Trending Articles

article thumbnail

Palo Alto Patches Exploited Firewall Denial-of-Service Flaw

Data Breach Today

Unauthenticated Attackers Using Malicious Packet to Crash Devices' PAN-OS Software Security giant Palo Alto Networks is pushing updates to fix a denial-of-service vulnerability in its PAN-OS device software that unauthenticated, remote attackers have been actively exploiting. The flaw can be triggered by sending firewalls "a malicious packet," which will crash the devices.

Security 173
article thumbnail

Information Leaders' Guide to Selecting Imaging Technology: Leveraging TWAIN Standards

AIIM

As an Information Leader, selecting the right imaging technology for your organization is a critical decision that impacts information flow, accessibility, and management. With the rapid evolution of cloud and mobile technologies, it's crucial to choose solutions that are not only effective today but also future-proof. The TWAIN Working Group standards, particularly TWAIN Direct, offer a framework for making informed decisions.

Cloud 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Turmoil Besets Phishing-as-a-Service Toolkit Rockstar 2FA

Data Breach Today

Infrastructure Problems Blamed; Users Appear to Move to Similar FlowerStorm Service As the end of the year approaches, it's out with the old and in with the new as researchers report that Rockstar 2FA, which once facilitated prolific phishing-as-a-service hits, has crashed and burned, apparently leading many one-time users to move to rival FlowerStorm.

Phishing 230
article thumbnail

Generative AI is now an must-have tool for technology professionals

Collaboration 2.0

In just two years, AI has gone from hype to essential skill, offering massive productivity gains and increasing creativity among teams who use it. Here's how.

IT 137
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Paper Passport Is Dying

WIRED Threat Level

Smartphones and face recognition are being combined to create new digital travel documents. The paper passports days are numbereddespite new privacy risks.

Paper 128

More Trending

article thumbnail

Spyware Maker NSO Group Found Liable for Hacking WhatsApp

Schneier on Security

A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using it. Jon Penney and I wrote a legal paper on the case.

Paper 114
article thumbnail

The best Linux distribution of 2024 is MacOS-like but accessible to all

Collaboration 2.0

I've used and covered Linux for nearly 30 years. Here's my top pick for my favorite open-source distro in 2024.

Access 126
article thumbnail

You Need to Create a Secret Password With Your Family

WIRED Threat Level

AI voice cloning and deepfakes are supercharging scams. One method to protect your loved ones and yourself is to create secret code words to verify someones identity in real time.

Passwords 118
article thumbnail

Apache Foundation fixed a severe Tomcat vulnerability

Security Affairs

The Apache Software Foundation fixed a Tomcat server software flaw that could lead to remote code execution under certain conditions. The Apache Software Foundation (ASF) addressed an important vulnerability, tracked as CVE-2024-56337 , in its Tomcat server software. The researchers warn that exploiting this vulnerability could result in remote code execution under certain conditions.

IT 115
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Finland Boards Tanker Suspected of Rupturing Undersea Cables

Data Breach Today

The 'Eagle S' Forms Part of Sanctions-Busting Russian Shadow Fleet, Says EU Finnish police boarded Thursday an oil tanker suspected of rupturing telecommunications and electricity cables running beneath the Baltic Sea in a Christmas Day incident. They escorted the tanker, the Eagle S, into Finnish waters as part of a criminal investigation into damage caused on Wednesday.

162
162
article thumbnail

Casino Players Using Hidden Cameras for Cheating

Schneier on Security

The basic strategy is to place a device with a hidden camera in a position to capture normally hidden card values, which are interpreted by an accomplice off-site and fed back to the player via a hidden microphone. Miniaturization is making these devices harder to detect. Presumably AI will soon obviate the need for an accomplice.

100
100
article thumbnail

15 ways AI saved me time at work in 2024 - and how I plan to use it in 2025

Collaboration 2.0

In 2024, AI became truly helpful. Here are 15 clever ways I integrated it into my workflow for quicker, better results - and how you can too.

IT 122
article thumbnail

The Invisible Russia-Ukraine Battlefield

WIRED Threat Level

In Russias war against Ukraine, electronic warfare, including signal-jamming, anti-drone weapons, and innovative protections for critical military systems, has become a key piece of the conflict.

