Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Advocate Aurora Health (AAH), a healthcare provider with locations in Illinois and Wisconsin, has published a data breach notice to its website. However, rather than being the victim of a ransomware attack or some other form of unauthorized access, AAH has instead attributed the incident to a bit of JavaScript... Read more...
On September 24, the cyber threat intelligence company SOCRadar notified Microsoft that one of its Azure Blob Storage servers was misconfigured and leaking customer information. Now, almost a month later, both Microsoft and SOCRadar have released blog posts warning businesses that some of their transaction data and... Read more...
The US Department of Education is currently preparing to forgive up to $20,000 per person in federal student loan debt. While there are multiple outstanding legal challenges to the executive order that authorizes this plan, those with student loans can already apply for debt relief on the official Federal Student Aid... Read more...
The conventional wisdom when you think you've picked up some nasty Windows malware is to format the disk and start from scratch, and that's enough to defeat most hacks. However, it won't help with a new piece of malicious code floating around hacking forums. Security researchers are sounding the alarm over a new UEFI... Read more...
On October 10, less than a month after Australia was hit by its largest ever data breach, the Australian online retail store MyDeal was struck by a data breach. According to Woolworths Group, which recently acquired the online retailer, an unknown actor used a set of compromised employee credentials to access MyDeal’s... Read more...
Today, KIOXIA has announced a new series of datacenter solid state drives. The new XD7P drives follow the company’s XD6 series in using the EDSFF E1.S formfactor for use in cloud and hyperscale applications. The XD7P series is intended for read-intensive applications with low latency requirements across mixed... Read more...
Researchers at the cybersecurity company Zscaler have discovered a new version of the Ducktail Infostealer in a malware campaign seeking to steal Facebook Business account credentials. Cybersecurity researchers first identified the Ducktail Infostealer in 2021, attributing the bit of malware to a Vietnamese threat... Read more...
This week, Cloudflare released a threat report detailing the state of distributed-denial-of-service (DDoS) attacks in the third quarter of 2022. Cloudflare is a major provider of DDoS mitigation services, giving the company insight into the frequency, strength, and nature of DDoS attacks. The largest attack Cloudflare... Read more...
This week, the Northern District of California court is considering whether to let a lawsuit filed against Google continue as a class action lawsuit. The suit in question is seeking statutory damages on behalf of millions of Google Chrome users, claiming that Google misled users of Chrome’s Incognito mode into a false... Read more...
Mullvad VPN, the Swedish VPN service that powers Mozilla VPN, is currently in the midst of a security audit of its Android app. While conducting this audit, the company discovered that Android’s VPN settings don’t block the operating system from making certain connections to Google servers outside the VPN tunnel... Read more...
Toyota, the world’s largest car company, recently discovered that an access key for one of its data servers has been publicly available on GitHub for almost five years, exposing the data on this server to potential unauthorized third party access. The data server in question stores information related to subscribers... Read more...
Researchers at the cybersecurity firm Trellix have been keeping tabs on a sophisticated phishing campaign, known as BazarCall, since it first drew attention in 2020. This campaign evolved over time, pioneering a social engineering technique called "callback phishing" that is now employed by many different threat... Read more...
Researchers at the cybersecurity firm Checkmarx have managed to map out a complex web of criminal activity that all ties back to a threat actor known as LofyGang. This group of cybercriminals caters to other nefarious actors and Discord users by offering hacking tools, Discord-related npm packages, and other services... Read more...
Back in 2018, the Associated Press (AP) published a piece bringing attention to the fact that Google still collects some user location data even when Location History is disabled in Google Account settings. Two years later, the Arizona Attorney General sued Google for deceptive location tracking practices, citing this... Read more...
Zimperium, a cybersecurity company that focuses on mobile devices, has published research detailing a new family of Android spyware. Dubbed “RatMilad,” this spyware seems to be targeting enterprise mobile devices located in the Middle East. However, unlike many other spyware families, such as Pegasus and Hermit... Read more...
Last month, researchers at the cybersecurity firm GTSC discovered cyberattacks actively exploiting two zero-day vulnerabilities in the Microsoft Exchange email system. The researchers reported these two vulnerabilities to the Zero Day Initiative (ZDI), which verified this report and passed it on to Microsoft. The... Read more...
On September 5, Los Angeles Unified School District (LAUSD), the second largest school district in the United States, published a news release disclosing a ransomware attack on its internal systems. While LAUSD is far from the only school to have been hit by ransomware this year, the size of the school district has... Read more...
The mouse and graphical user interface are still arguably two of the greatest innovations in computing. They make computers easy to use, but that does not always mean slinging a cursor around is the best use of time. The keyboard still reigns supreme for many Windows tasks, so it is worthwhile to learn how to use it... Read more...
Earlier this week, Microsoft confirmed a “new” 0-Day remote code execution vulnerability within Exchange Servers. While it isn’t necessarily new in the family of Proxy-Exploits, critical infrastructure is still being attacked now, and hundreds of thousands of servers are potentially vulnerable to this issue, so patch... Read more...
Last year, Cloudflare, a company that provides DDoS mitigation, content delivery network (CDN) services, and many others, published a blog post declaring its intention to kill CAPTCHAs. Now about a year and a half later, the company is introducing an alternative to standard CAPTCHAs that should be much faster and... Read more...
Last Thursday, one of Australia’s biggest telecommunications and broadband providers, Optus, disclosed a cyberattack that compromised customer data. While the data breach took place a week ago, the story continues to develop. As it currently stands, a threat actor accessed the personal information of as many as 11.2... Read more...
This afternoon at Intel Innovation 2022 in San Jose, Intel offered a sneak peek of the capabilities of the on-board accelerators of its forthcoming 4th Generation Xeon Processor family, known as Sapphire Rapids. In fact, we were treated to a hands-on “Intel 4th Gen Xeon Accelerator Experience” today, to watch Sapphire... Read more...
First ... Prev 10 11 12 13 14 Next