Fri.Sep 06, 2024

article thumbnail

Russia-linked GRU Unit 29155 targeted critical infrastructure globally

Security Affairs

The United States and its allies state that Russia-linked threat actors operating under the GRU are behind global critical infrastructure attacks. The FBI, CISA, and NSA linked threat actors from Russia’s GRU Unit 29155 to global cyber operations since at least 2020. These operations include espionage, sabotage, and reputational damage. The United States and its allies state that GRU is behind global critical infrastructure attacks.

article thumbnail

After CrowdStrike Outage: Time to Rebuild Microsoft Windows?

Data Breach Today

Global Outage Triggers Calls for 'Less-Invasive Access' to Essential Functions The global disruption caused by a faulty CrowdStrike software triggering a kernel panic and computer meltdowns has led government agencies, experts and vendors to call for rethinking Windows operating system resiliency, including the deep-level OS access security tools now require.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Car rental company Avis discloses a data breach

Security Affairs

Car rental giant Avis disclosed a data breach that impacted one of its business applications in August compromising customers’ personal information. Car rental company Avis notified customers impacted in an Augus data breach. Threat actors breached one of its business applications and gained access to some of the customers’ personal information. “We discovered on August 5, 2024, that an unauthorized third party gained access to one of our business applications.

article thumbnail

ISMG Editors: How Arrest of Telegram CEO Affects Encryption

Data Breach Today

Also: AI's Role in Cybersecurity; New Fraud Prevention Rules In the latest weekly update, ISMG editors discussed the implications of the recent arrest of Telegram's CEO in Paris for encrypted messaging services, the transformative impact of artificial intelligence in cybersecurity, and the latest regulations designed to curb fraud in electronic payments.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

SonicWall warns that SonicOS bug exploited in attacks

Security Affairs

Recently fixed access control SonicOS vulnerability, tracked as CVE-2024-40766, is potentially exploited in attacks in the wild, SonicWall warns. SonicWall warns that a recently fixed access control flaw, tracked as CVE-2024-40766 (CVSS v3 score: 9.3), in SonicOS is now potentially exploited in attacks. “An improper access control vulnerability has been identified in the SonicWall SonicOS management access and SSLVPN, potentially leading to unauthorized resource access and in specific cond

Passwords 314

More Trending

article thumbnail

Apache fixed a new remote code execution flaw in Apache OFBiz

Security Affairs

Apache addressed a remote code execution vulnerability affecting the Apache OFBiz open-source enterprise resource planning (ERP) system. Apache fixed a high-severity vulnerability, tracked as CVE-2024-45195 (CVSS score: 7.5) affecting the Apache OFBiz open-source enterprise resource planning (ERP) system. Apache OFBiz® is an open source product for the automation of enterprise processes that includes framework components and business applications.

article thumbnail

Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database

WIRED Threat Level

Video and audio of therapy sessions, transcripts, and other patient records were accidentally exposed in a publicly accessible database operated by the virtual medical company Confidant Health.

Access 280
article thumbnail

New global standard aims to build security around large language models

Collaboration 2.0

The WDTA framework spans the lifecycle of large language models, offering guidelines to manage integration with other systems.

Security 246
article thumbnail

Absolute Purchases Syxsense to Tackle Cyber Vulnerabilities

Data Breach Today

Acquisition Brings Vulnerability Management to Absolute's Cyber Resilience Platform Absolute Security has strengthened its platform with the acquisition of Syxsense, adding powerful automated vulnerability management tools to its existing endpoint security capabilities. The move aims to improve security compliance and simplify complex remediation tasks for organizations.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Why you should stop using your solar-powered power bank (and try this alternative instead)

Collaboration 2.0

I've spent the summer testing solar-powered power banks. It turns out the devices are universally rubbish and potentially unsafe. Here's what I suggest using instead.

IT 246
article thumbnail

The NSA Has a Podcast—Here's How to Decode It

WIRED Threat Level

The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the pod's actually worth a listen.

IT 182
article thumbnail

This new self-cleaning robot vacuum can even wipe down your baseboards

Collaboration 2.0

Narwal has just released a new flagship robot vacuum and mop with do-it-all functions that will remind you of The Jetsons.

