Month: March 2022

Two weeks after details emerged about a second data wiper strain delivered in attacks against Ukraine, yet another destructive malware has been detected amid Russia’s continuing military invasion of the country. Slovak cybersecurity company ESET dubbed the third wiper “CaddyWiper,” which it said it first observed on March 14 around 9:38 a.m. UTC. Metadata associated
0 Comments
Network-attached storage (NAS) appliance maker QNAP on Monday warned of a recently disclosed Linux vulnerability affecting its devices that could be abused to elevate privileges and gain control of affected systems. “A local privilege escalation vulnerability, also known as ‘Dirty Pipe,’ has been reported to affect the Linux kernel on QNAP NAS running QTS 5.0.x
0 Comments
Did you miss a session at the Data Summit? Watch On-Demand Here. This article was contributed by Kelley Kirby, product marketing analyst at Uptycs Let’s talk about the cloud (because who isn’t?). Over the last several years, we’ve seen cloud adoption skyrocket as organizations work to find the most efficient and cost-effective way of operating
0 Comments
French video game company Ubisoft on Friday confirmed it was a victim of a “cyber security incident,” causing temporary disruptions to its games, systems, and services. The Montreuil-headquartered firm said that an investigation into the breach was underway and that it has initiated a company-wide password reset as a precautionary measure. “Also, we can confirm
0 Comments
Telegram is getting an update that includes multiple new features. These include a download manager to control downloads, a new attachment menu to share documents and re-arrange media albums before sending, and new streaming tools to turn a Telegram channel into a TV station. In addition, the Android app is getting semi-transparent headers. Further, there
0 Comments
Did you miss a session at the Data Summit? Watch On-Demand Here. When drafting request for proposal (RFP) documents from scratch, organizations often lack time to customize them in a way that would truly resonate with potential vendors. Likewise, service suppliers that are sending their RFP responses can benefit from an automated process that lets
0 Comments