Mobile Devices See 466% Annual Increase in Zero-Day Attacks

Mobile Devices See 466% Annual Increase in Zero-Day Attacks

More than two million mobile malware samples were detected in the wild last year, with threats impacting over 10 million devices globally, according to new data from Zimperium. The mobile security vendor compiled its 2022 Global Mobile Threat Report based on insight collected from its security research team and a survey of global tech leaders. It claimed that over two-fifths (42%) of organizations had witnessed a security incident stemming from unpatched mobile apps or devices, while more…

Read More

Arm to cut up to 15% of jobs following failed takeover by Nvidia

Arm to cut up to 15% of jobs following failed takeover by Nvidia

British chip designer Arm is cutting up to 15% of its workforce, just a month after a $40 billion takeover from chipmaker Nvidia collapsed. Arm CEO Rene Haas, who only joined the company in February this year, told staff on Monday that between 12% to 15% of staff will be made redundant as a result of the cuts, according to an internal memo seen by the Daily Telegraph. Arm employs 6,400 people worldwide, meaning between…

Read More

Marvell’s newest Arm processor integrates 5G hardware accelerators

Marvell’s newest Arm processor integrates 5G hardware accelerators

In the battle between Intel and AMD, it can be easy to overlook Marvell Technology, but you shouldn’t. Through acquisition and organic growth, the company has turned into quite a powerhouse playing in multiple areas. Marvell is the first major vendor to support the Arm on 5G initiative that Arm unveiled last October, when it launched the Arm 5G Solutions Lab. The lab is designed to let hardware and software partners work on 5G-based products…

Read More

Ukrainian Targets Hit by Another Destructive Malware Variant

Ukrainian Targets Hit by Another Destructive Malware Variant

Security researchers have discovered yet another destructive malware variant targeting Ukrainian machines, the fourth so far this year. ESET claimed to have made the find yesterday, noting that the “CaddyWiper” malware was seen on a few dozen systems in a “limited number” of organizations. The malware, which erases user data and partition information from attached drives, does not share any code similarities with the previous variants discovered by ESET: HermeticWiper and IsaacWiper. The code was not digitally…

Read More

Black CIO hopefuls look to level up

Black CIO hopefuls look to level up

Lawrence Anderson didn’t initially want a career in computers, despite an early passion for tech. He performed well in computer science classes, was a Commodore 64 enthusiast, learned COBOL. But as he entered college in the late 1980s, Anderson saw limited job prospects. At that time, he says, it seemed like “you’d be a computer operator running transactions or a programmer. And there was nothing beyond that.” Looking back, Anderson blames the profession’s bad marketing…

Read More

What is Cyber Threat Management? – IT Governance UK Blog

What is Cyber Threat Management? – IT Governance UK Blog

Cyber threat management is the process of identifying, analysing, evaluating and addressing an organisation’s cyber security requirements. With more than a 1,000 publicly disclosed security incidents last year – and countless others that weren’t reported – cyber security is a growing priority. It’s only by actively monitoring threats throughout their lifecycle that organisations can identify the risks that they face and the steps they should take to mitigate them. Why is cyber threat management important?…

Read More

Como Afrontar las Vulnerabilidades de Log4j2 | The State of Security

Como Afrontar las Vulnerabilidades de Log4j2 | The State of Security

El 9 de diciembre de 2021, Apache publicó una vulnerabilidad de “día cero” (CVE-2021-44228) para Apache Log4j que se conoce como “Log4Shell”. Esta vulnerabilidad ha sido clasificada como “Crítica” con una puntuación CVSS de 10, permitiendo la ejecución remota de Código con privilegios a nivel de sistema. Si actualmente está trabajando para identificar instancias de esta vulnerabilidad, Tripwire puede ayudarle. Tripwire IP360 Tripwire IP360 puede configurarse para detectar la vulnerabilidad a través del escaneo de…

Read More

UKCloud Operates a Sovereign Multi-Cloud Platform That Addresses the Needs of the UK’s Government Agencies and Healthcare and Defense Sectors

UKCloud Operates a Sovereign Multi-Cloud Platform That Addresses the Needs of the UK’s Government Agencies and Healthcare and Defense Sectors

In early 2020, when UKCloud published its report “The State of Cloud Adoption UK Public Sector,” CEO Simon Hansford wrote, “It is becoming increasingly apparent that we have a tremendous national asset in the invaluable data that powers our public services. Hence, there has never been a better opportunity for the UK to protect and nurture these capabilities which will underpin future innovations that will drive better public services for citizens and business, and better…

Read More

Oil & Gas Cybersecurity: Stop Critical Operation Cyber-attacks

Oil & Gas Cybersecurity: Stop Critical Operation Cyber-attacks

The oil and gas utilities industry face threats from cyber incidents. The ransomware attack on the Colonial Pipeline in May 2021 had a huge impact on the industry. In February 2022, it was also reported that European oil facilities hit by cyber-attack and forced to operate at limited capacity. These latest incidents suggest that oil and gas supply process depend on IT systems, and that the critical operations could be disrupted by IT not working…

Read More

How to Build a Serverless API with Lambda and Node.js

How to Build a Serverless API with Lambda and Node.js

Serverless technologies enable developers to concentrate on what the application does without the hassle of managing where it runs and how it scales. The cloud provider manages infrastructure, simply upload the applications, and the provider handles the rest. This article highlights the benefits of going serverless by walking through creating a serverless REST API using AWS Lambda and Node.js. Setting Up the Local Environment This tutorial requires the following dependencies: Now that the environment is…

Read More
1 3,177 3,178 3,179 3,180 3,181 4,083