Wed.Nov 27, 2024

article thumbnail

Script Kiddie 'Matrix' Builds Massive Botnet

Data Breach Today

Likely Russian Hacker Exploits IoT Vulnerabilities, Many Known for Years An apparent Russian script kiddie is converting widespread security gaps into powerful botnets capable of launching global-scale distributed denial-of-service attacks. A threat actor with the online moniker "Matrix" is exploiting IoT vulnerabilities such as default credentials and outdated software.

IoT 288
article thumbnail

CISA Strongly Recommends Phishing-Resistant MFA

KnowBe4

We are excited to see the Cybersecurity Infrastructure Security Agency (CISA) and outgoing Director Jen Easterly strongly recommend PHISHING-RESISTANT multi-factor authentication (MFA).

Phishing 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Appeals Court Reverses Tornado Cash Sanctions

Data Breach Today

Department of Treasury Overstepped its Authority, Fifth Circuit Rules A U.S. federal appeals court ruled U.S. Department of Treasury exceeded its authority by sanctioning Tornado Cash, a cryptocurrency mixing service used by North Korean hackers to launder more than $455 million. Smart contracts "are not capable of being owned," the court ruled.

IT 275
article thumbnail

Nearly Every Hacker Believes AI Tools Have Created a New Attack Vector

KnowBe4

A new survey of hackers shows that AI is not only empowering hackers to be more effective, but that AI itself is “ripe for exploitation.

Phishing 110
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

T-Mobile Disputes Claims of Chinese Hack on Customer Data

Data Breach Today

T-Mobile Blocks Hackers But Warns Other U.S. Networks May Be Compromised T-Mobile disputed claims Wednesday that Chinese state-sponsored hackers breached its systems and stole customer data, warning that some U.S. communications networks may still be compromised and detailing how its layered defenses and third-party cybersecurity partnerships thwarted the attack.

More Trending

article thumbnail

New EU Tech Commissioner to Focus on Tech Sovereignty

Data Breach Today

Henna Virkkunen Vows to Boost European innovation, Cut Regulations Newly-designed European Union tech commissioner Henna Virkkunen will lead efforts to establish Europe's tech sovereignty, said European Commission President Ursula von der Leyen, who will start a second term on Dec. 1. Virkkunen was a liberal-conservative Finnish member of the European Parliament.

271
271
article thumbnail

75% of Black Friday Spam Emails Are Scams

KnowBe4

Three out of four Black Friday-themed spam emails are scams, according to researchers at Bitdefender. Most of these scams are targeting users in the US and Europe.

108
108
article thumbnail

When Hackers Meet Tractors: Surprising Roles in IoT Security

Data Breach Today

How to Find a Career in Industrial IoT - on the Factory Floor or in the Cornfield Cybersecurity once conjured images of IT departments, server rooms and corporate firewalls. Today, it extends far beyond these traditional domains, becoming essential in fields like manufacturing, agriculture, healthcare, transportation, robotics and space exploration.

IoT 246
article thumbnail

Get 1 year of Hulu for $1 a month with this Black Friday deal

Collaboration 2.0

Hulu's Black Friday deal drops the price of a monthly subscription to the streaming service from $7.99 to $0.99 a month for your first year. Don't miss out.

105
105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Malicious Loan Apps Target Android Users in Africa, South America and Asia

KnowBe4

Researchers at McAfee warn of a surge in malicious loan apps targeting Android users across South America, Southern Asia, and Africa.

Security 105
article thumbnail

Forget Bose: These open earbuds have a simpler design (and cost less)

Collaboration 2.0

If you're looking for a pair of open-ear buds for working out, the Soundcore C40i are an inexpensive choice with a streamlined design.

105
105
article thumbnail

VMware fixed five vulnerabilities in Aria Operations product

Security Affairs

Virtualization giant VMware addressed multiple vulnerabilities in its Aria Operations product that can led to privilege escalation and XSS attacks. VMware released security updates to address five vulnerabilities in its Aria Operations product. Aria Operations (formerly known as VMware vRealize Operations) is a comprehensive cloud management and operations platform developed by VMware.

Cloud 98
article thumbnail

Zoom says it's no longer a video company. What that means for your meetings

Collaboration 2.0

Zoom is implementing a serious injection of AI - which includes your potential 'digital twin.

IT 102
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How DSPM Helps Businesses Meet Compliance Requirements

Security Affairs

Data Security Posture Management (DSPM) helps monitor, secure, and ensure compliance for sensitive data, reducing risks across diverse environments. Complying with cybersecurity regulations can be a source of great pain for organizations, especially those that handle and store particularly valuable and vulnerable information. Organizations in sectors like healthcare, finance, legal, and government often process vast amounts of highly sensitive data, and regulations exist to ensure and verify tha

article thumbnail

This feature-rich, rugged Android smartphone I tested is $90 off for Black Friday

Collaboration 2.0

This smartphone has a quad-core processor, a 20-day battery (on standby), and even a 100-megapixel camera! Right now it's on sale for 21% off.

