4 stories all CIOs should be able to tell

4 stories all CIOs should be able to tell

Master storyteller Doug Keeley was a featured speaker at a large national sales meeting some years ago when he noticed how miserable everyone was feeling. “Morale was horrible,” he recalls. “There was a new leader taking over, and her opening keynote had bombed. Everyone thought this CEO was cold and lacking empathy.” The only way to turn it around, Keeley was convinced, was to get the CEO back on stage for a more personal conversation….

Read More

Micron ships high density SATA-based SSDs for data centers

Micron ships high density SATA-based SSDs for data centers

Micron Technology is bucking the trend of moving to PCI Express-based storage and releasing a new SATA III-based SSD with ultradense memory storage and read optimized for faster data access. The SATA interface has been around since the beginning of the century, but it has progressed much slower than the PCIe interface and with nowhere near the leaps in performance. Among gamers, who are as obsessed with performance as someone doing AI models, PCIe drives…

Read More

The Linux fold command breaks up text, drives loops

The Linux fold command breaks up text, drives loops

The Linux fold command enables you to break a string of characters into same-size chunks, but it can also be used to provide a series of characters or strings to drive a loop. This post reviews the basic command and then demonstrates how you can use it to loop through the characters or strings that it creates. The basic use of the fold command is to take long lines of text and break them into…

Read More

The Razor’s Edge, Episode 3: Busting Some BYOD Myths

The Razor’s Edge, Episode 3: Busting Some BYOD Myths

The Razor’s Edge is a podcast series that examines “IT Services for the New Way to Work,” produced by CIO.com in partnership with HP Inc. In this series, HP’s technology experts provide unique insights into the challenges associated with digital transformation and discuss how innovative, cloud-based services, solutions, and software can help you plan and prepare for what lies ahead. The Razor’s Edge is hosted by Leif Olson, Distinguished Technologist at HP Inc., and he’s…

Read More

Marketing Velocity FY22 Highlights

Marketing Velocity FY22 Highlights

When we first created the Marketing Velocity suite of tools, Cisco had one goal in mind: to help drive demand and become marketers of the future. As the business and market have evolved, so has the goal. Throughout our FY22 we have achieved a lot and we still have a long way to go to give you the best experience. Partners that use the Marketing Velocity pillars grow faster when leveraging Central, Learning and Voice. As…

Read More

The business of hackers-for-hire threat actors

The business of hackers-for-hire threat actors

Hackers-for-hire specialize in compromising email boxes. Learn more about these cyber criminals and the threat they represent. Image: Adobe Stock Must-read security coverage In the world of illegal cyber activities, different kinds of threat actors exist. It has become increasingly common to read about companies selling offensive services like spyware as a service or commercial cyber surveillance. Some other actors are also government-backed. Yet another category of threat actors exists, dubbed hackers-for-hire. Google’s Threat Analysis…

Read More

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Triggered by an employee from an external vendor who shared email addresses with an unauthorized party, the breach could lead to phishing attempts against affected individuals. Image: Proxima Studio/Adobe Stock NFT giant OpenSea is warning of a data breach that exposed the email addresses of users and subscribers to the company’s newsletter. In a notice published Wednesday, OpenSea revealed that anyone who shared their email address with the company in the past should assume that…

Read More

Microsoft Spots Updated Cryptomining Malware Tool Targeting Linux Systems

Microsoft Spots Updated Cryptomining Malware Tool Targeting Linux Systems

Microsoft’s Security Intelligence team has issued a new warning against a known cloud threat actor (TA) group. Tracked as 8220 and active since early 2017, the group would have now updated its malware toolset to breach Linux servers in order to install crypto miners as part of a long-running campaign. “The updates include the deployment of new versions of a cryptominer and an IRC bot, as well the use of an exploit for a recently…

Read More

New ‘SessionManager’ Backdoor Targeting Microsoft Exchange Servers Worldwide

New ‘SessionManager’ Backdoor Targeting Microsoft Exchange Servers Worldwide

Kaspersky security experts have discovered new malware targeting Microsoft Exchange servers belonging to several organizations worldwide. Dubbed “SessionManager” and first spotted by the company in early 2022, the backdoor enables threat actors to keep “persistent, update-resistant and rather stealth access to the IT infrastructure of a targeted organization.” According to Kaspersky, once propagated, SessionManager would enable a wide range of malicious activities, from collecting emails to complete control over the victim’s infrastructure.  The analyses by the…

Read More

Threat Actor Claims Responsibility For IBM and Stanford University Hack

Threat Actor Claims Responsibility For IBM and Stanford University Hack

CloudSEK used its artificial intelligence (AI)-powered digital risk platform XVigil to identify a post on a cybercrime forum mentioning open source automation server platform Jenkins as one of the TTP (tactics, techniques, and procedures) used by a threat actor (TA) in attacks against IBM and Stanford University. The module reportedly has hidden desktop takeover capabilities that would be used by the TA to get clicks on ads.  The post on the English-speaking forum was spotted by CloudSEK on…

Read More
1 2,866 2,867 2,868 2,869 2,870 4,071