Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities. However, not all vulnerabilities are of equal value to attackers, as their significance depends on…

Read More

Generative AI in Security: Risks and Mitigation Strategies

Generative AI in Security: Risks and Mitigation Strategies

Generative AI became tech’s fiercest buzzword seemingly overnight with the release of ChatGPT. Two years later, Microsoft is using OpenAI foundation models and fielding questions from customers about how AI changes the security landscape. Siva Sundaramoorthy, senior cloud solutions security architect at Microsoft, often answers these questions. The security expert provided an overview of generative AI — including its benefits and security risks — to a crowd of cybersecurity professionals at ISC2 in Las Vegas…

Read More

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Check Point’s Harmony Email & Collaboration team detected over 5,000 emails disguised as Microsoft product notifications, which could lead to email extortion, the cybersecurity company said on Oct. 2. The emails stand out for their polished appearance and the inclusion of legitimate links. The announcement comes as part of Cybersecurity Awareness Month, highlighting the ongoing risks posed by phishing attacks. Email scam campaign stands out for polished appearance The emails come from “organizational domains impersonating…

Read More

Exclusive: Google Updates Confidential Computing Portfolio

Exclusive: Google Updates Confidential Computing Portfolio

On Oct. 2, Google announced several new entries in their portfolio of VM services for enterprise clouds. The tech giant’s Confidential VMs use hardware-based encryption to secure data and applications, ensuring they cannot be tampered with. Google provides several Confidential VM products and services. “The ability to encrypt data anywhere helps to alleviate concerns about third-party access to data, removing cloud adoption barriers, and, by removing these barriers, allows IT teams and developers to realign…

Read More

Google Cloud Strengthens Backup Service With Vaults

Google Cloud Strengthens Backup Service With Vaults

Backup and recovery are critical in catastrophic cases that affect an organization’s entire Google Cloud account. Having an untouchable, logically air-gapped version adds a layer of reassurance for high-stakes data. On Sept. 10, Google Cloud beefed up its backup and disaster recovery services with an unmodifiable vault. The service is currently in preview mode, but it will be available to Google Cloud customers in parts of the U.S., parts of Europe, and Taiwan “in the…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat and DEF CON are two of the major security conferences in the U.S., drawing large crowds of cyber and AI decision-makers to Las Vegas. Black Hat USA 2024 runs from August 3-8, with most of the briefings occurring on August 7 and 8; DEF CON 32 runs from August 8-11. We’re rounding up the enterprise business tech news from Black Hat and DEF CON that is most relevant for IT and tech decision-makers….

Read More

Google Workspace Vulnerability Allowed Thousands of Emails to be Compromised

Google Workspace Vulnerability Allowed Thousands of Emails to be Compromised

Thousands of email addresses have been compromised after hackers used them to create Google Workspace accounts and bypassed the verification process. According to Google, a “specially constructed request” could open a Workspace account without verifying the email. This meant that bad actors only required the email address of their desired target to impersonate them. While none of the fake accounts were used to abuse Google services, like Gmail or Docs, they were used to access…

Read More

Cisco Live 2024: Cisco Unveils AI Deployment Solution With NVIDIA

Cisco Live 2024: Cisco Unveils AI Deployment Solution With NVIDIA

Cisco will invest $1 billion in AI and package a new networking solution with NVIDIA’s AI infrastructure, the organization announced at its annual consumer event on June 4. Cisco Live is being held in Las Vegas from June 2 – 6. These and the other announcements from Cisco Live respond to the enterprise trends for AI, plus increased visibility and security. Cisco partners with NVIDIA on Nexus HyperFabric AI clusters A new networking solution from…

Read More

Get Ready for more Cisco Software and Solutions on Google Cloud Marketplace

Get Ready for more Cisco Software and Solutions on Google Cloud Marketplace

Cisco is expanding its presence on Google Cloud Marketplace! Starting with Cisco Secure Workload and Cisco Multicloud Defense, Cisco is working with Google to grow the number of transactable solutions offered on the marketplace. Stay tuned for more coming in FY25. Our Senior Vice President and Chief Product Officer for Cisco Security, Raj Chopra, highlights the significance of this expanding collaboration with Google Cloud: “This will enable our customers and partners to have direct access…

Read More
1 2 3 4