Sales 98
article thumbnail

Russian group RomCom exploited Firefox and Tor Browser zero-days to target attacks Europe and North America

Security Affairs

The Russian RomCom group exploited Firefox and Tor Browser zero-day vulnerabilities in attacks on users in Europe and North America. Russian-based cybercrime group RomCom (aka UAT-5647 , Storm-0978 , Tropical Scorpius , UAC-0180, UNC2596 ) exploited two Firefox and Tor Browser zero-day vulnerabilities in recent attacks on users across Europe and North America.

article thumbnail

These studio monitors go toe-to-toe with my favorite speakers, and they cost much less

Collaboration 2.0

If you're looking for a pair of desktop/studio speakers that don't take up much space but can fill a room with seriously impressive sound, the iLoud MTM MKII speakers are ready to rock.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Bootkitty is the first UEFI Bootkit designed for Linux systems

Security Affairs

ESET discovered the first Unified Extensible Firmware Interface (UEFI) bootkit specifically designed for Linux systems, named Bootkitty. Cybersecurity researchers from ESET discovered the first UEFI bootkit designed to target Linux systems, called by its authors Bootkitty. The bootkit allows attackers to disable the kernel’s signature verification feature and to preload two as yet unknown ELF binaries via the Linux init process.

article thumbnail

This $90 Hisense soundbar deal at Walmart will upgrade your home TV setup at a budget

Collaboration 2.0

Typically sold for $180, the Hisense soundbar and wireless subwoofer duo have been discounted at Walmart for their lowest price yet -- and it makes a great gift.

IT 97
article thumbnail

ProjectSend critical flaw actively exploited in the wild, experts warn

Security Affairs

Researchers warn that a critical security flaw in ProjectSend open-source file-sharing application may be under active exploitation. VulnCheck researchers warn that ProjectSend vulnerability CVE-2024-11680 (CVSS score: 9.8) appears to have been exploited by attackers in the wild. The vulnerability is an improper authentication issue that impacts ProjectSend versions before r1720.

article thumbnail

How to control Windows with Super God Mode (and enjoy settings omniscience)

Collaboration 2.0

Super God Mode collects all the core Windows apps, features, and settings and serves them to you in one single series of folders. It's glorious.

IT 94
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The state of secure information management: Strategies for securing access and protecting sensitive data 

OpenText Information Management

If you’re watching this space, you know we get a little excited about surveys. We’ve done the State of Zero Trust in 2023, the State of Passwordless , and in a couple of months we’ll present the State of ITDR. But before then, we’ll be sharing proprietary research from the upcoming State of Secure Information Management where we explore strategies to enable secure access and protect sensitive data.

Access 59
article thumbnail

My favorite ultraportable laptop for work is not a ThinkPad or MacBook (and it's $350 off)

Collaboration 2.0

The Asus Vivobook S 15 is a fantastic ultraportable laptop with fast performance and a brilliant OLED screen. It's on sale for Black Friday.

Sales 93
article thumbnail

NSO Group Spies on People on Behalf of Governments

Schneier on Security

The Israeli company NSO Group sells Pegasus spyware to countries around the world (including countries like Saudi Arabia, UAE, India, Mexico, Morocco and Rwanda). We assumed that those countries use the spyware themselves. Now we’ve learned that that’s not true: that NSO Group employees operate the spyware on behalf of their customers. Legal documents released in ongoing US litigation between NSO Group and WhatsApp have revealed for the first time that the Israeli cyberweapons maker

article thumbnail

Amazon is selling every iPhone 16 model for one cent this Black Friday - here's how the deal works

Collaboration 2.0

It's very much one of those 'too good to be true' offers for most people, but for the right customer, the one-cent iPhone dream can be realized with this Boost Mobile promo.

IT 91
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Bootkitty is the first UEFI Bootkit designed for Linux systems

Security Affairs

ESET discovered the first Unified Extensible Firmware Interface (UEFI) bootkit specifically designed for Linux systems, named Bootkitty. Cybersecurity researchers from ESET discovered the first UEFI bootkit designed to target Linux systems, called by its authors Bootkitty. The bootkit allows attackers to disable the kernel’s signature verification feature and to preload two as yet unknown ELF binaries via the Linux init process.

article thumbnail

Get a free Google Pixel 9 phone with this T-Mobile Black Friday deal

Collaboration 2.0

When you sign up for a new T-Mobile line or trade in your old device, you can get a free Pixel 9 phone -- an $800 value.

87
article thumbnail

ProjectSend critical flaw actively exploited in the wild, experts warn

Security Affairs

Researchers warn that a critical security flaw in ProjectSend open-source file-sharing application may be under active exploitation. VulnCheck researchers warn that ProjectSend vulnerability CVE-2024-11680 (CVSS score: 9.8) appears to have been exploited by attackers in the wild. The vulnerability is an improper authentication issue that impacts ProjectSend versions before r1720.