December 11, 2024 PRESS RELEASE Apple Intelligence now features Image Playground, Genmoji, Writing Tools enhancements, seamless support for ChatGPT, and visual intelligence Today also marks the beginning of Apple Intelligence language expansion with localized English support for Australia, Canada, Ireland, New Zealand, South Africa, and the U.K. CUPERTINO, CALIFORNIA Apple … [Read more...] about Apple Intelligence now features Image Playground, Genmoji, and more
Top 5 IT challenges leaders are facing in 2024 (and solutions to them)
Amid budget constraints, labor shortages, and the need to do “more with less,” CIOs and IT leaders are facing common IT problems that transcend industries. From poor data accessibility to changing customer expectations, IT leaders are turning to generative AI (GenAI) as an answer to their problems. Continuous investments in GenAI promise companies new ways to solve key … [Read more...] about Top 5 IT challenges leaders are facing in 2024 (and solutions to them)
Happy Third Birthday to Secure MSP Center
It is hard to believe that this November, we will be celebrating the third anniversary of the launch of Secure MSP Center. We have come a long way from having MSPs buy single products to offering a streamlined, comprehensive program and dashboard for MSPs through Secure MSP Center and MSP Hub. We wanted to make it easy for our MSP partners to transact with Cisco, so made it … [Read more...] about Happy Third Birthday to Secure MSP Center
Quantum Cryptography: What’s Coming Next
This is the second in our series of blogs about the quantum threat and preparing for “Q-Day,” the moment when cryptanalytically relevant quantum computing (CRQC) will be able to break all public-key cryptography systems in operation today. The first blog provided an overview of cryptography in a post-quantum world, and this one explores what comes next. What it will take to … [Read more...] about Quantum Cryptography: What’s Coming Next
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany's Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and … [Read more...] about Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. "The target of the threat actors were Thailand officials based on the nature of the lures," Nikhil Hegde, senior engineer for Netskope's Security … [Read more...] about Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Cisco Secure Workload: Leading in Segmentation Maturity
As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach. Cisco Secure Workload is at the forefront … [Read more...] about Cisco Secure Workload: Leading in Segmentation Maturity
Apple honors 2024 App Store Award winners
December 11, 2024 PRESS RELEASE Apple honors 2024 App Store Award winners Apple celebrates the best apps and games of the year, recognizing 17 talented developers for exceptional experiences on the App Store CUPERTINO, CALIFORNIA Apple today revealed the winners of the 2024 App Store Awards, honoring 17 apps and games that helped users ignite their creativity, achieve new … [Read more...] about Apple honors 2024 App Store Award winners
The Customer Adoption Journey of Cisco Secure Workload
In today’s rapidly evolving threat landscape, securing workloads across diverse environments is critical for organizations of all sizes. Cisco Secure Workload (formerly Tetration) provides end-to-end visibility, microsegmentation and advanced security capabilities for workloads deployed across data centers and cloud environments. This blog post explores the customer adoption … [Read more...] about The Customer Adoption Journey of Cisco Secure Workload
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
Dec 13, 2024Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken by a threat actor, dubbed MUT-1244 (where MUT refers … [Read more...] about 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits