Month: March 2021

Signaling a major shift to its ads-driven business model, Google on Wednesday unequivocally stated it would not build alternate identifiers or tools to track users across multiple websites once it begins phasing out third-party tracking cookies from its Chrome browser by early 2022. “Instead, our web products will be powered by privacy-preserving APIs which prevent
0 Comments
Join Transform 2021 for the most important themes in enterprise AI & Data. Learn more. Facebook today announced an AI model trained on a billion images that ostensibly achieves state-of-the-art results on a range of computer vision benchmarks. Unlike most computer vision models, which learn from labeled datasets, Facebook’s generates labels from data by exposing
0 Comments
Following Microsoft’s release of out-of-band patches to address multiple zero-day flaws in on-premises versions of Microsoft Exchange Server, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive warning of “active exploitation” of the vulnerabilities. The alert comes on the heels of Microsoft’s disclosure that China-based hackers were exploiting unknown software bugs
0 Comments
The attack surface is virtually expanding before our eyes. Protecting assets across multiple locations, with multiple solutions from different vendors, has become a daily concern for CISOs globally. In a new e-book recently published (download here), CISOs with small security teams talk about the drivers for replacing their EDR/NGAV solutions with an Autonomous XDR solution
0 Comments
The power of audio From podcasts to Clubhouse, branded audio is more important than ever. Learn how brands are increasing customer loyalty and personalization with these best practices. Register Now Join Transform 2021 for the most important themes in enterprise AI & Data. Learn more. Amazon today launched SageMaker Reinforcement Learning (RL) Kubeflow Components, a
0 Comments
Facebook’s logo displayed on a phone screen. Jakub Porzycki | NurPhoto via Getty Images Facebook said Tuesday it’s resuming political, electoral and social issue ads on Thursday after a temporary ban put in place after the November 2020 U.S. presidential election. The company said in October it would be halting political advertising for an indefinite
0 Comments
Epic Games has announced that is acquiring Tonic Games Group, the developer behind the blockbuster, Fall Guys: Ultimate Knockout. Epic Games is currently best known for its battle royale game, Fortnite, apart from past titles like the Unreal and Gears of War franchise, and also recently, the Epic Games Store game distribution platform. The terms
0 Comments
Cybercriminals are now deploying remote access Trojans (RATs) under the guise of seemingly innocuous images hosted on infected websites, once again highlighting how threat actors quickly change tactics when their attack methods are discovered and exposed publicly. New research released by Cisco Talos reveals a new malware campaign targeting organizations in South Asia that utilize
0 Comments
In the age of a pandemic, digital platforms and social media are fast growing phenomena. The Internet connects over 2.5 billion users worldwide, offering opportunities to young people to connect, communicate, educate, and ultimately expand their horizons. In India, however, several socio-economic disparities along with other divisions, based on gender or race, affect equal access
0 Comments
Power utilities in Telangana have averted a possible attempt by a China-based group to hack the state’s power systems, officials said on Wednesday. The preventive action was taken following an alert by the Computer Emergency Response Team of India (CERT-In) and a heightened state of alertness would continue for more days,an official said. “We noticed
0 Comments
Microsoft has released emergency patches to address four previously undisclosed security flaws in Exchange Server that it says are being actively exploited by a new Chinese state-sponsored threat actor with the goal of perpetrating data theft. Describing the attacks as “limited and targeted,” Microsoft Threat Intelligence Center (MSTIC) said the adversary used these vulnerabilities to
0 Comments