article thumbnail

T-Mobile hit by data breaches from Lapsus$ extortion group

Tech Republic Security

Through multiple breaches, the Lapsus$ cybercriminal group was able to steal source code from T-Mobile, says KrebsOnSecurity. The post T-Mobile hit by data breaches from Lapsus$ extortion group appeared first on TechRepublic.

Groups 473
article thumbnail

Mobile malware increasingly being used for espionage by state-sponsored groups

Tech Republic Security

State-sponsored groups take advantage of the lack of effective mobile malware solutions to target mobile users, according to a new report from BlackBerry.

Malware 284
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This Magecart skimmer has been redesigned for mobile

CTOvision

Magecart operators have modified a popular credit card skimmer to only target mobile users as consumers are doing more of their online shopping from their smartphones as opposed to their computers. Several different groups of […].

Mobile 401
article thumbnail

Nvidia, xAI and two energy giants join genAI infrastructure initiative

Network World

Still, even though the massive global momentum behind genAI is unlikely to be changed by the announcement, the addition of the two energy companies to the group was an implicit acknowledgement that the ever-increasing power requirements of genAI data centers need serious attention. Forrester senior analyst Alvin Nguyen was more skeptical.

Energy 301
article thumbnail

Airtel connects India with 100Tbps submarine cable

Network World

The 2Africa Pearls submarine cable system spans 45,000 kilometers, involving a consortium of global telecommunications leaders including Bayobab, China Mobile International, Meta, Orange, Telecom Egypt, Vodafone Group, and WIOCC. This cable system is part of a broader global effort to enhance international digital connectivity.

article thumbnail

Fortinet launches its first standalone endpoint DLP product

Network World

The platform implements origin-based data protection, tracking data movement from endpoints and unmanaged mobile devices to external destinations including USB drives, printers, and cloud applications. The system deploys machine learning at the endpoint level, enabling continuous data monitoring without constant network connectivity.

Policies 418
article thumbnail

Five big takeaways from Nvidia GTC

Network World

Liquid cooling here to stay Liquid-cooled switches will become a necessity, not a choice, according to according to Sameh Boujelbene, vice president with the DellOro Group. This is only because Nvidia needs to communicate clearly with its ecosystem and enable them to plan that far out, he said. NVIDIAs latest 51.2 However, all future 102.4

Dell 309