Broadcom’s Approach to Sovereign Cloud: Enabling Innovation and Control for Customers

Broadcom’s Approach to Sovereign Cloud: Enabling Innovation and Control for Customers

In my many customer conversations at our recent European user conference, VMware Explore Barcelona, one message was clear: The strategic importance of data is fueling demand for sovereign cloud services.  Cloud sovereignty is central to the European Union’s quest for increased digital autonomy, with the aim of fostering innovation and supporting European businesses on their digital transformation journey. I want to stress that Broadcom is committed to helping organizations and governments meet their digital transformation…

Read More

New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP

New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP

Check Point is set to reveal a new Chinese cyber campaign targeting suppliers of manufacturers in “sensitive” domains in the US and across the globe. In an exclusive interview with Infosecurity at the firm’s CPX 2025 conference, Lotem Finkelsteen, Check Point’s Director of Threat Intelligence & Research, said his team was working on a new investigation into a Chinese hacking group. Finkelsteen confirmed his team had observed the threat group actively infiltrating the networks of…

Read More

DDoS Attack Volume and Magnitude Continues to Soar

DDoS Attack Volume and Magnitude Continues to Soar

DDoS attacks have surged in volume and magnitude in the second half of 2024, according to a new report by Gcore. The cybersecurity firm found that DDoS attacks rose by 56% in H2 2024 compared to H2 2023. There was also a 17% increase in the total number of attacks compared with H1 2024. The researchers said the findings highlighted a steep long-term growth trend for DDoS. A number of factors were cited for this…

Read More

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold

When you are hacked, you want to recapture control quickly as hackers move through systems, locking sensitive information and holding it for ransom. You need to determine the extent of the breach immediately, the exact attack vector, and how to insulate the rest of the network. Organizations need an effective incident response (IR) plan to accomplish these actions. However, not all IR plans are effective or contain the necessary elements to help restore calm in…

Read More

Workday aims to manage AI agents like employees

Workday aims to manage AI agents like employees

At its Workday Rising event in September, the company rolled out Illuminate, its next-gen agentic AI platform, along with four AI agents: Recruiter, Expenses, Succession, and Optimize. Recruiter is for sourcing candidates, recommending talent, and automating outreach and interview scheduling. Expenses creates, submits, and approves expense reports. Succession automates the succession planning process, prompting managers to create succession plans. It also recommends successors, and generates personalized development plans. Optimize identifies bottlenecks, inefficiencies and deviations from…

Read More

Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks

Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks

Advanced evasion techniques have been observed to be the new normal among ransomware groups in 2024, as groups like Lynx, Akira and RansomHub grew more agile. Rather than focusing on high-profile targets, they pursued a quantity-over-quality approach, striking more businesses at a faster rate. According to the 2025 Cyber Threat Report, published today by Huntress, this shift is further reflected in their speed. While the firm determined the average time-to-ransom (TTR) was just under 17…

Read More

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

3Critical 52Important 0Moderate 0Low Microsoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two that were exploited in the wild. Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, with three rated critical and 52 rated as important. Our counts omitted one vulnerability reported by HackerOne. This month’s update includes patches for: Active Directory Domain Services Azure Active Directory Azure Firmware Azure Network Watcher Microsoft AutoUpdate (MAU) Microsoft Digest…

Read More

Can serverless fix fintech's scaling problem?

Can serverless fix fintech's scaling problem?

Technology leaders in the financial services sector constantly struggle with the daily challenges of balancing cost, performance, and security — the constant demand for high availability means that even a minor system outage could lead to significant financial and reputational losses. Add to this the escalating costs of maintaining legacy systems, which often act as bottlenecks for scalability.  Therefore, back in 2019, when I served as the chief architect of a mid-size commercial bank I…

Read More

Deepfakes: How Deep Can They Go?

Deepfakes: How Deep Can They Go?

With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that seems real. All that is required is a consumer-grade computer or smartphone and an internet connection. Without question, we are fast approaching an era where audiovisual content is no longer inherently trustworthy. In fact, a recent Dimension Market Research report reveals that the global deepfake AI market is expected to reach a value of $79 million by the end…

Read More

8Base Ransomware Site Seized, Phobos Suspects Arrested in Thailand

8Base Ransomware Site Seized, Phobos Suspects Arrested in Thailand

Law enforcement has seized the dark web leak site of 8Base, a prominent ransomware group, and arrested four alleged members of the related Phobos operation in Thailand. On February 10, 2025, the data leak site of 8Base was no longer available. Instead, users could find a banner showing 16 law enforcement agencies, including Europol, the FBI and the UK’s National Crime Agency (NCA). The banner also displayed a message that said: “This hidden site and…

Read More
1 50 51 52 53 54 2,652