Network
-
Blog
Ransomware gang says it hacked New England’s Covenant Health network
Ransomware gang Qilin today took credit for a May 2025 cyber attack against Covenant Health in Massachusetts. The health network says it shut down its network after a cyber attack caused connectivity issues starting on May 26, 2025. At least one hospital in the network says it diverted ambulances to other hospitals and moved services like medical imaging to other…
Read More » -
Blog
Stolen credentials are the new front door to your network
Cybercriminals no longer need zero-day exploits or other vulnerabilities to breach your systems—these days, they just log in. On July 9th at 2:00 PM ET, BleepingComputer and SC Media will co-host a live webinar with identity security expert Darren Siegel of Specops Software (part of Outpost24), exploring how threat actors are increasingly breaching networks by simply logging in with stolen…
Read More » -
Blog
Cisco eyes network security gains for agentic AI
Cisco has unveiled a raft of security-focused product updates as the networking giant delves further into agentic AI. Announced at the 2025 Cisco Live event in San Diego this week, the company said it is “fusing security capabilities deeper into its networking infrastructure” in a bid to alleviate AI-related security concerns for enterprise leaders and cyber professionals alike. These updates…
Read More » -
Blog
Dozens of malicious packages on NPM collect host and network data
60 packages have been discovered in the NPM index that attempt to collect sensitive host and network data and send it to a Discord webhook controlled by the threat actor. According to Socket’s Threat Research team, the packages were uploaded to the NPM repository starting May 12 from three publisher accounts. Each of the malicious packages contains a post-install script that…
Read More » -
Blog
Wifi network attacks: The risk to businesses
Attacks designed to exploit weaknesses in Wi-Fi networks are on the rise, with hackers increasingly targeting vulnerabilities in Wi-Fi infrastructure to gain unauthorized access, intercept sensitive data and launch further attacks. The main area of concern is the deauthentication attack; a form of denial of service (DoS) attack that takes advantage of a basic flaw in the 802.11 Wi-FI protocol…
Read More » -
Blog
China takes edge computing to orbit with first space-based processing network – Computerworld
“China’s Three-Body Computing Constellation marks a radical evolution in edge computing — demonstrating a ‘hyper-edge’ model: autonomous, localized processing under extreme latency and bandwidth constraints,” explained Deepti Sekhri, practice director at Everest Group. “This leap forces enterprise edge strategies to move beyond basic edge nodes toward resilient, AI-infused micro-infrastructures. We can expect the biggest impact in industries like manufacturing, defense,…
Read More » -
Blog
Telefónica resolves Spanish mobile network outage
Telefónica has resolved an issue that caused a widespread mobile network blackout across Spain, with all major providers including Vodafone, O2, Orange, and Movistar affected. The outage, reportedly linked to a network update issued by Telefónica, began around 5am local time, per the website Downdetector. Customers across the entirety of Spain were unable to make phone calls, access mobile data,…
Read More » -
Blog
Mac’s Upcoming AFP Removal Will Break Some NAS Drives and Network Shares
Apple has officially deprecated the Apple Filing Protocol (AFP) client in the latest update for Mac computers, and the feature will be “removed in a future version of macOS.” The change will break file sharing with many old network drives and Mac models, including Apple’s discontinued Time Capsule. The Apple Filing Protocol was the original network file sharing technology in…
Read More » -
Blog
Is Google’s smart tag network any good yet?
When Google launched its long-awaited Find My Device network in April 2024, it arrived to… well, what’s the opposite of “fanfare”? A slow network rollout and damning reviews dampened enthusiasm for what was supposed to be a wave of Android-powered rivals to Apple’s AirTag. But a year’s a long time in tech, and Google has been promising improvements almost since…
Read More » -
Blog
Network Security at the Edge for AI-ready Enterprise
Modern enterprises are adopting AI applications, particularly generative AI (GenAI), at a rapid rate. This adds new network security challenges to already complex enterprise workloads spanning data centers, campuses, cloud, branches, and remote user locations. Network data is being reshaped by the rapid adoption of AI products. By 2026, it is estimated that over 80% of businesses are likely to…
Read More »