UK regulators have accused Microsoft and Amazon of unfairly limiting competition in the cloud services market. The preliminary findings from Ofcom’s market study into the sector suggest that these two “hyperscalers” charge significantly higher egress fees than most other providers and set technical restrictions that limit interoperability with other cloud providers. Ofcom also raised concerns […]
The dangers of working in a siloed manner are becoming increasingly apparent, with the risks of such an approach extending beyond simple isolation to endangering profit margins, company growth and even human life. However, innovations in operations, such as cloud computing and the analysis and insight it offers, are transforming the mining industry. The cloud […]
Researchers have identified a serious security flaw in the IEEE 802.11 WiFi protocol standard, which can be exploited by hackers to trick access points into leaking network frames in plaintext form. Frames are data containers that hold important information such as source and destination MAC addresses, control and management data. The flaw affects various devices […]
Multiple users and researchers have reported that eFile.com, a tax return software authorized by the IRS, has been caught serving malware. The malicious JavaScript file in question is called ‘popper.js’, which was being loaded by almost every page of eFile.com until at least April 1st. The ‘popper.js’ file contained a code that attempted to load […]
Multiple vulnerabilities in Nexx smart devices have been discovered, which can be exploited to control garage doors, disable home alarms, or smart plugs. The vulnerabilities include the use of universal credentials hardcoded in the firmware, allowing attackers to remotely control any customer’s devices. This vulnerability can also be used to identify Nexx users and collect […]
As cyberattacks become increasingly sophisticated, companies face severe financial and reputational damage. With the use of artificial intelligence and machine learning, hackers exploit vulnerabilities, making social media scams more challenging to detect. Therefore, cybersecurity has become a key factor when considering a move to the cloud. Cloud ERP providers invest heavily in capabilities to protect […]
According to research by the GSMA, the market for virtual network slicing among businesses is estimated to reach a value of USD$300bn by 2025. However, mobile operators must be aware of the added responsibility they will face regarding cybersecurity if they choose to offer network slicing to their business clients using their 5G networks. SecurityGen’s […]
The collaboration between the United States and Costa Rica on cybersecurity has been confirmed, with the United States announcing a plan to provide $25 million to enhance Costa Rica’s digital infrastructure. The US Department of State intends to allocate around $25 million in funding, subject to congressional approval, to improve Costa Rica’s cyber defenses against […]
Capita, a major outsourcing company with £6.5 billion in public sector contracts, has confirmed that a cyber attack caused IT outages for some of its services on March 31. The attack affected the company’s internal Microsoft 365 applications, resulting in disruptions to some services provided to individual clients. While the majority of the company’s client […]
A group of fraudulent extortionists are exploiting data breaches and ransomware attacks to scam US companies. They threaten to sell or publish allegedly stolen data unless payment is made. In some cases, the group has added a distributed denial-of-service (DDoS) attack threat. The group, calling themselves Midnight, impersonates ransomware and data extortion gangs in emails, […]