admin - POKIKA

Raspberry Pi Powers Commodore 64 Expansion Cartridge, Plays Doom

Commodore was a big name in the 1970s, 80s and early 1990s. Its line of home computers spanned decades, but one, the Commodore 64, shines a little brighter than the rest. Frntc aka Carsten has created a Raspberry Pi-powered cartridge, the RAD Expansion Unit, that simulates RAM expansion and provides a CPU boost for a … Read more

Data loss from insider events increases despite IRM programs; Report

The vast majority of companies struggle with data loss from insider events despite dedicated insider risk management (IRM) programs, according to a data impact report commissioned by Code 42. The study, conducted by Vanson Bourne, an independent research firm for technology companies, interviewed 700 US cybersecurity professionals, managers and leaders between January and February. “Insider … Read more

Acceldata and its Data Observability Platform – Solving Big Data Management Challenges

In this video interview with Acceldata Co-Founder and CTO Ashwin Rajeeva, we talk about the company’s data visualization platform, what “data observability” is, and why it’s so important in big data analytics and machine learning development environments. Rajeeva lays the groundwork by explaining the data management challenges organizations face today as they struggle to manage … Read more

A Pakistani-origin spinoff is linked to a new cyber attack on India’s Defense Ministry

March 28, 2023Ravi LakshmanaEnhanced persistent threat The Advanced Persistent Threat Team (APT), which has experience targeting India and Afghanistan, has been linked to a new phishing campaign powered by the Action RAT. According to Cyble, who credited the operation SideCopy:The cluster of activities is intended to target the Defense Research and Development Organization (DRDO), the … Read more

The IcedID malware shifts the focus from banking fraud to ransomware delivery

March 28, 2023Ravi LakshmanaRansomware / Endpoint Security Multiple threats have been observed using two new versions of the IcedID malware in the wild, with more limited functionality that removes functionality related to online banking fraud. IcedID, also known as BokBot, began operating as a banking trojan in 2017. It is also capable of delivering additional … Read more

HP launches nine new Omen gaming monitors from 27 to 34 inches

At its Amplify Partner Conference in Chicago, HP unveiled a series of new gaming monitors. We are impressed HP’s Omen gaming monitors over the years, and the company is expanding the range with nine new models. The new models include one 24-inch, five 27-inch, two 32-inch and one 34-inch to appeal to a wide range … Read more

Stealthy DBatLoader malware loader spreads Remcos RAT and Formbook in Europe

March 28, 2023Ravi LakshmanaMalware attack / hacking attack A new phishing campaign aims to distribute the Remcos RAT and Formbook to European organizations via a malware loader called. DBatLoader:. “Malware payloads are distributed through WordPress sites that have authorized SSL certificates, a common tactic used by threat actors to evade detection engines,” Zscaler researchers Megraj … Read more

5 Ways to Tell You’re Not CISO Material

As the CISO role continues to grow and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. Technical expertise and experience are obviously huge assets. An effective CISO can evaluate and select security technology, communicate with technical staff, and make critical decisions about security … Read more

The Office of the Director of National Intelligence prioritizes cyber threats in its 2023 Intelligence Threat Assessment

When the Office of the Director of National Intelligence (ODNI) highlights a threat in its declassified assessment and states that there is strong supporting evidence, one should not sit back and let the data points sit idle, and we are not. ODNI didn’t mince words when they addressed China, Russia, North Korea, and Iran as … Read more