Month: April 2020

0 Comments
A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The first quarter of 2020 was, without a doubt, defined by the outbreak of COVID-19 – now a pandemic that has put much of the world under lockdown, disrupting people’s lives
0 Comments
Researchers have uncovered a potential means to profile and track online users using a novel approach that combines device identifiers with their biometric information. The details come from a newly published research titled “Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices” by a group of academics from the University of Liverpool, New York
0 Comments
Another in our occasional series demystifying Latin American banking trojans In this installment of our series, we introduce Grandoreiro, a Latin American banking trojan targeting Brazil, Mexico, Spain and Peru. As such, it shows unusual effort by its authors to evade detection and emulation, and progress towards a modular architecture. We have seen Grandoreiro being
0 Comments
European VC firm Atomico announced this week that it has hired Sasha Astafyeva as a new investment partner. Astafyeva previously spent three years as a principal at Felix Capital . In her new role, she’ll lead “sourcing, due diligence, and management” of consumer tech companies, according to a company statement. Originally from Ukraine, Astafyeva was
0 Comments
Rapid7 has become the latest big-name security vendor to invest in new cloud security posture management (CSPM) capabilities, with the acquisition of DivvyCloud today. The security analytics and automation vendor will pay $145m in cash and stock for the Arlington, Virginia-based CSPM specialist, with the acquisition expected to close in the second quarter of the year.
0 Comments
It’s not ‘Patch Tuesday,’ but software giant Adobe today released emergency updates for three of its widely used products that patch dozens of newly discovered critical vulnerabilities. The list of affected software includes Adobe Illustrator, Adobe Bridge, and Magento e-commerce platform, containing a total of 35 vulnerabilities where each one of them is affected with
0 Comments
An online auction of rare whiskies amassed by an American collector has been postponed indefinitely following a cyber-attack. More than 1,900 bottles from Richard Gooding’s collection were successfully auctioned off via the Whisky Auctioneer website earlier this year for just under $4m. The second phase of “The Perfect Collection” auction, consisting of 1,958 lots, began on
0 Comments
by Paul Ducklin If you’re a system administrator, the network you look after is almost certainly way more spread out since coronavirus stay-at-home regulations kicked in. But even if your colleagues are using their own computers now, and connecting in via their own internet connections, it’s still “your” network, and it still represents a valuable
0 Comments
A cybersecurity researcher today publicly disclosed technical details and PoC for 4 unpatched zero-day vulnerabilities affecting an enterprise security software offered by IBM after the company refused to acknowledge the responsibly submitted disclosure. The affected premium product in question is IBM Data Risk Manager (IDRM) that has been designed to analyze sensitive business information assets
0 Comments
Two years ago I attended an “Innovation in Immersive Storytelling” event at Industrial Light & Magic, featuring the Chief Game Wizard of Magic Leap. I should have known then, from all the strained corporate sorcery in that sentence, that their demise was inevitable. But in fact I went into that talk a Magic Leap skeptic,
0 Comments
Mark Mills Contributor Mark Mills is the author of the book, “Digital Cathedrals: The Information Infrastructure Era,” and is a senior fellow at the Manhattan Institute, a Faculty Fellow at Northwestern University’s McCormick School of Engineering, and a partner in Cottonwood Venture Partners, an energy-tech venture fund. An epic number of citizens are video-conferencing to
0 Comments
[Editor’s note: Want to get this free weekly recap of TechCrunch news that startups can use by email? Subscribe here.]  Multiple liquidation preferences, full-ratchet anti-dilution clauses and pay-to-play provisions are some of the words that still haunt startup founders who survived downturns in decades past. So far in this downturn, though, investors seem to be sparing the