Month: April 2025

Pioneers in Tech: Happy birthday to Ben Hammersley, who coined the term “podcast”
Let’s all send birthday wishes to British journalist-turned-speaker-and-futurist Ben Hammersley, who turned 49 this month and is perhaps most famous for coining the term “podcast” 21 years ago. Learn how the the word came about in this edition of Pioneers...

Survey: Cloud spending exceeding budgets
A survey of 300 CIOs in the U.S. working for organizations with over 500 employees finds 83 percent are on average spending 30 percent more on cloud infrastructure and applications than what their organization initially budgeted for, even as spending...

Cybersecurity Threat Advisory: Critical CrushFTP vulnerability
A critical CrushFTP, CVE-2025-2825, with a CVSS score of 9.8, flaw has been discovered. It enables attackers to bypass authentication on CrushFTP servers, posing a high-severity risk to corporate environments. Continue reading this Cybersecurity Threat Advisory for details on how...

Cybersecurity Threat Advisory: Critical Ivanti Connect Secure flaw
A critical vulnerability, identified as CVE-2025-22457, has been discovered in Ivanti Connect Secure (ICS) VPN appliances. This flaw is actively exploited in the wild, allowing attackers to execute arbitrary code remotely. Review the details within this Cybersecurity Threat Advisory to...

Cybersecurity Threat Advisory: Apache RCE vulnerability
A critical remote code execution (RCE) vulnerability in Apache Parquet, identified as CVE-2025-30065, with a CVSS score of 10.0, has been discovered. Continue reading this Cybersecurity Threat Advisory to learn how to effectively mitigate your risks. What is the threat?...

E-waste disposal: It’s everyone’s responsibility
The United Nations recently put out some eye-catching statistics about e-waste: A record 62 million tons of e-waste were produced in 2022, up 82 percent from 2010. This number is on track to rise another 32 percent, to 82 million...

Threat Spotlight: The good, the bad, and the ‘gray bots’
This edition of the Threat Spotlight focuses on the ‘gray bots’. Bots are automated software programs designed to carry out online activities at scale. There are good bots — such as search engine crawler bots, SEO bots, and customer service...

Cybersecurity Threat Advisory: Exploited Cisco backdoor flaw
CVE-2024-20439 is a critical authentication bypass vulnerability in Cisco’s Smart Licensing Utility (CSLU). Attackers exploit this backdoor to gain unauthorized administrative access to vulnerable systems. The vulnerability affects specific versions of the standalone CSLU software, which is used to manage...

Tech Time Warp: Funny April Fools’ Day tech pranks you may not know about
Did you survive April Fools’ Day 2025? Or did you sign up for Duolingo’s five-year world cruise? April Fools’ Day is a love-it-or-hate-it tradition in the technology world, with Google leading the charge from 2000 up until the COVID-19 pandemic....