Cybersecurity giant Palo Alto Networks is launching its new Identity Threat Detection and Response module for its autonomous security operations center (SOC) solution Cortex XSIAM. The Santa Clara, Calif.-based firm says the new solution enables customers to ingest user identity and behavior data and deploy AI technology to help detect identity-driven attacks within seconds, […]
Latest Content
FBI, CISA Warn of Royal Ransomware Targeting Critical Infrastructure
Royal ransomware actors have been targeting manufacturing, communications, healthcare and education entities since September 2022, agencies say.
U.S. agencies are warning critical infrastructure organizations to be on the lookout for Royal ransomware, a financially motivated threat actor that has been targeted manufacturing, communications, healthcare and education entities since September 2022. In a joint advisory, the FBI and U.S. Cybersecurity and Infrastructure Security Agency say the Royal ransomware actors have compromised U.S. and […]
Audinate Launches Dante Studio 2.0 Software Update
Audinate, developer of the professional Dante AV-over-IP solution, is releasing the Dante Studio 2.0 software update and new pricing.
Audinate, developer of the professional Dante AV-over-IP solution, announced the Dante Studio 2.0 software update and new subscription pricing. Dante Studio is a suite of software tools comprising Dante RX, Dante TX, and Dante Video Viewer. The suite brings Dante AV video directly into a PC from Dante AV Ultra or Dante AV-H cameras, encoders […]
Phishing Remains a Favorite Hacking Tool as New Methods Emerge
New methods such as phone-oriented attack delivery and MFA bypass are making phishing attacks more sophisticated, according to Proofpoint.
Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]
Get Ready to See More ChatGPT Integrations
Developers can now integrate ChatGPT and Whisper models into their apps and products through a new OpenAI API.
OpenAI, the artificial intelligence research and development company and creators of conversational chatbot model ChatGPT, have launched an API for both ChatGPT and automatic speech recognition system Whisper. Models for both ChatGPT and Whisper are now available on OpenAI’s API, giving developers access to language and speech-to-text capabilities. According to OpenAI, the company has achieved […]
No Organization Is an Island: How to Protect Against Supply Chain Attacks
To defend against supply chain attacks, organizations need to focus on all three layers of the attack surface: data, identities and infrastructure.
Every organization interacts with other organizations: suppliers, partners, customers, government agencies and more. As a result, you can suffer a breach even though your organization was not directly targeted. For example, adversaries were able to release the infamous NotPetya malware to thousands of companies worldwide by compromising the supplier of a popular accounting software solution. […]
UC Management Company Utelogy Joins Barco ClickShare Alliance
Move extends the capabilities of the Utelogy platform for managing AV and UC devices to include Barco’s ClickShare Conference solution.
Utelogy, a provider of management, monitoring, automation and analytics software for unified communications systems, is joining the Barco ClickShare Alliance Program as a validated technology partner. According to the Los Angeles, Calif.-based company, this extends the capabilities of the Utelogy platform for managing audiovisual and unified communications devices and peripherals to include Barco’s ClickShare Conference […]
What CISA Learned After Conducting a Red Team Assessment of a Large Critical Infrastructure Organization
CISA obtained persistent access to the organization's network, but security controls like MFA helped thwart further activity.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory that describes a CISA red team assessment of a large critical infrastructure organization with a mature cyber posture, with the goal of sharing its key findings to help IT and security professionals improve monitoring and hardening of networks. According to the advisory, […]
Microsoft Launches Intune Suite for Unified Endpoint Management, Security
Microsoft bills the Intune Suite as a unified endpoint management and security bundle designed to simplify IT management and security.
Microsoft is launching the Microsoft Intune Suite, a new unified endpoint management and security bundle designed to simplify endpoint management experiences, improve an organization’s security posture and improve the user experience. According to a Microsoft blog written by Michael Wallent, corporate vice president, of the company’s enterprise mobility management products, the new Intune Suite is deeply […]
Microsoft Rolls Out New Windows 11 Education Features
Microsoft is rolling out new collaboration, accessibility, IT management and security features in Windows 11 designed for education.
Microsoft is rolling out a new set of easy-to-use collaboration, accessibility and security features in Windows 11 designed for education organizations. The new Windows 11 education features Microsoft highlights include new IT management features, live captions, focus features to help eliminate distractions, simple sign-in and personalized desktop themes. According to Microsoft, school IT administrators in […]