The Blueprint for AI-Driven Connectivity

The Blueprint for AI-Driven Connectivity

The internet ecosystem is in constant transition, and with that evolution comes changing dynamics and shifts across the value chain. As a result, these hubs were traditionally confined to a set of larger cities and contained to a small set of facilities within those. While the traditional interconnect model has served its purpose for decades, it is now becoming increasingly outdated. The evolution of distributed, dynamic services is exposing the inefficiencies, bottlenecks, and large failure…

Read More

Ghostwriter Cyber-Attack Targets Ukrainian, Belarusian Opposition

Ghostwriter Cyber-Attack Targets Ukrainian, Belarusian Opposition

A new wave of cyber-attacks linked to the Ghostwriter threat actor has been observed focusing on Ukraine and opposition groups in Belarus. The latest campaign, uncovered by SentinelLABS, employs weaponized Excel documents designed to deliver malicious payloads through phishing attacks. Ghostwriter’s New Tactics Ghostwriter, a cyber-espionage group linked to the Belarusian government, has evolved its attack strategies. SentinelLABS found that the group now uses Excel spreadsheets as phishing lures, embedding obfuscated VBA macros to execute…

Read More

Strategies for telecom executives: Balancing innovation and OPEX

Strategies for telecom executives: Balancing innovation and OPEX

In my previous post , we explored the growing pressures on OPEX in the telecom sector, from network upgrades and regulatory compliance to rising energy costs and cybersecurity. As telecom executives work to navigate these challenges, finding a balance between fostering innovation and managing operating expenses is no longer optional — it is a necessity for survival. In this blog, we’ll explore a powerful approach to achieving both in 2025: the concept of composable ERP, a…

Read More

Microsoft is testing a free desktop version of Office – but there's a catch

Microsoft is testing a free desktop version of Office – but there's a catch

ZDNET Microsoft is testing a free, ad-supported desktop edition of Office, but it comes with a host of limitations. On Monday, tech news site Beebom described the new version, saying that Microsoft quietly launched it and no one noticed. That’s an apt description, as Microsoft seems to be limiting the test to a small audience. Persistent ad banner and video Based on Beebom’s description, the free desktop suite includes Word, Excel, and PowerPoint and is…

Read More

Open source software vulnerabilities found in 86% of codebases

Open source software vulnerabilities found in 86% of codebases

Black Duck has released its annual Open Source Security and Risk Analysis (OSSRA) report, analyzing 1,658 examinations of 965 commercial codebases within 16 industries. According to the findings, 86% of codebases had open source software vulnerabilities while 81% had high- or critical-risk vulnerabilities. Furthermore, the average application in 2024 had triple the amount of open source files than the average application in 2020, with 5,300 in 2020 and more than 16,000 in 2024.  Below, Mike…

Read More

How to turn on Siri's new glow effect on iOS 18 – and other settings you should tweak

How to turn on Siri's new glow effect on iOS 18 – and other settings you should tweak

Jason Hiner/ZDNET Apple officially rolled out iOS 18.3 to eligible iPhone models last month after a brief testing period. The patch is modest; it doesn’t introduce new features or make sweeping changes, but it does make adjustments that will impact how users interact with the system. Apple Intelligence is now enabled by default, and the company is restricting notification summaries for news apps and improving iPhone cameras. Also: The end of Apple’s Lightning port era – here’s what comes…

Read More

GoDaddy review: Easy and reliable web hosting for small sites and beginners

GoDaddy review: Easy and reliable web hosting for small sites and beginners

ZDNET’s key takeaways GoDaddy delivers solid uptime at 99.98%, keeping your site online most of the time. Upfront prices are fair, and the tools are easy for beginners. However, renewal rates and add-ons can sneak up on you, and bigger operations may need more power and space. GoDaddy is the 800-pound gorilla of domain registration, the name most people know, even if they’ve never built a website. It’s the Amazon of URLs. It has excelled…

Read More

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

Cyber threat actors are no longer just targeting hospitals with ransomware, they’re now infiltrating the very software that patients use to manage their care, installing backdoors that put sensitive medical information at risk. In a new report, researchers at Forescout’s Vedere Labs have found that Silver Fox, a recently identified Chinese-backed hacking group, was exploiting patient medical imaging software to deploy a backdoor, a keylogger and a crypto miner on victim computers. The targeted software…

Read More

Only a Fifth of Ransomware Attacks Now Encrypt Data

Only a Fifth of Ransomware Attacks Now Encrypt Data

Ransomware actors are largely eschewing encryption, with at least 80% of attacks last year focusing solely on exfiltrating data, as it is quicker and easier, according to ReliaQuest. The threat intelligence vendor claimed in its Annual Cyber-Threat Report that exfiltration-only ransomware attacks are 34% faster. After initial access, “breakout time” typically takes just 48 minutes, although some groups manage to achieve lateral movement in as little as 27 minutes, giving network defenders little time to…

Read More

AI Threat Intelligence Roundup: February 2025

AI Threat Intelligence Roundup: February 2025

At Cisco, AI threat research is fundamental to informing the ways we evaluate and protect models. In a space that is dynamic and rapidly evolving, these efforts help ensure that our customers are protected against emerging vulnerabilities and adversarial techniques. This regular threat roundup shares useful highlights and critical intelligence from third-party threat research with the broader AI security community. As always, please remember that this is not an exhaustive or all-inclusive list of AI…

Read More
1 62 63 64 65 66 4,073