Month: October 2021

In the world of cybersecurity, speed kills. In less than 20 minutes, a skilled adversary can break into an organization’s network and start exfiltrating critical data assets, and as the volume of data modern companies produce increases, it’s becoming ever more difficult for human analysts to spot malicious activity until it’s too late. This is
0 Comments
Malicious actors have yet again published two more typosquatted libraries to the official NPM repository that mimic a legitimate package from Roblox, the game company, with the goal of distributing stealing credentials, installing remote access trojans, and infecting the compromised systems with ransomware. The bogus packages — named “noblox.js-proxy” and “noblox.js-proxies” — were found to
0 Comments
Popular gaming app and platform Roblox has been down since Friday night, and while there was initially some speculation about an external attack the company confirmed that the outage is due to an internal issue and that it is carrying out the necessary maintenance work to get Roblox up and running again. The company posted
0 Comments
Cybersecurity researchers on Wednesday took the wraps off a “simple yet remarkable” malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East. Codenamed “Wslink” by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are
0 Comments
One of the world’s largest open source software (OSS) foundations, the Eclipse Foundation, this week announced an invitation to leaders in the technology sector to join in the commencement of a new working group initiative specifically focused on developing a new grade of open source software-defined vehicles. Alongside the Eclipse Foundation are several top industry
0 Comments
Microsoft 365 (M365), formerly called Office 365 (O365), is Microsoft’s cloud strategy flagship product with major changes ahead, such as the deprecation of their legacy authentication protocols. Often stored on or saved to the device, Basic Authentication protocols rely on sending usernames and passwords with every request, increasing the risk of attackers capturing users’ credentials,
0 Comments
Call of Duty: Vanguard, Jurassic World Evolution 2, Forza Horizon 5, and more games are set to break cover in November. Fans of first-person shooters can start planning their loadouts as Battlefield 2042 and Call of Duty: Vanguard will be hitting both current-gen and next-gen consoles alongside PC. While CoD is luring co-op players with
0 Comments
Much has been written about struggles of deploying machine learning projects to production. As with many burgeoning fields and disciplines, we don’t yet have a shared canonical infrastructure stack or best practices for developing and deploying data-intensive applications. This is both frustrating for companies that would prefer making ML an ordinary, fuss-free value-generating function like
0 Comments
12 people have been detained as part of an international law enforcement operation for orchestrating ransomware attacks on critical infrastructure and large organizations that hit over 1,800 victims across 71 countries since 2019, marking the latest action against cybercrime groups. The arrests were made earlier this week on October 26 in Ukraine and Switzerland, resulting
0 Comments