Lazarus Group Exploits Dell Driver Vulnerability to Bypass Windows Security

Lazarus Group Exploits Dell Driver Vulnerability to Bypass Windows Security

The North Korea–backed threat actor known as Lazarus Group has been observed deploying a Windows rootkit by exploiting a Dell firmware driver. The campaign, which shows the hacker group’s ever–evolving techniques, was spotted by ESET security researchers in the autumn of 2021.  “The campaign started with spearphishing emails containing malicious Amazon–themed documents and targeted an employee of an aerospace company in the Netherlands and a political journalist in Belgium,” ESET wrote in an advisory by Peter…

Read More

Password month? How we can make CSAM work for everyone

Password month? How we can make CSAM work for everyone

Password month? How we can make CSAM work for everyone | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Learn about CI/CD Pipelines for Infrastructure Configuration and Management

Learn about CI/CD Pipelines for Infrastructure Configuration and Management

Welcome back everyone to my third installment in this series of blogs on using CI/CD pipelines for infrastructure configuration and management. Using Gitlab CE In Part 1 of this series, we looked at how to use Gitlab CE as a foundational component for a CI/CD pipeline to manage and configure a simple CML simulated network. Then, at the end of the previous blog post about this topic, we left off at having a GitLab CE…

Read More

Real-time Data, Machine Learning, and Results: The Evidence Mounts

Real-time Data, Machine Learning, and Results: The Evidence Mounts

By Bryan Kirschner, Vice President, Strategy at DataStax From delightful consumer experiences to attacking fuel costs and carbon emissions in the global supply chain, real-time data and machine learning (ML) work together to power apps that change industries. New research co-authored by Marco Iansiti, the co-founder of the Digital Initiative at Harvard Business School, sheds further light on how a data platform with robust real-time capabilities contribute to delivering competitive, ML-driven experiences in large enterprises….

Read More

Four basic steps to #BeCyberSmart

Four basic steps to #BeCyberSmart

Josh McCloud, Cisco National Cybersecurity Officer in Singapore This blog from Josh McCloud, Cisco National Cybersecurity Officer in Singapore, is inspired by speakers on Cisco Networking Academy’s #BeCyberSmart broadcast event in June. Time ran out for our speakers to answer the many questions posed by our virtual audience, so here is the promised blog, in recognition of October Cybersecurity Awareness Month.   With the rush to digitization under COVID, when companies and other organizations turned on…

Read More

Cloudflare shows flair with new products for mobile and IoT security

Cloudflare shows flair with new products for mobile and IoT security

Cloudflare celebrates its 12th anniversary with the launch of a Zero Trust SIM, an IoT security platform and a Botnet Threat Feed. Image: Adobe Stock/metamorworks Mobility must-reads Having a safe and secure internet has been a major concern for enterprises due to the growing number of successful cyberattacks on organizations worldwide. Among the companies who have taken an interest in profiting from the art of protection is American firm Cloudflare. As a cloud security service…

Read More

Demonstrating Trust and Transparency in Mergers and Acquisitions

Demonstrating Trust and Transparency in Mergers and Acquisitions

Jason Button is a director at Cisco and leads the company’s Security and Trust Mergers and Acquisitions (M&A) team. He was formerly the director of IT at Duo Security, a company Cisco acquired in 2018, making him uniquely positioned to lend his expertise to the M&A process. This blog is the second in a series focused on M&A cybersecurity, following Jacob Bolotin’s post on Managing Cybersecurity Risk in M&A. Demonstrating Trust and Transparency in Mergers…

Read More

It Isn’t Your Daddy’s Oldsmobile Anymore

It Isn’t Your Daddy’s Oldsmobile Anymore

By Dan Shoemaker, Professor and Distinguished Visitor IEEE There is no situation where you are more vulnerable to a cyber-attack than when you are in your automobile. Are you surprised? If so, you still view your car as a transportation device. But today’s cars aren’t like your old man’s. They’re built around a complex array of microcontrollers and integrated circuits that enable all the wonders of the modern driving experience. And due to that thirst…

Read More

Magna’s multicloud fuels auto industry’s future

Magna’s multicloud fuels auto industry’s future

Magna International has made a big splash of late displaying the highly anticipated Fisker Ocean SUV electric vehicle (EV) and a pilot of a pizza delivery robot at trade shows. But you won’t see the company brand anywhere on any vehicle. The Aurora, Ontario- and Troy, Mich.-based company, founded 60 years ago as an automobile supplier for the Big 3 in Detroit, does it all for auto dealers on both sides of the Atlantic Ocean….

Read More

SambaNova ships second-generation AI systems

SambaNova ships second-generation AI systems

SambaNova Systems is now shipping the second-generation of its DataScale systems specifically built for AI and machine learning. You may not have heard of SambaNova, a startup led by ex-Oracle/Sun hardware executives and Stanford professors, but its work is likely familiar. The Lawrence Livermore National Laboratory was an early adopter of DataScale and used the systems in its COVID-19 antiviral compound and therapeutic research in 2020. “Our systems were deployed in supercomputers at the Lawrence Livermore…

Read More
1 2,738 2,739 2,740 2,741 2,742 4,178