Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat and DEF CON are two of the major security conferences in the U.S., drawing large crowds of cyber and AI decision-makers to Las Vegas. Black Hat USA 2024 runs from August 3-8, with most of the briefings occurring on August 7 and 8; DEF CON 32 runs from August 8-11. We’re rounding up the enterprise business tech news from Black Hat and DEF CON that is most relevant for IT and tech decision-makers….

Read More

Microsoft Azure Outage Caused by DDoS Attack

Microsoft Azure Outage Caused by DDoS Attack

Microsoft has confirmed the cause of the outage on July 30 was a distributed denial-of-service attack. However, its advisory added that the issue was exacerbated by an “error in the implementation of their defenses” during a mitigation attempt. The Azure cloud services were impacted between approximately 11:45 UTC and 19:43 UTC after being flooded by internet traffic. Redmond security pros say that the Azure Front Door and Azure Content Delivery Network components were “performing below…

Read More

Top 6 Cloud Computing Certifications Worth Taking

Top 6 Cloud Computing Certifications Worth Taking

Course Spotlight: Microsoft Cloud Support Associate Professional Certificate on Coursera Our assessment: Best for going from beginner to ready for a career This certification teaches skills from the very basics of knowledge about computing to valuable professional techniques in Microsoft Azure, one of the most popular cloud platforms. This certification includes 12 courses intended to get learners up to speed on IT and cybersecurity, Microsoft 365, cloud management and professional cloud administration. The courses included…

Read More

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

A vulnerability in the ESXi hypervisor was patched by VMware last week, but Microsoft has revealed that it has already been exploited by ransomware groups to gain administrative permissions. VMware ESXi is a bare-metal hypervisor that enables the creation and management of virtual machines directly on server hardware, which may include critical servers. CVE-2024-37085 is an authentication bypass vulnerability that allows malicious actors with sufficient permissions to gain full access to a domain-joined ESXi host….

Read More

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Apple is the latest addition to the list of public U.S. companies that made voluntary commitments to AI regulations, the White House announced on July 26. The commitments, first announced in September 2023, include vows to publicly disclose AI capabilities, to watermark AI content and more. These commitments set a public standard for the country’s largest AI makers in an effort to reduce deception and other novel, unsafe practices that could stem from realistic-looking AI…

Read More

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Cyberattacks targeting the Paris Olympics have made headlines lately. Travel safety is important, but so is keeping up with online hygiene for those employees who may be working from home or in the office. The Olympics happen over multiple weeks and during work hours, unlike many other major sporting events, so there are more opportunities for threat actors to exploit the excitement. We’ve gathered some tips for IT teams during the Summer Olympics, with ideas…

Read More

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

A major disruption to Windows PCs in the U.S., U.K., Australia, South Africa and other countries was caused by an error in a CrowdStrike update, the cloud security company announced on Friday. Emergency services, airports and law enforcement reported downtime, which is ongoing. “This is not a security incident or cyberattack,” CrowdStrike said in a statement. Blue Screen of Death widespread due to CrowdStrike outage Affected organizations saw the infamous Blue Screen of Death, the…

Read More

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%, according to a new report. The Software Vulnerability Ratings Report 2024 from patch management software company Action1 also found that Microsoft Office programs are becoming more exploitable, while attackers are targeting load balancers like NGINX and Citrix at a record rate. Action1 analysts used data from the National Vulnerability Database and CVEdetails.com to draw five insights into how the threat landscape changed…

Read More

Microsoft Delays Recall Launch, Seeking Community Feedback First

Microsoft Delays Recall Launch, Seeking Community Feedback First

Microsoft’s Recall feature, the AI-enabled timeline for Windows 11 on Copilot+ PCs, will be available only to members of the Windows Insider Program in June, instead of the initial planned public preview slated for June 18. This change follows Microsoft’s decision last week to make Recall opt-in instead of enabled by default. Other users will have access to Recall “soon,” after the Redmond giant has had time to respond to feedback from the Windows Insider…

Read More

What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature

What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature

A new strain of ransomware dubbed ShrinkLocker is being used by cyberattackers to target enterprise computers. It exploits the Microsoft BitLocker encryption feature to encrypt the entire local drive and remove the recovery options before shutting down the PC. ShrinkLocker was discovered by cybersecurity firm Kaspersky, and analysts have observed variants in Mexico, Indonesia and Jordan. BitLocker has been used to stage ransomware attacks in the past, but this strain has “previously unreported features to…

Read More
1 2 3 4 5 6