-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
b38ee72
commit 98c970a
Showing
3 changed files
with
77 additions
and
0 deletions.
There are no files selected for viewing
24 changes: 24 additions & 0 deletions
24
source/_posts/AMD-Reduces-RDNA-4-aka-Navi-44-package-size.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
--- | ||
title: AMD Reduces RDNA 4 aka Navi 44 package size | ||
date: 2024-10-16 20:33:34 | ||
tags: | ||
- amd | ||
- navi 44 | ||
- rdna 4 | ||
- package size | ||
- navi 44 package size | ||
--- | ||
|
||
### Quick Report | ||
|
||
AMD\'s Navi 44 could be much smaller than their predecessors according to leaked dimensions on [X aka Twitter by Olrak29_][def]. The move aligns with AMD\'s goal to increase the market share by providing more value to mainstream gaming community on a budget. | ||
<!-- more --> | ||
|
||
With RDNA4, AMD has decided to increase the mindshare and market by focussing on mainstream and budget gamers which is higher than enthusiast gamers and improve the software experiences through RoCm, gaming and AI. | ||
|
||
### Source(s) | ||
|
||
- [TPU][def2] | ||
|
||
[def]: https://x.com/Olrak29_/status/1845710789950484950 | ||
[def2]: https://www.techpowerup.com/327684/amd-to-reduce-rdna-4-navi-44-chip-package-size |
31 changes: 31 additions & 0 deletions
31
source/_posts/Casio-confirms-stolen-customer-data-after-ransomware-attack.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
--- | ||
title: Casio confirms stolen customer data after ransomware attack | ||
date: 2024-10-16 20:35:50 | ||
tags: | ||
- ransomware | ||
- casio | ||
- breach | ||
- customer data leak | ||
- stolen data | ||
- pii | ||
- personal data | ||
- contractors | ||
- employees | ||
--- | ||
|
||
### Quick Report | ||
|
||
Casio has confirmed that a ransomware attack has resulted in the theft of customer data. The company has stated that the stolen data includes personal information such as names, addresses, employees, job candidates, phone numbers etc. The [**Underground**][def] ransomware group has claimed responsibility behind the attack | ||
<!-- more --> | ||
|
||
Casio has issued a statement saying: | ||
>> "Please refrain from spreading this information through social media, etc., as it could increase the damage caused by the leak of information on this case, violate the privacy of those affected, have serious effects on their lives and businesses, and encourage crime" | ||
The company has informed the Japanese Police and Personal Information Protection Commission of the incident for investigations and remediation steps. | ||
|
||
### Source(s) | ||
|
||
- [Bleeping Computer][def2] | ||
|
||
[def]: https://www.fortinet.com/blog/threat-research/ransomware-roundup-underground | ||
[def2]: https://www.bleepingcomputer.com/news/security/casio-confirms-customer-data-stolen-in-a-ransomware-attack/ |
22 changes: 22 additions & 0 deletions
22
source/_posts/GitLab-warns-of-arbitrary-branch-pipleine-execution-flaws.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
--- | ||
title: GitLab warns of arbitrary branch pipeline execution flaws | ||
date: 2024-10-16 20:35:04 | ||
tags: | ||
- gitlab | ||
- security | ||
- arbitrary-code-execution | ||
--- | ||
|
||
### Quick Report | ||
|
||
GitLab has issued warning regarding a flaw that allowed unauthorized users to trigger CI/CD (Continuous Integration and Deployment) pipelines on any branch of a repository on both CE (Community Edition) and EE (Enterprise Edition) versions of the GitLab platform. | ||
<!-- more --> | ||
|
||
The vulnerability is tracked as **CVE-2024-9164** and GitLab has released a post to address the issue [linked here][def2]. GitLab recommends everyone to apply the update ASAP. | ||
|
||
### Source(s) | ||
|
||
- [Bleeping Computer][def] | ||
|
||
[def]: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-arbitrary-branch-pipeline-execution-flaw/ | ||
[def2]: https://about.gitlab.com/releases/2024/10/09/patch-release-gitlab-17-4-2-released/ |