New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP

New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP

Check Point is set to reveal a new Chinese cyber campaign targeting suppliers of manufacturers in “sensitive” domains in the US and across the globe. In an exclusive interview with Infosecurity at the firm’s CPX 2025 conference, Lotem Finkelsteen, Check Point’s Director of Threat Intelligence & Research, said his team was working on a new investigation into a Chinese hacking group. Finkelsteen confirmed his team had observed the threat group actively infiltrating the networks of…

Read More

I tried Asus' dual-screen laptop, and it revitalized my workflow in the best way

I tried Asus' dual-screen laptop, and it revitalized my workflow in the best way

ZDNET’s key takeaways The Asus Zenbook Duo is on sale now for $1,499 at Best Buy. This laptop is a creator’s dream machine, with dual-OLED touchscreens, a highly configurable form factor, and a great battery. It takes time and effort to get the most out of this laptop, and you’ll need lots of desk space to utilize the different form factors. more buying choices Upon first glance, Asus’ Zenbook Duo looks like a standard laptop….

Read More

DDoS Attack Volume and Magnitude Continues to Soar

DDoS Attack Volume and Magnitude Continues to Soar

DDoS attacks have surged in volume and magnitude in the second half of 2024, according to a new report by Gcore. The cybersecurity firm found that DDoS attacks rose by 56% in H2 2024 compared to H2 2023. There was also a 17% increase in the total number of attacks compared with H1 2024. The researchers said the findings highlighted a steep long-term growth trend for DDoS. A number of factors were cited for this…

Read More

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold

When you are hacked, you want to recapture control quickly as hackers move through systems, locking sensitive information and holding it for ransom. You need to determine the extent of the breach immediately, the exact attack vector, and how to insulate the rest of the network. Organizations need an effective incident response (IR) plan to accomplish these actions. However, not all IR plans are effective or contain the necessary elements to help restore calm in…

Read More

I found the most private and secure way to browse the web – and it isn't incognito mode

I found the most private and secure way to browse the web – and it isn't incognito mode

ZDNET A while ago, I wrote a piece on the best way to ensure your privacy with a web browser. Part of that advice was to use the Tor browser. In simplest terms, you cannot get more privacy and security from a web browser than when using Tor. And given how important privacy and security are now, Tor should be on your radar. Also: How to turn on Private DNS Mode on Android – and why it’s a must…

Read More

Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks

Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks

Advanced evasion techniques have been observed to be the new normal among ransomware groups in 2024, as groups like Lynx, Akira and RansomHub grew more agile. Rather than focusing on high-profile targets, they pursued a quantity-over-quality approach, striking more businesses at a faster rate. According to the 2025 Cyber Threat Report, published today by Huntress, this shift is further reflected in their speed. While the firm determined the average time-to-ransom (TTR) was just under 17…

Read More

Workday aims to manage AI agents like employees

Workday aims to manage AI agents like employees

At its Workday Rising event in September, the company rolled out Illuminate, its next-gen agentic AI platform, along with four AI agents: Recruiter, Expenses, Succession, and Optimize. Recruiter is for sourcing candidates, recommending talent, and automating outreach and interview scheduling. Expenses creates, submits, and approves expense reports. Succession automates the succession planning process, prompting managers to create succession plans. It also recommends successors, and generates personalized development plans. Optimize identifies bottlenecks, inefficiencies and deviations from…

Read More

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

3Critical 52Important 0Moderate 0Low Microsoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two that were exploited in the wild. Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, with three rated critical and 52 rated as important. Our counts omitted one vulnerability reported by HackerOne. This month’s update includes patches for: Active Directory Domain Services Azure Active Directory Azure Firmware Azure Network Watcher Microsoft AutoUpdate (MAU) Microsoft Digest…

Read More

iOS 18.3.1 patches an 'extremely sophisticated attack' – and more

iOS 18.3.1 patches an 'extremely sophisticated attack' – and more

Sabrina Ortiz/ZDNET Yesterday, iOS 18.3.1 for iPhone dropped, and while the last few updates have been packed with new features — many related to Apple Intelligence — this one seems to be primarily a security update. Also: Just installed iOS 18.3? I’d change these 3 settings first for the best experience And it’s an important one. iOS 18.3.1 packs a pretty serious security update. Adrian Kingsley-Hughes/ZDNET Pretty serious, but niche The release notes are vague, mentioning that the…

Read More

Can serverless fix fintech's scaling problem?

Can serverless fix fintech's scaling problem?

Technology leaders in the financial services sector constantly struggle with the daily challenges of balancing cost, performance, and security — the constant demand for high availability means that even a minor system outage could lead to significant financial and reputational losses. Add to this the escalating costs of maintaining legacy systems, which often act as bottlenecks for scalability.  Therefore, back in 2019, when I served as the chief architect of a mid-size commercial bank I…

Read More
1 113 114 115 116 117 3,798