Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

Cyber threat actors are no longer just targeting hospitals with ransomware, they’re now infiltrating the very software that patients use to manage their care, installing backdoors that put sensitive medical information at risk. In a new report, researchers at Forescout’s Vedere Labs have found that Silver Fox, a recently identified Chinese-backed hacking group, was exploiting patient medical imaging software to deploy a backdoor, a keylogger and a crypto miner on victim computers. The targeted software…

Read More

Only a Fifth of Ransomware Attacks Now Encrypt Data

Only a Fifth of Ransomware Attacks Now Encrypt Data

Ransomware actors are largely eschewing encryption, with at least 80% of attacks last year focusing solely on exfiltrating data, as it is quicker and easier, according to ReliaQuest. The threat intelligence vendor claimed in its Annual Cyber-Threat Report that exfiltration-only ransomware attacks are 34% faster. After initial access, “breakout time” typically takes just 48 minutes, although some groups manage to achieve lateral movement in as little as 27 minutes, giving network defenders little time to…

Read More

AI Threat Intelligence Roundup: February 2025

AI Threat Intelligence Roundup: February 2025

At Cisco, AI threat research is fundamental to informing the ways we evaluate and protect models. In a space that is dynamic and rapidly evolving, these efforts help ensure that our customers are protected against emerging vulnerabilities and adversarial techniques. This regular threat roundup shares useful highlights and critical intelligence from third-party threat research with the broader AI security community. As always, please remember that this is not an exhaustive or all-inclusive list of AI…

Read More

Work, Life, Purpose: The Transformational Journey of Giving Back

Work, Life, Purpose: The Transformational Journey of Giving Back

Work-life balance — aiming for it is admirable. Achieving it is next to impossible. Even if we carefully balance the marketing plans, pipeline reviews, and presentations with the laundry, childcare, and home repair, we can end up exhausted and frustrated. But if you want to transform your point of view, stop worrying about trying to equally distribute all the stuff on your plate and begin factoring in the significance of the tasks. If you check…

Read More

Cisco and NVIDIA Unite to Propel AI into the Enterprise

Cisco and NVIDIA Unite to Propel AI into the Enterprise

Today Cisco and NVIDIA announced a mutual intent to expand a partnership that brings together two of the industry’s most innovative data center networking and compute leaders. Our collaboration will help enterprises accelerate AI projects and make it easier for more customers than ever to standardize on Cisco as they modernize their data center networks. A Unified Architecture for AI Workloads To date, most of the industry dialog on AI has been focused on chips,…

Read More

El plan de transformación digital del Gobierno de Navarra: de la gestión de datos a la capacitación

El plan de transformación digital del Gobierno de Navarra: de la gestión de datos a la capacitación

En el marco de su plan de transformación digital, el Gobierno de Navarra buscaba una solución integral para gestionar sus datos de manera eficiente y segura. Así, de la mano de Telefónica Tech, el Ejecutivo implantó IBM Cloud Pak for Data, creando un hub de datos que centraliza las fuentes de datos, simplificando su acceso y garantizando su gobernanza. Esta plataforma, explican desde la telco en su papel de integrador, permite el desarrollo de aplicaciones…

Read More

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

A massive Chinese botnet is targeting Microsoft 365 accounts with large-scale password spraying attacks that can bypass multifactor authentication (MFA), according to SecurityScorecard. The botnet, which is made up of over 130,000 compromised devices, is systematically attempting to log into M365 globally using stolen credentials from infostealer accounts. This technique is designed to gain access to sensitive data, emails and collaboration tools across different industries. Attackers can also use compromised accounts to conduct lateral movement…

Read More

Why Apple's disabling of iCloud encryption in the UK is bad news for everyone

Why Apple's disabling of iCloud encryption in the UK is bad news for everyone

Maria Diaz/ZDNET Apple has disabled its most advanced data security feature, Advanced Data Protection (ADP), for UK users following a government request for access to encrypted data. Apple, a staunch opponent of encryption backdoors, chose to disable Advanced Data Protection (ADP) for UK users last Friday. ADP, which provides end-to-end encryption to ensure only account holders can access their iCloud data, is no longer available in the country.  Also: The best VPN services (and how…

Read More

Alibaba to invest $52 billion in AI and cloud over three years

Alibaba to invest  billion in AI and cloud over three years

“Although $52 billion is a lot of money, every US-based hyper scaler is committing more than this to AI already,” said Hyoun Park, CEO and chief analyst at Amalgam Insights. “AWS is committing roughly $100 billion to new capital expenditures next year, most of which is servers for AI-related use cases. Microsoft plans to spend $80 billion which Satya Nadella has very publicly committed to. And Google has committed roughly $75 billion this year for…

Read More

Google just made AI coding assistance free. Here's why it matters

Google just made AI coding assistance free. Here's why it matters

ZDNET Writers are persnickety creatures. George R.R. Martin wrote all of the Game of Thrones books using DOS and the WordStar word processor — both artifacts from the 1980s. But when it comes to fussiness about their tools, writers of words don’t hold a candle to writers of code. Also: Brace yourself: The era of ‘citizen developers’ creating apps is here, thanks to AI We coders are extremely particular about the coding environments and setups we…

Read More
1 70 71 72 73 74 4,080