Category: EN

China Forms Biggest-Ever Chip Investment Fund

China officially launches third phase of semiconductor ‘Big Fund’ valued at $47.5bn as it seeks chip manufacturing self-sufficiency This article has been indexed from Silicon UK Read the original article: China Forms Biggest-Ever Chip Investment Fund

TP-Link Archer C5400X gaming router is affected by a critical flaw

Researchers warn of a critical remote code execution vulnerability in TP-Link Archer C5400X gaming router. Researchers at OneKey discovered a a critical remote code execution (RCE) vulnerability, tracked as CVE-2024-5035 (CVSS score 10.0), in TP-Link Archer C5400X gaming router. A remote, unauthenticated,…

Black Basta Ransomware Attack: Microsoft Quick Assist Flaw

Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group, identified as Storm-1811, has been exploiting Microsoft’s Quick Assist tool in a series of social engineering attacks. This group is known for deploying the Black Basta…

ATM malware developed to target Europe

Britain’s NCSC, the cybersecurity arm of GCHQ, has taken heed of a recent alert regarding a concerning cyber threat. According to reports from media outlets, criminals have developed malware specifically targeting ATMs, with the potential to generate a minimum profit…

How to combat alert fatigue in cybersecurity

In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security tools, the prevalence…

The evolution of security metrics for NIST CSF 2.0

CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities patched, software and hardware asset inventory coverage,…

D3 Is Security Automation that Makes Your Team Better

Who do you want running your security operations: robots or cyborgs? For our less nerdy readers, robots are entirely machines, whereas cyborgs are humans that have been augmented with technology. In cybersecurity, the “robot” path would mean trying to replace…

Cybersecurity teams gear up for tougher challenges in 2024

In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored activity increase. Key highlights…

Widespread data silos slow down security response times

Although the goals and challenges of IT and security professionals intersect, 72% report security data and IT data are siloed in their organization, which contributes to corporate misalignment and elevated security risk, according to Ivanti. Leadership plays a crucial role…

34% of organizations lack cloud cybersecurity skills

Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to identified threats, according to Cado Security. The incident response challenge is further complicated as enterprises rapidly…