Posts

Showing posts from August, 2024

Microchip Technology says certain operations disrupted by cyber incident

Image
Microchip Technology says certain operations disrupted by cyber incident Microchip Technology said on Tuesday an "unauthorized party" disrupted the company's use of certain servers and some business operations. After detecting "potentially suspicious activity" in its IT systems on Saturday, the chipmaker began taking steps to assess and contain the issue, it said in a filing. Microchip said its manufacturing facilities were operating at less-than-normal levels and its ability to fulfill orders was impacted The company has shut down certain systems and launched an investigation with the assistance of external cybersecurity advisers. International Research Awards on Cybersecurity and Cryptography #Sciencefather #Scifax #Awards #Events #Blockchain #Encryption #Webinar #ResearchScientist #Datascientist #Professor #Assistant #Associate #InformationScientist #Writer #socialscientist #Technician #DigitalTwin #Decentralized #IoTSecurity #LightweightCryptography #SmartCo

BackBack Government warns against vulnerabilities for some Microsoft users

Image
  Government warns against vulnerabilities for some Microsoft users: All details The Government has issued a high risk warning for some Microsoft users. The Indian Computer Emergency Response Team (CERT-IN) has issued a warning against vulnerabilities fors ome Microsoft services and products. This includes Microsoft Windows, Microsoft Office, Microsoft SharePoint, Microsoft Dynamics CRM, Visual Studio and .NET Framework. As per a report, the vulnerabilities found in these Microsoft services are of severity and high risk. Multiple vulnerabilities have been reported which could bypass security restrictions in the given Microsoft services and products. CERT-IN is a nodal agency under the Ministry of Electronics and Information Technology . This government body is responsible for reporting bugs and cybersecurity threats like hacking and phishing attacks. CERT has reported, “Multiple vulnerabilities have been reported in various Microsoft products which could be exploited by an attacker to

Driving digital transformation: The powerful fusion of IoT, blockchain, AI/ML technologies

Image
  Driving digital transformation: The powerful fusion of IoT, blockchain, AI/ML technologies In today's rapidly evolving digital landscape, organisations are seeking innovative ways to drive digital transformation and stay ahead of the curve. The fusion of Internet of Things (IoT), blockchain, and artificial intelligence/machine learning (AI/ML) technologies has emerged as a game-changer in this pursuit. This article explores how the convergence of these powerful technologies is revolutionising industries, enabling organisations to unlock new opportunities, enhance efficiency, and creat .. IoT — Connecting the physical and digital worlds: The IoT revolutionises digital transformation by connecting everyday objects and devices, enabling them to collect and share data. This connectivity enhances operational efficiency, automates processes, and enables predictive maintenance. With IoT, organisations can optimise their supply chains, track assets in real-time, and create connected e ..

Global outage hits cybersecurity firm Crowdstrike

Image
                  Global outage hits cybersecurity firm Crowdstrike: report A cyber outage affecting Australian media, banks and telecoms companies appears to relate to an issue at global cybersecurity firm Crowdstrike, a spokesperson for Australia’s home affairs minister said on Friday. Crowdsourced website Downdetector showed outages at several banks and telecoms companies. “I am aware of a large-scale technical outage affecting a number of companies and services across Australia this afternoon,” the office of Australia's National Cyber Security Coordinator Michelle McGuinness said in a post on X. International Research Awards on Cybersecurity and Cryptography #sciencefather #Scifax #Awards #Events #Blockchain #Encryption #Webinar #ResearchScientist #Datascientist #Professor #Assistant #Associate #InformationScientist #Writer #socialscientist #Technician #DigitalTwin #Decentralized #IoTSecurity #LightweightCryptography #SmartContracts #IoT #DataIntegrity #FutureTech #Cybersecurit

malware mafia alive and kicking

Image
Scores of malicious domains and phishing campaigns, in the aftermath of the global outage triggered by faulty software from CrowdStrike in July, are still actively pretending to seek feedback from impacted companies, cybersecurity experts said. Cybercriminals were quick to exploit the chaos caused by the CrowdStrike crisis and send remote access or data wiper malware through phishing emails, which are then used as a ransom tactic. International Research Awards on Cybersecurity and Cryptography #sciencefather #Scifax #Awards #Events #Blockchain #Encryption #Webinar #ResearchScientist #Datascientist #Professor #Assistant #Associate #InformationScientist #Writer #socialscientist #Technician #DigitalTwin #Decentralized #IoTSecurity #LightweightCryptography #SmartContracts #IoT #DataIntegrity #FutureTech #Cybersecurity #SecureIoT More Details: Visit Our Website: cybersecurity.researchw.com Visit Our Conference Submission: x-i.me/cyberconnomi Visit Our Award Nomination: x-i.me/cybawa1 Contac

Authentication is the future of data protection

Image
  Mousetrapping the black hats: why password-less authentication is the future of data protection Data breaches have seen a steady rise with the widespread adoption of work-from-home culture amid the pandemic. The process of efficiently securing any ecosystem starts with identifying its weakest link. And here, it’s the password. A two-factor password-less authentication process, which uses biometric scan, can address this vulnerability. But there are downsides as well. International Research Awards on Cybersecurity and Cryptography #sciencefather #Scifax #Awards #Events #Blockchain #Encryption #Webinar #ResearchScientist #Datascientist #Professor #Assistant #Associate #InformationScientist #Writer #socialscientist #Technician #DigitalTwin #Decentralized #IoTSecurity #LightweightCryptography #SmartContracts #IoT #DataIntegrity #FutureTech #Cybersecurity #SecureIoT More Details: Visit Our Website: cybersecurity.researchw.com Visit Our Conference Submission: x-i.me/cyberconnomi Visit Our

NIC plans seven new e-security centres with AI

Image
  NIC plans seven new e-security centres with AI, ML technologies The National Information Centre (NIC) is looking to set up seven cybersecurity operations centres with headquarters in Delhi and site offices at Hyderabad, Chennai, Bengaluru, Guwahati, Kolkata and Mumbai or Pune, sources told ET. All the seven centres will be interconnected so that in case of failure of any of the sites across the country, the workload should be transferred to the other centres without any manual intervention, a senior government official said. “We are looking at a build-operate-transfer model where the company which undertakes the work will be asked to complete the work in approximately 12-15 months from now,” the official said. These cybersecurity centres will serve as the core component in managing the overall digital security of all the online properties and assets of the central government and its departments in various states, the official said. For example, the managed service provider which will