최형광 칼럼 | 미국 우선주의의 황금시대란?

최형광 칼럼 | 미국 우선주의의 황금시대란?

수년간 하락세였던 글로벌 공급망 압력지수(GSCPI)가 높아지고 있다. 이 지수는 뉴욕연방은행에서 발표한다. 지수가 높아지면(+) 공급망 압력이 심화되며, 낮아지면(-) 압력이 감소한다. 뉴욕연방은행은 공급망의 압력 변화를 추적하기 위해 7개국(미국, 한국, 유럽, 중국, 일본, 영국, 대만) 글로벌 운임료 등의 지역별 제조업 데이터를 포함해 27개 이상 변수를 통합하여 이 지수를 작성한다. 2008년 금융 서브프라임 위기 후, 2020년 코로나 펜데믹 이후 급격한 공급망 압력이 발생했고 미국 우선주의로 더 가속화되고 있다. 재산업화(Reindustrialisation), 제조업의 르네상스 글로벌 공급망이 붕괴되며 새로운 공급망이 모색되고 있다. 글로벌…

Read More

Phishing Emails in Australia Rise by 30%

Phishing Emails in Australia Rise by 30%

The number of phishing emails received by Australians surged by 30% last year, new research by security firm Abnormal Security has found. Cybercriminals have increasingly targeted the Asia-Pacific region, partly because it is becoming a larger player in critical industries like data centres and telecoms. For APAC as a whole, credential phishing attacks rose by 30.5% between 2023 and 2024, according to the research. New Zealand saw a 30% rise, while for Japan and Singapore,…

Read More

VMware Product Release Tracker (vTracker)

VMware Product Release Tracker (vTracker)

This page contains a list of products released by VMware. vTracker is automatically updated when new products are available to download (GA) at vmware.com. If you want to get notified about new VMware Products, subscribe to the RSS Feed. You can also use the JSON export to build your own tool. Feel free to comment when you have any feature requests. 2025-02-18VMware Tools 13.0.0 [Release Notes] 2025-01-23VMware Cloud Director Object Storage Extension 3.1.0.2 [Release Notes]…

Read More

Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances

Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances

Threat actors have been actively exploiting chained vulnerabilities in Ivanti Cloud Service Appliances (CSA), significantly amplifying the impact of their cyber-attacks. The vulnerabilities—CVE-2024-8963, CVE-2024-9379, CVE-2024-8190 and CVE-2024-9380—were leveraged in September 2024 to breach systems, execute remote code (RCE), steal credentials and deploy webshells on victim networks. Exploiting Chained Vulnerabilities According to a joint advisory from the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), attackers used two distinct exploit chains…

Read More

BMC Software survey: IT leaders bullish on generative and agentic AI

BMC Software survey: IT leaders bullish on generative and agentic AI

Generative and agentic artificial intelligence (AI) have captured the imagination of IT leaders, but there is a significant gap between enthusiasm and implementation maturity for IT operations and service management, according to a new survey from BMC Software and Dimensional Research. The study polled 424 IT stakeholders responsible for some aspect of AI implementation across large and midsize organizations in a wide array of industries. Even though 94% said that generative AI (genAI) is a…

Read More

PCI SSC’s Global Content Library Now Available on YouTube

PCI SSC’s Global Content Library Now Available on YouTube

  We heard your feedback – and we have made the PCI SSC Global Content Library more accessible than ever before!  The PCI Security Standards Council (PCI SSC) is excited to share that the PCI SSC Global Content Library is now available on YouTube! The PCI SSC Global Content Library is home to hours of video content from our Global Community Events, covering topics on industry trends, strategies on best practices, and solutions for anyone within the payment ecosystem. Hear from the Council…

Read More

Bookmakers Ramp Up Efforts to Combat Arbitrage Betting Fraud

Bookmakers Ramp Up Efforts to Combat Arbitrage Betting Fraud

A growing wave of arbitrage betting fraud, driven by automation and advanced money laundering techniques, has been forcing bookmakers to adopt stricter measures to protect their platforms. This type of fraud exploits pricing inefficiencies across betting markets, allowing fraudsters to guarantee profits regardless of the outcome. Identifying Red Flags in Betting Fraud Security experts from Group-IB have identified several red flags, such as the use of disposable emails, virtual phone numbers and automation tools like…

Read More

Revolutionizing procurement: How AI drives efficiency & profitability

Revolutionizing procurement: How AI drives efficiency & profitability

AI is set to transform business operations, with the complex area of procurement ripe for digital innovation that will drive tangible impact. Procurement plays a crucial role in organizational success because it directly impacts operational efficiency, cost-effectiveness, and customer satisfaction. However, supply chains are becoming more complex, and teams often lack real-time visibility into the movement of goods, leading to delays and difficulties in managing inventory. By investing in digital transformation — and purpose-built AI…

Read More

The Power of Many: Crowdsourcing as A Game-Changer for Modern Cyber Defense

The Power of Many: Crowdsourcing as A Game-Changer for Modern Cyber Defense

With the rapid technological advancement and the world entering the AI era, the cyber threat landscape has significantly evolved in its complexity and sophistication. The frequency of data breaches has surged alarmingly compared to previous years, amplifying already significant concerns. This uptick is fueled by the escalating severity of cyber attacks—ranging from social engineering and ransomware to DDoS —largely driven by the use of AI tools by hackers. Additionally, according to SecurityVulnerability stats, 25,000+ vulnerabilities have…

Read More

GhostGPT: New Chatbot for Malware Creation, Scams

GhostGPT: New Chatbot for Malware Creation, Scams

Security researchers have discovered a new malicious chatbot advertised on cybercrime forums. GhostGPT generates malware, business email compromise scams, and more material for illegal activities. The chatbot likely uses a wrapper to connect to a jailbroken version of OpenAI’s ChatGPT or another large language model, the Abnormal Security experts suspect. Jailbroken chatbots have been instructed to ignore their safeguards to prove more useful to criminals. Must-read security coverage What is GhostGPT? The security researchers found…

Read More
1 3 4 5 6 7 2,570