Tag: security practices

  • Slashdot: Microsoft, Atom Computing Leap Ahead On the Quantum Frontier With Logical Qubits

    Source URL: https://tech.slashdot.org/story/24/11/20/0026222/microsoft-atom-computing-leap-ahead-on-the-quantum-frontier-with-logical-qubits?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft, Atom Computing Leap Ahead On the Quantum Frontier With Logical Qubits Feedly Summary: AI Summary and Description: Yes Summary: Microsoft and Atom Computing have achieved a significant milestone in developing fault-tolerant quantum computing. The advancement involves utilizing quantum capabilities through Azure cloud service, while also addressing error correction…

  • Krebs on Security: Fintech Giant Finastra Investigating Data Breach

    Source URL: https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/ Source: Krebs on Security Title: Fintech Giant Finastra Investigating Data Breach Feedly Summary: The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of…

  • The Register: America’s drinking water systems have a hard-to-swallow cybersecurity problem

    Source URL: https://www.theregister.com/2024/11/19/us_drinking_water_systems_cybersecurity/ Source: The Register Title: America’s drinking water systems have a hard-to-swallow cybersecurity problem Feedly Summary: More than 100 million rely on systems rife with vulnerabilities, says EPA OIG Nearly a third of US residents are served by drinking water systems with cybersecurity shortcomings, the Environmental Protection Agency’s Office of Inspector General found…

  • Simon Willison’s Weblog: Preview: Gemini API Additional Terms of Service

    Source URL: https://simonwillison.net/2024/Nov/19/preview-gemini/#atom-everything Source: Simon Willison’s Weblog Title: Preview: Gemini API Additional Terms of Service Feedly Summary: Preview: Gemini API Additional Terms of Service Google sent out an email last week linking to this preview of upcoming changes to the Gemini API terms. Key paragraph from that email: To maintain a safe and responsible environment…

  • The Register: Microsoft Fabric promises transactions, analytics on one database service

    Source URL: https://www.theregister.com/2024/11/19/microsoft_data_platform_fabric_upgrade/ Source: The Register Title: Microsoft Fabric promises transactions, analytics on one database service Feedly Summary: Windows giant also improving Iceberg support after throwing lot in with Delta Parquet Ignite Microsoft is set to launch a database service that can manage transactional and analytical workloads in the same system.… AI Summary and Description:…

  • Anchore: Choosing the Right SBOM Generator: A Framework for Success

    Source URL: https://anchore.com/blog/choose-an-sbom-generation-tool-a-framework/ Source: Anchore Title: Choosing the Right SBOM Generator: A Framework for Success Feedly Summary: Choosing the right SBOM (software bill of materials) generator is tricker than it looks at first glance. SBOMs are the foundation for a number of different uses ranging from software supply chain security to continuous regulatory compliance. Due…

  • The Register: iOS 18 added secret and smart security feature that reboots iThings after three days

    Source URL: https://www.theregister.com/2024/11/19/ios_18_secret_reboot/ Source: The Register Title: iOS 18 added secret and smart security feature that reboots iThings after three days Feedly Summary: Security researcher’s reverse engineering effort reveals undocumented reboot timer that will make life harder for attackers Apple’s latest mobile operating system, iOS 18, appears to have added an undocumented security feature that…

  • The Register: Critical 9.8-rated VMware vCenter RCE bug exploited after patch fumble

    Source URL: https://www.theregister.com/2024/11/18/vmware_vcenter_rce_exploited/ Source: The Register Title: Critical 9.8-rated VMware vCenter RCE bug exploited after patch fumble Feedly Summary: If you didn’t fix this a month ago, your to-do list probably needs a reshuffle Two VMware vCenter server bugs, including a critical heap-overflow vulnerability that leads to remote code execution (RCE), have been exploited in…

  • Alerts: CISA Adds Three Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/18/cisa-adds-three-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Three Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability CVE-2024-9474 Palo Alto Networks PAN-OS…