Wed.Aug 07, 2024

article thumbnail

Critical XSS bug in Roundcube Webmail allows attackers to steal emails and sensitive data

Security Affairs

Researchers warn of flaws in the Roundcube webmail software that could be exploited to steal sensitive information from target accounts. Sonar’s Vulnerability Research Team discovered a critical Cross-Site Scripting (XSS) vulnerability in the popular open-source webmail software Roundcube. Roundcube is included by default in the server hosting panel cPanel which has millions of installations worldwide.

Passwords 360
article thumbnail

Photovoltaic Platform Flaws Threatened Global Solar Grid

Data Breach Today

Software used to manage a fifth of the world's solar electricity contained flaws enabling full access to attackers, risking grid overloads and blackouts. Solar power accounts for a sliver of overall U.S. electricity generation but will make up half of domestic electricity generation by 2050.

Risk 289
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Android spyware LianSpy relies on Yandex Cloud to avoid detection

Security Affairs

A previously unknown Android Spyware, dubbed LianSpy, has been targeting Russian users since at least 2021. In March 2024, cybersecurity researchers from Kaspersky discovered previously unknown Android spyware dubbed LianSpy. The malware has been active since July 2021, it is designed to capture screencasts, exfiltrate user files, and harvest call logs and app lists.

Cloud 356
article thumbnail

Cybercrime Rapper Sues Bank over Fraud Investigation

Krebs on Security

A partial selfie posted by Puchmade Dev to his Twitter account. Yes, that is a functioning handheld card skimming device, encrusted in diamonds. Underneath that are more medallions, including a diamond-studded bitcoin and payment card. In January, KrebsOnSecurity wrote about rapper Punchmade Dev , whose music videos sing the praises of a cybercrime lifestyle.

Retail 288
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware

Security Affairs

The Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware and offers alleged stolen data for 25 BTC. Bayhealth Hospital is a technologically advanced not-for-profit healthcare system with nearly 4,000 employees and a medical staff of more than 450 physicians and 200 advanced practice clinicians. Bayhealth Medical Center , serving central and southern Delaware, operates two hospitals: Bayhealth Hospital, Kent Campus in Dover and Bayhealth Hospital, Sussex Campus in Milfo

More Trending

article thumbnail

Irish DPC Sues X over Harvesting Data for Grok AI Bot

Data Breach Today

Regulators told Irish High Court that X, Formerly Twitter, Violated the GDPR The Irish data regulator sued social media platform X, accusing the service of wrongfully harvesting users' personal data for its artificial intelligence model Grok. During a hearing on Tuesday, regulators told the High Court of Ireland that X violated the GDPR.

article thumbnail

My favorite hybrid smartwatch has incredible battery life and a gorgeous look

Collaboration 2.0

Withings' latest ScanWatch 2 embeds the company's best health-tracking technology into a high-end, hybrid wearable.

246
246
article thumbnail

What is the value of using Generative AI for Information Management?

AIIM

Information, or content, is nontabular, unstructured data. Sometimes called “dark data” it includes documents, emails, contracts, invoices, media, and other files that exist outside tabular data. Content is also the essential fuel for generative AI (Gen AI). Generative AI can also be used to better manage and find value in information. In this blog post, we’ll dive into the value of using generative AI to manage content.

article thumbnail

Why I wear this $220 smartwatch even after testing Garmin and Samsung watches

Collaboration 2.0

The Amazfit Balance, running on Zepp OS 3.0, proved to me that it's worthy of being anyone's primary smartwatch.

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

A Flaw in Windows Update Opens the Door to Zombie Exploits

WIRED Threat Level

A researcher found a vulnerability that would let hackers strategically downgrade a target’s Windows version to reexpose patched vulnerabilities. Microsoft is working on fixes for the issue.

Security 185
article thumbnail

This popular flight tracking app now predicts plane delays, thanks to AI

Collaboration 2.0

Flighty claims predictions are over 95% accurate and can warn you about a delay before it happens. Here's how the magic works.

IT 244
article thumbnail

Inside the Dark World of Doxing for Profit

WIRED Threat Level

From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problem—it’s getting more extreme.

article thumbnail

5 reasons why Pop!_OS is this Linux pro's favorite distro

Collaboration 2.0

Selecting a Linux distribution can be daunting but when you finally find the one, you stick with it. Pop!_OS has been my go-to for a long time. Here's why.

IT 214
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Overcoming Human Error in Payment Fraud: Can AI Help?

