There are probably no gamers left who don’t know that downloading games from torrent trackers is a risky business. Yes, they come at no cost, cracked and sometimes conveniently repackaged — but they might contain malware. That’s why security solutions throw a fit — quarantining torrent files, preventing the installation of cracks… well, we should be thankful for that! Official … [Read more...] about Trojanized game PirateFi discovered on Steam
Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
Feb 17, 2025Ravie LakshmananEndpoint Security / Malware Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild. "Its first known variant since 2022, this latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies," the Microsoft Threat … [Read more...] about Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
Meet the Cybersecurity Defender of 2025 for EMEA
In an age when cyber threats loom large, the dedication and passion of cybersecurity professionals are more crucial than ever. Each year, Cisco makes a point of selecting and recognizing a standout cybersecurity advocate who has earned the title of cybersecurity defender. This year, it was impossible to choose just one individual. This is why Cisco’s 2025 EMEA Cybersecurity … [Read more...] about Meet the Cybersecurity Defender of 2025 for EMEA
Optimize financial data retention and compliance with Elastic Cloud solutions
Elastic Cloud empowers financial institutions to optimize data retention, ensure compliance with regulations like GDPR and PCI DSS, and contain costs with advanced tiering and searchable snapshots.As the amount of data being created and stored worldwide is increasing rapidly, financial institutions are tasked more with managing vast volumes of data while ensuring compliance … [Read more...] about Optimize financial data retention and compliance with Elastic Cloud solutions
Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls
Feb 15, 2025Ravie LakshmananMobile Security / Technology Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. … [Read more...] about Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls
Introducing gRPC Swift 2
Say hello to gRPC Swift 2: a major update that brings first-class concurrency support and more expressive APIs for a seamless developer experience. Inconsistent and poorly documented service APIs create integration headaches for developers. gRPC is a modern, high-performance framework for building service APIs, enabling efficient communication between systems over a … [Read more...] about Introducing gRPC Swift 2
Advance Data Compression Techniques Powering Logz.io AI Observability Agents
As an observability leader, at Logz.io, we pride ourselves on continuous innovation. That’s why, last year, we released our AI agents to revolutionize observability by helping businesses, and their engineering and DevOps teams, automate data analysis and root cause analysis. The primary way in which engineering and DevOps teams interact with the agents is by asking … [Read more...] about Advance Data Compression Techniques Powering Logz.io AI Observability Agents
How Mastronardi Produce Secures Innovation with CrowdStrike
Mastronardi Produce, North America’s largest greenhouse produce distributor, has been at the forefront of sustainable agriculture for over 70 years. In that time, being a leader in both agriculture and innovation has come with diverse cybersecurity challenges, including protecting sensitive data, securing against vulnerabilities, and reducing shadow IT risks. To address … [Read more...] about How Mastronardi Produce Secures Innovation with CrowdStrike
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. "If executed at scale, this attack could be used to gain access to thousands of … [Read more...] about New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
Feb 14, 2025Ravie LakshmananBrowser Security / Cryptocurrency The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an … [Read more...] about Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks