, California, was sentenced to 87 months in prison for his involvement in an...
How hackers target your Active Directory with breached VPN passwords
As the gateways to corporate networks, VPNs are an attractive target for attackers. Learn from Specops Software about...
Accelerating AI Storage by up to 48% with NVIDIA Spectrum-X Networking Platform and Partners
AI factories rely on more than just compute fabrics. While the East-West network connecting the GPUs is critical...
7-Zip MotW bypass exploited in zero-day attacks against Ukraine
A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited...
Linux containers in 2025 and beyond
The use of Linux containers has shown no sign of slowing down since their emergence in the early...
Australia bans DeepSeek on government devices over security risk
The Australian government says the Chinese AI app is a threat to it and its assets. Source:: BBC...
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a...
No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar
During 2024’s Birthday Week, we launched an AI bot & crawler traffic graph on Cloudflare Radar that provides...
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the...
North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS
The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple...
Watch Out For These 8 Cloud Security Shifts in 2025
As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including...
Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both...
Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks
Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek’s Artificial Intelligence (AI)...
GrubHub data breach impacts customers, drivers, and merchants
Food delivery company GrubHub disclosed a data breach impacting the personal information of an undisclosed number of customers,...
Cisco researchers highlight emerging threats to AI models
Cisco security researchers this week detailed a number of threats they are seeing from bad actors trying to...
AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access
A security vulnerability has been disclosed in AMD’s Secure Encrypted Virtualization (SEV) that could permit an attacker to...
Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score
Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account...
Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104
Google has shipped patches to address 47 security flaws in its Android operating system, including one it said...
Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform
Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that,...