CISA Urges Government to Patch Exploited Cisco, Microsoft Flaws

CISA Urges Government to Patch Exploited Cisco, Microsoft Flaws

A leading US security agency has ordered federal government bodies to patch five vulnerabilities it claims are being actively exploited by threat actors. The latest additions to the CISA Known Exploited Vulnerabilities (KEV) catalog include CVE-2023-20118, a command injection vulnerability in the web-based management interface of multiple Cisco Small Business RV Series routers. “Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data,” said CISA yesterday. CVE-2018-8639 is an…

Read More

Nothing's new budget Android phones make Samsung and Apple look bad

Nothing's new budget Android phones make Samsung and Apple look bad

Nothing Phone (3a) and (3a) Pro at MWC 2025. Kerry Wan/ZDNET Phone brand Nothing creates some of the most aesthetically striking mobile devices on the market. That pattern will continue into 2025, as the company recently revealed its new Phone (3a) Series.  Also: This $399 Samsung Galaxy is the mid-range phone most people should buy The set consists of the base Phone (3a) and the Phone (3a) Pro. Both models house an optimized Qualcomm Snapdragon 7s…

Read More

I saw Samsung's thinnest Galaxy phone ever at MWC – and it made my devices feel outdated

I saw Samsung's thinnest Galaxy phone ever at MWC – and it made my devices feel outdated

Kerry Wan/ZDNET There it was: the unreleased Samsung Galaxy S25 Edge hanging on wires at the Mobile World Congress (MWC) show floor. Going into the morning of the Barcelona trade show, I knew I had to make a beeline to the Samsung booth to avoid yet another crowded photo-op with the upcoming Galaxy phone. So I got my badge, skipped to Hall 3, whipped out the DSLR, and started shooting. Also: Best of MWC 2025: The…

Read More

Half of Online Gambling Firms Lose 10% of Revenue to Fraud

Half of Online Gambling Firms Lose 10% of Revenue to Fraud

The European online gambling (iGaming) sector is suffering multibillion-euro losses to fraud each year, according to new research from Sumsub. The identity verification firm revealed that nearly half (47%) of the compliance professionals it asked lost over 10% of their revenue to fraud last year. Given the sector accounts for 40% (€55bn, $58bn) of the regulated European gambling market, this could amount to losses of over €5bn ($5.2bn) annually. An additional 15% of respondents to…

Read More

Are tri-foldable phones the next big thing? I tried one from an upstart brand

Are tri-foldable phones the next big thing? I tried one from an upstart brand

Prakhar Khanna/ZDNET I’ve been rooting for tri-fold phones since I used the Huawei Mate XT Ultimate. I found that device to be more useful than a book-style foldable. Now, here comes the Tecno Phantom Ultimate 2, which is a similar tri-fold foldable.  However, unlike the Huawei phone, the Tecno Phantom Ultimate 2 isn’t available to buy. The phone was launched as a concept in August 2024 and Tecno is showcasing a working prototype at Mobile World…

Read More

How Block is accelerating engineering velocity through developer experience

How Block is accelerating engineering velocity through developer experience

The Block ecosystem of brands – including Square, Cash App, Spiral and TIDAL – is driven by more than 4,000 engineers and thousands of interconnected software systems. Today, Block is doubling down on engineering velocity, investing in major initiatives to help teams ship software even faster. The initiatives will build on an already relentless focus on speed that has helped Block empower more than 50 million individuals and four million sellers. “We want engineering velocity…

Read More

What is SaaS Security Posture Management (SSPM)?

What is SaaS Security Posture Management (SSPM)?

Over 80% of businesses use at least one Software-as-a-Service (SaaS) application in their operations, per a report by SaaS Academy. It’s easy to see why SaaS applications are the fulcrum of many businesses today. From collaboration tools to CRMs, SaaS platforms enable flexibility, scalability, and operational efficiency. However, this convenience also comes with several security risks. According to a report by Gartner, “99% of cloud security failures will be the customer’s fault”. Two factors that…

Read More

Enhancing Security Monitoring with Tripwire's Change Audit: New Rules for Firewalls, WFP, and Microsoft Store Applications

Enhancing Security Monitoring with Tripwire's Change Audit: New Rules for Firewalls, WFP, and Microsoft Store Applications

What is it? The Tripwire Enterprise Change Audit rules provide customers with the ability to monitor for change events that could have an impact on a system. Monitoring for change events can help administrators identify malicious and/or unexpected changes within their environment. Changes to CA Additional rules were added to the Change Audit rule set. These rules provide customers the ability to monitor for changes to the firewall, Windows Filtering Platform, and Microsoft Store. Firewall…

Read More

‘그 시절 우리가 따랐던 원칙’을 대체하는 새 IT 리더십 규칙 8가지

‘그 시절 우리가 따랐던 원칙’을 대체하는 새 IT 리더십 규칙 8가지

CIO의 역할이 기술만큼이나 극적으로 변화하고 있다. 기술 스택의 변화 속도를 반영해서이기도 하다. 즉 기술 경영진은 과거와는 다른 방식으로 이끌고, 관리하고, 일해야 한다. 베테랑 CIO, 연구원, 고문이 IT 리더십의 새로운 규칙과 이로 인해 사라지고 있는 예전 규칙을 살펴본다. 예전 규칙: 비즈니스에 서비스 제공새 규칙: 비즈니스와 함께 리드하기 백오피스 기술팀 리더였던 CIO의 이미지가 주문 접수 담당자, 공급자/서비스 제공자로 변해 왔다. 그리고 최근 몇 년 동안에는 파트너라는 라벨을 점점 더 많이 채택해 왔다고 정보관리학회(SIM) 연구소의 퀸틴 맥그래스 전무이사는…

Read More

Hidden costs of compromised privacy: Protecting brands and customers

Hidden costs of compromised privacy: Protecting brands and customers

Amid rising privacy concerns from consumers and increasing regulatory demands, today’s businesses are facing intense pressure to protect their customers’ privacy. Layer in the surge of new technologies like artificial intelligence (AI), and privacy concerns elevate even further. In a world where privacy violations can damage brands overnight, it’s critical to understand the hidden costs of compromised privacy. Until recently, data breaches nearly dominated conversations on data privacy, partly due to strict notification requirements designed…

Read More
1 196 197 198 199 200 3,968