Cybersecurity

CoinEx exchange drained of $27M worth of crypto in suspected hack

A CoinEx hot wallet transferred $27 million of various tokens to a wallet with no previous history in what the exchange’s team has referred to as “anomalous withdrawals.” Breaking news Join us on social networks On Sept. 12, crypto exchange CoinEx experienced abnormally large outflows to an address with no prior history, leading security experts […]

Cybersecurity

Microsoft Patches a Pair of Actively Exploited Zero-Days

Microsoft addressed five critical security vulnerabilities in its September Patch Tuesday update, along with two “important”-rated zero-days under active attack in the wild. In total, Microsoft released 59 new patches addressing bugs across the product gamut: They affect Microsoft Windows, Exchange Server, Office, .NET and Visual Studio, Azure, Microsoft Dynamics, and Windows Defender. The update […]

Data Center

Why IT leaders should deploy generative AI infrastructure now | TechTarget

In the past several months, rampant excitement about the potential benefits of generative AI technology has increased the technology’s priority status across enterprise organizations worldwide. According to a recent research report from TechTarget’s Enterprise Strategy Group, “Beyond the GenAI Hype: Real-world Investments, Use Cases, and Concerns,” 42% of organizations said they are in a generative […]

Cybersecurity

Webinar: Identity Threat Detection & Response (ITDR) – Rips in Your Identity Fabric

î ‚Sep 13, 2023î „The Hacker NewsThreat Detection / SaaS Security In today’s digital age, SaaS applications have become the backbone of modern businesses. They streamline operations, enhance productivity, and foster innovation. But with great power comes great responsibility. As organizations integrate more SaaS applications into their workflows, they inadvertently open the door to a new era […]

Cybersecurity

Redfly: Espionage Actors Continue to Target Critical Infrastructure

Espionage actors are continuing to mount attacks on critical national infrastructure (CNI) targets, a trend that has become a source of concern for governments and CNI organizations worldwide. Symantec’s Threat Hunter Team has found evidence that a threat actor group Symantec calls Redfly used the ShadowPad Trojan to compromise a national grid in an Asian […]

Cybersecurity

Adobe Says Critical PDF Reader Zero-Day Being Exploited 

Software maker Adobe on Tuesday raised an alarm about new in-the-wild zero-day attacks hitting users of its widely deployed Adobe Acrobat and Reader product. As part of its scheduled batch of Patch Tuesday updates, Adobe warned that hackers are exploiting a remotely exploitable vulnerability — CVE-2023-26369 — to launch code execution attacks. Adobe describes the […]