ZTW25 Promo Video Player

ZTW25 Promo Video Player Source link
Rubrik enables rapid cyber recovery through Turbo Threat Hunting

The product, which is now in beta for Rubrik Enterprise Edition and cloud customers, aims to address challenges associated with prolonged business outages during cyberattacks, reducing the traditional recovery timeline from days or weeks to moments. Source link
Report highlights growing security risks from unmanaged machine identities

Venafi’s latest report, The Impact of Machine Identities on the State of Cloud Native Security in 2024, reveals critical security challenges stemming from the proliferation of unmanaged machine identities, according to Enterprise Times. According to the report, such accounts, which often use default passwords and lack proper monitoring — exposing cloud-native environments to significant risks […]
Researchers uncover AMD chip flaw threatening cloud data

Security researchers have identified a vulnerability in AMD processors that they have dubbed badRAM and which could allow threat actors with physical access to cloud computing environments to bypass encryption protections, reports The Record, a news site by cybersecurity firm Recorded Future. The flaw circumvents AMD’s Secure Encrypted Virtualization, which encrypts virtual machine memory to […]
Keepit secures $50M | SC Media

Keepit, a provider of software-as-a-service data protection and backup solutions, has secured $50 million in funding, raising its total investment to $90 million, SecurityWeek reports. Proceeds from the latest round will be used to accelerate the company’s growth into key markets such as the United States and Europe, alongside other high-growth regions. Additionally, the company […]
Apple patches TCC bypass vulnerability

Apple has addressed a critical flaw in its iOS and macOS systems that could bypass the Transparency, Consent, and Control framework to allow attackers to gain unauthorized access to sensitive user data, TheHackerNews reports. The vulnerability, tracked as CVE-2024-44131, was discovered in the FileProvider component and has been fixed in iOS 18, iPadOS 18, and […]
Rise in hands-on-keyboard cyberattacks highlights detection challenges

Despite advancements in AI-enhanced cyberattacks, manually executed hands-on-keyboard attacks remain a growing threat heading into 2025, reports CRN. Adam Meyers, senior vice president of counter-adversary operations at CrowdStrike says manual attacks, which involve direct interaction with compromised systems rather than relying on malware or automated tools, are gaining traction among cybercriminals for their effectiveness and […]
RansomHub emerges as dominant ransomware group as 2024 ends

TechTarget reports that RansomHub has become the leading ransomware-as-a-service group following the dismantling of LockBit earlier this year, based on ESET’s Threat Report H2 2024, which highlighted ransomware trends including shifts in tactics and emerging groups alongside a rise in macOS-targeted attacks. Operation Cronos, a collaborative law enforcement effort launched in February, resulted in the […]
Citrix acquisitions poised to enhance zero-trust security

Citrix Systems has announced the acquisition of companies deviceTRUST and strong.network to pursue its goal of strengthening its zero-trust security solutions for hybrid work environments, SiliconAngle reports. DeviceTRUST offers solutions that focus on real-time contextual access for virtual desktop infrastructure and desktop as a service, allowing enterprises to secure digital workspaces by continuously monitoring device […]
Criminals using Google Calendar email invites to steal data from users

Cybercriminals were observed manipulating the emails to Google Calendar invites to fool users into clicking on malicious links or attachments that lead to the theft of corporate and personal data. Check Point researchers said Dec. 17 that after an individual clicks on the malicious link, the stolen data gets applied to financial scams in which […]
© Copyright 2024 CNB Tel. All rights reserved