Copilot+ PCs expand availability with new AMD and Intel silicon

In May, we announced a new category of devices: Copilot+ PCs. These PCs are the fastest, most intelligent Windows PCs ever built, featuring a new system architecture designed to deliver best-in-class performance, battery life, and breakthrough AI experiences to help people be more productive, creative and communicate more effectively. Today, marks the next step in […]

Sextortion Scams Now Include Photos of Your Home

An old but persistent email scam known as “sextortion” has a new personalized touch: The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target’s home in a bid to make threats about publishing the videos more frightening and convincing. This week, several readers reported receiving […]

The Top Ten IT Outages in History

Editorial Note: The lessons learned and changes that may result from the CrowdStrike incident may take quite some time to fully understand. CSA is providing a platform for member experts to weigh in on this issue. The opinions of this article represent those of the member, not those of CSA.Written by Javier Perez, Sr. Director […]

Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia and Belarus. “Head Mare uses more up-to-date methods for obtaining initial access,” Kaspersky said in a Monday analysis of the group’s tactics and tools. “For instance, the attackers took advantage of the relatively recent CVE-2023-38831 […]

New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation. “It appears that Cicada3301 ransomware primarily targets small to medium-sized businesses (SMBs), likely through opportunistic attacks that exploit vulnerabilities as the initial access vector,” cybersecurity

Can You Have Bulletproof Security Without Network Lag? Unveiling the Secret

Written by Vaibhav Dutta, Associate Vice President and Global Head – Cybersecurity Products & Services, Tata Communications. Originally published by CRN.Securing a modern enterprise network can feel like a high-wire act. Complex security measures, can slow down critical applications, hindering operational efficiency and productivity. Conversely prioritising ease of application access and performance over security can […]

Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. “This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks,” Dutch security company ThreatFabric said. […]