Skip to main content

5 posts tagged with "Hacking"

View All Tags

· 4 min read
Robbe Heynderickx
Bronnen

Bron: artikel integraal overgenomen van bleepingcomputer.com
Origineel auteur: Sergiu Gatlan

A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.

· 3 min read
Michiel Van de Velde
Bronnen

Bron: artikel integraal overgenomen van BLEEPINGCOMPUTER
Origineel auteur: Bill Toulas

Four vulnerabilities collectively called "Leaky Vessels" allow hackers to escape containers and access data on the underlying host operating system.

The flaws were discovered by Snyk security researcher Rory McNamara in November 2023, who reported them to impacted parties for fixing.

Snyk has found no signs of active exploitation of the Leaky Vessels flaws in the wild, but the publicity could change the exploitation status, so all impacted system admins are recommended to apply the available security updates as soon as possible.

· 3 min read
Robbe Heynderickx
Bronnen

Bron: artikel integraal overgenomen van Dutch IT Channel
Origineel auteur: Wouter Hoeffnagel

Het gaat goed met IT-channel partners. Ruim drie op de vijf IT-kanaalpartners (61%) in de Benelux meldt dat hun zaken er vandaag de dag beter voor staan dan twee jaar geleden. Vooral de adoptie van generatieve AI-tool (GenAI-tools) en de groeiende vraag naar securitydiensten draagt hieraan bij.

· 3 min read
Robbe Heynderickx
Bronnen

Bron: artikel gedeeltelijk overgenomen van Techopedia
Origineel auteur: Franklin Okeke

The first quarter of 2024 has been about artificial intelligence (AI) and what it can and cannot do, so it’s no surprise that organizations have focused on it.

However, the Internet of Things (IoT) is close to AI on the priority list—according to IoT Analytics, it was reported as one of the three corporate priorities in 2024.

Despite its potential to streamline operations and boost efficiency, the IoT firm Asimily warned that as businesses push on with their IoT strategies there is also a parallel growth in IoT security vulnerabilities.

Last year, a Zscaler report indicated a 400% growth in IoT malware attacks, a testament to how poorly secured IoT devices can present a tempting target for cybercriminals.

Factoring in the above numbers reveals one thing: corporate reliance on IoT devices could leave organizations more vulnerable to security incidents than we think.

All these beg the question: how are organizations prepping themselves for corporate IoT security challenges in 2024?

To answer this and more, we explore key trends in IoT security and seek expert opinions.