Military 108
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Pro-Russia group NoName targeted the websites of Italian airports

Security Affairs

Pro-Russia group NoName057 targets Italian sites, including Malpensa and Linate airports, in a new DDoS campaign amid rising geopolitical tensions. The pro-Russia group NoName57 continues its campaign of DDoS attacks against Italian infrastructure. This time, the group of alleged hacktivists targeted multiple websites, include the sites of Malpensa and Linate airports, as well as the site of the Ministry of Foreign Affairs (Farnesina) and the Turin Transport Group (GTT).

article thumbnail

Breach Roundup: Cyberattack Disrupts Japan Airlines

Data Breach Today

Also, US Court Rules NSO Group Violated Hacking Laws With Pegasus Spyware This week, cyberattack disrupts Japan Airlines, U.S. court rules NSO Group violated hacking laws, the European Space Agencys web store hacked, FTC orders Marriott to overhaul data security, Sophos patches critical firewall flaws and Apache fixes critical SQL injection in Traffic Control.

Security 162
article thumbnail

Scams Based on Fake Google Emails

Schneier on Security

Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post.

article thumbnail

How to generate your own music with the AI-powered Suno

Collaboration 2.0

Suno will use its AI skills to create a song based on your description of a specific genre and topic.

IT 118
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Worst Hacks of 2024

WIRED Threat Level

From Chinese cyberspies breaching US telecoms to ruthless ransomware gangs disrupting health care for millions of people, 2024 saw some of the worst hacks, breaches, and data leaks ever.

article thumbnail

Palo Alto Networks fixed a high-severity PAN-OS flaw

Security Affairs

Palo Alto Networks addressed a high-severity PAN-OS flaw that could trigger denial-of-service (DoS) on vulnerable devices. Palo Alto Networks addressed a high-severity flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), in PAN-OS software that could cause a denial-of-service (DoS) condition. An unauthenticated attacker can exploit this vulnerability to reboot the firewall by sending a malicious packet through its data plane.

article thumbnail

Feds Identify Ninth Telecom Victim in Salt Typhoon Hack

Data Breach Today

Officials Say Chinese Hackers Maintained 'Broad and Full' Access to Telecom Systems Federal officials told reporters Friday that ongoing investigations into the Salt Typhoon cyberespionage campaign have identified a ninth victim company affected by the attack, in which hackers maintained "broad and full" access to vulnerable communications infrastructure across the country.

article thumbnail

CyberheistNews Vol 14 #52 [Heads Up] Bad Actors Use Voice Phishing in Microsoft Teams To Spread Malware

KnowBe4

CyberheistNews Vol 14 #52 [Heads Up] Bad Actors Use Voice Phishing in Microsoft Teams To Spread Malware

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

This Linux laptop has a brilliant display and performance that rivals my MacBook

Collaboration 2.0

If you're looking for a laptop with Linux pre-installed, Tuxedo Computers' Infinity Book Pro 14 (Gen 9) has a gorgeous display and impressive performance.

118
118
article thumbnail

Criminal Complaint against LockBit Ransomware Writer

Schneier on Security

The Justice Department has published the criminal complaint against Dmitry Khoroshev, for building and maintaining the LockBit ransomware.

article thumbnail

A cyber attack hit Japan Airlines delaying ticket sales for flights

Security Affairs

A cyberattack hit Japan Airlines (JAL), causing the suspension of ticket sales for flights departing on Thursday. A cyber attack hit Japan Airlines (JAL) on Thursday, the offensive began at 7:24 a.m. and impacted internal and external systems. The Associated Press reported that the attack disabled a router, causing system malfunctions and suspending ticket sales for Thursday departures.

Sales 119
article thumbnail

US Congress Authorizes $3B to Replace Chinese Telecom Gear

Data Breach Today

Federal 'Rip-and-Replace' Program Gets Funding Boost in Defense Bill The 2025 National Defense Authorization Act includes $3 billion to fund an FCC program aimed at replacing Chinese-made telecommunications equipment across the country amid heightened threats from Beijing following the discovery of the Salt Typhoon cyberespionage campaign.

147
147
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

"Get Beyond Security Awareness Training" Does Not Mean Forgetting About It

KnowBe4

KnowBe4 is a big believer in focusing on decreasing human risk as the best way to decrease cybersecurity risk in most environments.

article thumbnail

5 biggest Linux and open-source stories of 2024: From AI arguments to security close calls

Collaboration 2.0

AI arrived, security troubles were dodged, and after years of development, real-time Linux finally made it into mainstream Linux. Here's what shook up the open-source world this year and what it means for 2025.

Security 117
article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

64