Data Breach Today

While AI Is a Top Priority, Relatively Few Businesses Are Using Automated Solutions Human error is a major contributor to payments fraud, but only about 5% of organizations have fully automated their payment processes to reduce mistakes. Experts say artificial intelligence-enabled automation will help reduce risks, but the benefits of this technology are still a distant reality.

article thumbnail

Two tricks that make using the Linux command line a lot easier

Collaboration 2.0

Using the Linux command line doesn't have to be the chore you think it is.

IT 190
article thumbnail

Prospect Medical Facing More Legal Fallout from 2023 Hack

Data Breach Today

California Firm Entangled In Litigation Related to Rhysida Ransomware Attack Prospect Medical Holdings continues to face mounting legal and business fallout from the 2023 ransomware attack that disrupted IT operations at 16 of its hospitals for several weeks and resulted in a data breach that affected 1.3 million people.

article thumbnail

The Sony A80L OLED TV's AI-powered upscaling blew me away, and it's currently under $2,000

Collaboration 2.0

Superb audio quality and an improved image processor make Sony's mid-range OLED a fantastic choice.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Nvidia Chip Delay Could Slow Rapid AI Development

Data Breach Today

3-Month Delay in Blackwell Chip Release Unlikely to Hurt Nvidia's 95% Market Share The delay in the rollout of Nvidia's artificial intelligence chips could slow the rapid pace of AI development but is unlikely to cause a significant setback for the chip giant or its customers. The company delayed the release of its Blackwell B200 AI chips at least three months due to design flaws.

article thumbnail

The best blood pressure watches of 2024

Collaboration 2.0

We considered medical research and current FDA guidance to find the best blood pressure watches available today, including options from Samsung and FitVII.

190
190
article thumbnail

Top Lawmaker Slams Tech Firms for Failing to Fight AI Misuse

Data Breach Today

Senator Warns Tech Giants are Failing to Address AI Misuse in 2024 Elections The chairman of the U.S. Senate Intelligence Committee warned Wednesday that leading social media platforms, generative artificial intelligence vendors and tech giants like Microsoft, Google, Meta and OpenAI are failing to adequately combat deceptive AI use in the 2024 national elections.

article thumbnail

Is Temu legit? Everything to know before you place your first order

Collaboration 2.0

Before you buy from Temu, you may wonder if it's safe, if the items are real, or if the website steals your data. These are frequently asked questions, so let's unpack them.

IT 190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Armis CEO on Fueling Cyber Risk Management with Acquisitions

Data Breach Today

Yevgeny Dibrov on How Silk Security and CTCI Strengthen Armis' Cyber Capabilities CEO Yevgeny Dibrov discusses the acquisition of Silk Security and CTCI to enhance the company’s cyber risk prioritization and threat hunting capabilities. He explains why these acquisitions are crucial for addressing customer challenges and expanding Armis’ cybersecurity platform.

Risk 130
article thumbnail

How to record a call on your iPhone (and check if it's legal in your state)

Collaboration 2.0

There are many reasons to record a conversation on your iPhone, but only a few ways to do it. We round up your best options, plus some legal guidance.

IT 190
article thumbnail

“Pastejacking” Attacks Are Becoming a Thing (Because Users are Falling for Them)

KnowBe4

The obliviousness of these attacks make them seem unbelievable, but new analysis shows users can be convinced to copy and paste malicious code on behalf.

article thumbnail

What Google's antitrust loss means for you and the future of search

Collaboration 2.0

Google's spot as the top search dog is under threat from the courts and AI-driven rivals.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

62% of Phishing Emails Bypassed DMARC Checks in 1H of 2024

KnowBe4

A report from Darktrace has found that 62% of phishing emails in the first half of 2024 were able to bypass DMARC verification checks in order to reach users’ inboxes.

Phishing 119
article thumbnail

AI PCs bring new security protections and risks. Here's what users need to know

Collaboration 2.0

Trend Micro's Kevin Simzer shares exclusive insights about securing AI PCs against the unique threats of this new computing era.

Risk 189
article thumbnail

Cloud Security Strategy: Building a Robust Policy in 2024

eSecurity Planet

A cloud security strategy is an established set of tools, rules, and procedures for safeguarding cloud data, apps, and infrastructure against security threats. It covers encryption, identity and access management, network segmentation, and intrusion detection systems. The cloud security plan deals with your unique business security concerns while aligning with your overall security goals, including continuous threat monitoring and response methods.

Cloud 105