Top Tech Conferences & Events to Add to Your Calendar in 2024
Oct. 1-2: Cyber Security & Cloud Expo Europe in Amsterdam [in person] Oct. 1-2: TECHSPO in Dubai, UAE [in person] Oct. 8-10: Mobile World Congress in Las Vegas [in person] Oct. 9-10: World Summit AI in Amsterdam [in person] Oct. 9-10: DPW Amsterdam [hybrid] Oct. 10-11: TECHSPO in Johannesburg, South Africa [in person] Oct. 14-16: […]
The Strongest Passwords and the Best Way to Create (and Remember) Them
Some of the strongest passwords you can use are the ones you don’t have to remember. Strange as that may sound, it’s true, if you use a password manager. A password manager creates and securely stores strong, unique passwords for each of your accounts—and does all the remembering for you. And remembering is the root […]
Data Processing in Cisco Observability Platform
Process Vast Amounts of MELT Data Cisco Observability Platform s designed to ingest and process vast amounts of MELT (Metrics, Events, Logs and Traces) data. It is built on top of open standards like OpenTelemetry to ensure interoperability. What sets it apart is its provision of extensions, empowering our partners and customers to tailor every […]
Google’s Perspective on Memory Safety
Google’s Project Zero reports that memory safety vulnerabilities—security defects caused by subtle coding errors related to how a program accesses memory—have been “the standard for attacking software for the last few decades and it’s still how attackers are having success”. Their analysis shows two thirds of 0-day exploits detected in the wild used memory corruption […]
Exploit available for new critical TeamCity auth bypass bug, patch now
A critical vulnerability (CVE-2024-27198) in the TeamCity On-Premises CI/CD solution from JetBrains can let a remote unauthenticated attacker take control of the server with administrative permissions. Since full technical details to create an exploit are available, administrators are strongly recommended to prioritize addressing the issue by updating to the latest version of the product or […]
How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations
Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money laundering scheme. The malicious application, called XHelper, is a “key tool for onboarding and managing these money mules,” CloudSEK researchers Sparsh Kulshrestha, Abhishek Mathew, and Santripti Bhujel said in a report. Details about the scam […]
Seoul Spies Say North Korea Hackers Stole Semiconductor Secrets
North Korean hackers have allegedly stolen South Korean microchip manufacturing technology secrets, prompting the National Intelligence Service (NIS) in Seoul to call for better cyber defenses. Reports say the NIS accused North Korean cybercrime groups of compromising the servers of two separate (so far unnamed) microchip manufacturers in South Korea and stealing semiconductor designs and […]