Google Launches Gemini 2.0 with Autonomous Tool Linking

Google Launches Gemini 2.0 with Autonomous Tool Linking

Google is embracing “agentic experiences” in the rollout of Gemini 2.0, its new flagship family of generative AI expected to compete with ChatGPT with OpenAI o1, GitHub Copilot, and Amazon Nova. The tech giant released the first model, Gemini 2.0 Flash, on Dec. 11 for global developers through the Gemini API in Google AI Studio and Vertex AI. Consumers can expect Gemini 2.0 to impact Google Search and AI Overviews, with limited testing beginning next…

Read More

Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others

Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others

December brought a relatively mild Patch Tuesday, with one vulnerability having been actively exploited. Of all 70 vulnerabilities fixed, 16 were classified as critical. “This year, cybersecurity professionals must be on Santa’s nice list, or, at the very least, Microsoft’s,” Tyler Reguly, associate director of security R&D at cybersecurity software and services company Fortra, told TechRepublic in an email. Microsoft patches leaky CLFS CVE-2024-49138 is an elevation of privilege vulnerability in the Windows Common Log…

Read More

Apple Patches Two Zero-Day Attack Vectors

Apple Patches Two Zero-Day Attack Vectors

Apple’s latest security updates for iOS, macOS, Safari, visionOS, and iPadOS contained brief but critical disclosures of two actively exploited vulnerabilities. The tech giant said Clément Lecigne and Benoît Sevens of Google’s Threat Analysis Group discovered the vulnerabilities. NIST lists the vulnerabilities as CVE-2024-44308 and CVE-2024-44309. What are the vulnerabilities Apple patched? Apple didn’t disclose much information about the exploitation or what attackers might have done using these vulnerabilities. However, the Threat Analysis Group works…

Read More

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities. However, not all vulnerabilities are of equal value to attackers, as their significance depends on…

Read More

Generative AI in Security: Risks and Mitigation Strategies

Generative AI in Security: Risks and Mitigation Strategies

Generative AI became tech’s fiercest buzzword seemingly overnight with the release of ChatGPT. Two years later, Microsoft is using OpenAI foundation models and fielding questions from customers about how AI changes the security landscape. Siva Sundaramoorthy, senior cloud solutions security architect at Microsoft, often answers these questions. The security expert provided an overview of generative AI — including its benefits and security risks — to a crowd of cybersecurity professionals at ISC2 in Las Vegas…

Read More

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Check Point’s Harmony Email & Collaboration team detected over 5,000 emails disguised as Microsoft product notifications, which could lead to email extortion, the cybersecurity company said on Oct. 2. The emails stand out for their polished appearance and the inclusion of legitimate links. The announcement comes as part of Cybersecurity Awareness Month, highlighting the ongoing risks posed by phishing attacks. Email scam campaign stands out for polished appearance The emails come from “organizational domains impersonating…

Read More

Exclusive: Google Updates Confidential Computing Portfolio

Exclusive: Google Updates Confidential Computing Portfolio

On Oct. 2, Google announced several new entries in their portfolio of VM services for enterprise clouds. The tech giant’s Confidential VMs use hardware-based encryption to secure data and applications, ensuring they cannot be tampered with. Google provides several Confidential VM products and services. “The ability to encrypt data anywhere helps to alleviate concerns about third-party access to data, removing cloud adoption barriers, and, by removing these barriers, allows IT teams and developers to realign…

Read More

Google Cloud Strengthens Backup Service With Vaults

Google Cloud Strengthens Backup Service With Vaults

Backup and recovery are critical in catastrophic cases that affect an organization’s entire Google Cloud account. Having an untouchable, logically air-gapped version adds a layer of reassurance for high-stakes data. On Sept. 10, Google Cloud beefed up its backup and disaster recovery services with an unmodifiable vault. The service is currently in preview mode, but it will be available to Google Cloud customers in parts of the U.S., parts of Europe, and Taiwan “in the…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat and DEF CON are two of the major security conferences in the U.S., drawing large crowds of cyber and AI decision-makers to Las Vegas. Black Hat USA 2024 runs from August 3-8, with most of the briefings occurring on August 7 and 8; DEF CON 32 runs from August 8-11. We’re rounding up the enterprise business tech news from Black Hat and DEF CON that is most relevant for IT and tech decision-makers….

Read More
1 2 3 4