admin

Cybersecurity researchers on Tuesday took the wraps off a multi-stage espionage campaign targeting high-ranking government officials overseeing national security policy and individuals in the defense industry in Western Asia. The attack is unique as it leverages Microsoft OneDrive as a command-and-control (C2) server and is split into as many as six stages to stay as
0 Comments
Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. Today, distributed cloud infrastructure provider Sync Computing emerged from stealth mode to announce it raised $6.1 million in a funding round. The organization also announced the launch of Sync Autotuner for Apache Spark and
0 Comments
Saturn, the second-largest planet in the Solar System after Jupiter, has always attracted the attention of not just scientists but also amateur astronomers. Given the prominent rings around it, it is easily recognisable. But it has another outstanding feature: more than 60 moons. One of these moons has got scientists particularly interested recently. According to
0 Comments
Google is reportedly working on a new Chromecast with Google TV that could replace the company’s older third-generation Chromecast that was released in 2018. The upcoming Chromecast is said to feature a maximum resolution of 1080p, could feature the company’s Google TV interface and come with a remote. The upcoming Chromecast with Google TV is
0 Comments
Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. Companies are adopting cloud HR technologies as their workforces become increasingly distributed during the pandemic. According to PricewaterhouseCoopers, roughly 44% of talent managers look to cloud solutions to increase efficiency and productivity, while 35%
0 Comments
Social engineering campaigns involving the deployment of the Emotet malware botnet have been observed using “unconventional” IP address formats for the first time in a bid to sidestep detection by security solutions. This involves the use of hexadecimal and octal representations of the IP address that, when processed by the underlying operating systems, get automatically
0 Comments