IT 246
article thumbnail

Critical GeoServer Flaw Enabling Global Hack Campaigns

Data Breach Today

Targets Includes Technology, Government and Telecommunications Sectors Cybercriminals are using a critical remote code execution vulnerability in an open-source geospatial data platform to spread malware globally across several industries. GeoServer Project maintainers released a patch on July 1. The vulnerability has a CVSS score of 9.8 out of 10.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Red Hat unleashes Enterprise Linux AI - and it's truly useful

Collaboration 2.0

Many AI programs, despite all the hype, aren't that useful. On the other hand, Red Hat Enterprise Linux AI will help system administrators and developers alike.

article thumbnail

Feds Warn Health Sector to Patch Apache Tomcat Flaws

Data Breach Today

Healthcare Sector Heavily Relies on Open-Source Web Server; Older Flaws Pose Risk Federal authorities are alerting healthcare entities of vulnerabilities - including older flaws - that put Apache Tomcat at risk for attacks if left unmitigated. The open-source web server is heavily used in healthcare for hosting electronic health record and other systems and applications.

Risk 182
article thumbnail

One million US Kaspersky customers to be migrated to this lesser-known alternative

Collaboration 2.0

Kaspersky customers in the US can continue their existing subscriptions with a replacement product from the company's 'trusted partner'. Here's what to know.

190
190
article thumbnail

White House Launches Cyber, Tech and AI Hiring Sprint

Data Breach Today

'Service for America' Will Aim to Attract Diverse Candidates to the Cyber Workforce The White House announced a hiring sprint to fill cyber, technology and artificial intelligence jobs across federal agencies, dubbed Service for America, which aims to attract diverse candidates for critical open positions in the public sector - along with new incentives.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Apple will announce two new AirPods models on Monday. Here are the key differences

Collaboration 2.0

Apple's highly anticipated hardware event is this Monday, and two new AirPods will debut. Although they look very similar, here are the main differences you should know.

189
189
article thumbnail

YubiKey Side-Channel Attack

Schneier on Security

There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack , requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece of security analysis.

Passwords 121
article thumbnail

Dreame's new L40 Ultra robot vacuum can operate on its own for up to 75 days

Collaboration 2.0

The company released a new robot vacuum at IFA 2024, with specs rivaling flagships from Roborock, Roomba, and more.

IT 189
article thumbnail

Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection

KnowBe4

Analysis of a new phishing attack demonstrates how attackers may take a longer path to reach their malicious goals while staying “under the radar” of security products.

Phishing 116
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

How to use Midjourney's website to generate amazing images with AI

Collaboration 2.0

Midjourney is an AI image generator that can conjure impressive logos, artwork, and other graphics based on your imaginative descriptions. Thanks to its new all-access website, it's now much easier to use.

Access 189
article thumbnail

Weekly Update 416

Troy Hunt

It's been a while since I've just gone all "AMA" on a weekly update, but this was just one of those weeks that flew by with my head mostly in the code and not doing much else. There's a bit of discussion about that this week, but it's mostly around the ongoing pain of resellers and all the various issues supporting them then creates as a result.

IT 106
article thumbnail

The 3 best Apple Watch Series 10 features we expect to see (and the ones we don't)

Collaboration 2.0

Apple is set to announce a new Apple Watch lineup during the 'It's Glowtime' event on Sept 9; here's what you should look out for.

IT 189
article thumbnail

Live Video of Promachoteuthis Squid

Schneier on Security

The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile. Blog moderation policy.

106
106
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Sonos is failing and millions of devices could become e-waste - why open-source audio is our only hope

Collaboration 2.0

Sonos' recent upheaval highlights the risks of closed systems in home audio. Here's how an open-source platform and universal speaker connectivity standard could benefit everyone.

Risk 189
article thumbnail

How to Use A Password Manager: Setup, Benefits & Best Practices in 2024

eSecurity Planet

We need secure and unique passwords to use business applications , access e-mail, and social media securely, and even watch movies on a streaming service. Password managers take some strain from generating, associating, and remembering those passwords. In this article, we’ll explain how password managers work, how to use a password manager, and how to choose the right one for your purposes.

article thumbnail

I tested DJI's smallest and lightest drone, and it's captured things I had never seen before

Collaboration 2.0

The DJI Neo is a flying 4K camera that lets you explore places you couldn't before.

IT 189