Thu.Sep 12, 2024

article thumbnail

Cybersecurity giant Fortinet discloses a data breach

Security Affairs

Fortinet disclosed a data breach after a threat actor claimed the theft of 440GB of files from the company’s Microsoft Sharepoint server. Today, Fortinet told Cyber Daily that a threat actor gained unauthorized access to a third-party service it used. “An individual gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive, which included limited data related to a small number of Fortinet customers, and

article thumbnail

Breach Roundup: Mexico in Hacker Spotlight

Data Breach Today

Also: Critical WHOIS Vulnerability Exposes Internet Security Flaw in.mobi Domains This week, cyberthreats rising in Mexico; FBI warned of BEC scams; U.K. police arrested hacking suspect; Avis, Slim CD, Medicare and Fortinet disclosed breaches; Highline public schools reopened after cyberattack; a critical flaw was found in WHOIS; and Konni upped attacks on Russia, South Korea.

Security 297
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Singapore Police arrest six men allegedly involved in a cybercrime syndicate

Security Affairs

The Singapore Police Force (SPF) has arrested six individuals for their role in the operations of a cybercrime ring in the country. The Singapore Police Force (SPF) arrested five Chinese nationals, aged 32 to 42, and a 34-year-old Singaporean man for the alleged involvement in illegal cyber activities in the country. On 9 September 2024, around 160 officers from various Singapore Police Force units conducted raids across the island, leading to the arrests and the seizure of electronic devices an

article thumbnail

Cryptohack Roundup: $20.5M Indodax Theft

Data Breach Today

Also: Angel Drainer Resurfaces; Russia's Sanctions Evasion Ploy This week, Indodax was hacked, Angel Drainer resurfaced, Russia developed Infra crypto, GS Partners settled with U.S. states, Caroline Ellison to be sentenced Sept. 24, FCA prosecuted first unregistered crypto case, Nigeria set new crypto regulations, and India may approve offshore crypto firms.

288
288
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

UK NCA arrested a teenager linked to the attack on Transport for London

Security Affairs

U.K. police arrested a 17-year-old teenager allegedly linked to the cyberattack on London’s public transportation agency, Transport for London. U.K.’s National Crime Agency announced the arrest of a 17-year-old teenager from Walsall who is allegedly linked to the cyberattack that recently hit Transport for London. “The 17-year-old male was detained on suspicion of Computer Misuse Act offences in relation to the attack, which was launched on TfL on 1 September.” states the

More Trending

article thumbnail

Apple Vision Pro’s Eye Tracking Exposed What People Type

WIRED Threat Level

The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.

Passwords 218
article thumbnail

I ditched my Kindle and iPad just hours after testing this Android tablet

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G is my new favorite e-reader for its versatile display and value.

IT 246
article thumbnail

Kernel Mode Under the Microscope at Windows Security Summit

Data Breach Today

Company Focused on Safe Deployment Practices, Reducing Kernel Mode Dependencies Cutting kernel mode dependencies and adopting safe deployment practices will make endpoint systems more resilient and secure for Windows customers. Tuesday's meeting came two months after a faulty CrowdStrike update disrupted 8.5 million Windows machines and caused $5.4 billion in direct losses.

Security 189
article thumbnail

Every iPhone 16 model compared: Should you buy the standard, Plus, Pro, or Max?

Collaboration 2.0

Apple unveiled the new iPhone 16 series with camera improvements and larger displays, but which one is right for you? Here's how each model compares.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Mastercard Buys Threat Intel Firm Recorded Future for $2.65B

Data Breach Today

Deal Will Help Mastercard Offer Greater Protection, Trust for Digital Transactions Mastercard plans to buy threat intelligence firm Recorded Future for $2.65 billion to enhance cyber resilience and offer greater protection and trust around digital transactions. The deal will enhance Mastercard's identity, fraud prevention services by helping businesses identify and mitigate risk.

Risk 182
article thumbnail

iPhone 16 Pro vs. iPhone 14 Pro: Is the latest model worth the upgrade?

Collaboration 2.0

Apple's new iPhone 16 Pro has some notable improvements, but do they warrant upgrading from the now two-year-old iPhone 14 Pro? Here's how to decide.

246
246
article thumbnail

UK Labels Data Centers as Critical National Infrastructure

Data Breach Today

British Government Says Data Centers Are 'Essential for Functioning of Society' The U.K. government on Thursday designated data centers as part of its critical national infrastructure in a move intended to prevent the loss of sensitive user data during disruptive cyberattacks. A newly announced data center security team will monitor and anticipate potential cyberthreats.

article thumbnail

Oura Ring vs. Apple Watch: Which health tracker should you buy?

Collaboration 2.0

These two wearables might look like they track the same metrics, but they are vastly different devices.

246
246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

UK NCA arrested a teenager linked to the attack on Transport for London

Security Affairs

U.K. police arrested a 17-year-old teenager allegedly linked to the cyberattack on London’s public transportation agency, Transport for London. U.K.’s National Crime Agency announced the arrest of a 17-year-old teenager from Walsall who is allegedly linked to the cyberattack that recently hit Transport for London. “The 17-year-old male was detained on suspicion of Computer Misuse Act offences in relation to the attack, which was launched on TfL on 1 September.” states the

article thumbnail

Microsoft 365 is down for thousands of users

Collaboration 2.0

UPDATED: The web version of Microsoft's software suite is currently inaccessible for a large number of people, and other services seem to be down as well.

246
246
article thumbnail

Singapore Police arrest six men allegedly involved in a cybercrime syndicate

Security Affairs

The Singapore Police Force (SPF) has arrested six individuals for their role in the operations of a cybercrime ring in the country. The Singapore Police Force (SPF) arrested five Chinese nationals, aged 32 to 42, and a 34-year-old Singaporean man for the alleged involvement in illegal cyber activities in the country. On 9 September 2024, around 160 officers from various Singapore Police Force units conducted raids across the island, leading to the arrests and the seizure of electronic devices an

article thumbnail

Have a global audience? This AI video platform translates your content in one click

Collaboration 2.0

Synthesia is adding new features to its AI video generation platform for seamless, culturally relevant translations. Here's how it works.

IT 242
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Microsoft Is Adding New Cryptography Algorithms

Schneier on Security

Microsoft is updating SymCrypt , its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article : The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards formalized last month by the National Institute of Standards and Technology (NIST).

Libraries 133
article thumbnail

Linux and open-source documentation is a mess: Here's the solution

Collaboration 2.0

Simply telling someone to RTFM is not an answer when the manual is outdated, unreadable, or nonexistent. We need to improve the quality of our documentation, and the way to do that is simple.

190
190
article thumbnail

News alert: Aembit raises $25M Series A funding for non-human Identity and Access Management

The Last Watchdog

Silver Spring, MD, Sept.12, 2024, CyberNewsWire – – Aembit , the leading non-human identity and access management (IAM) company, has secured $25 million in Series A funding, bringing its total capital raised to nearly $45 million. Acrew Capital led the round, with participation from existing investors Ballistic Ventures, Ten Eleven Ventures, Okta Ventures, and CrowdStrike Falcon Fund.

Access 130
article thumbnail

5 top Linux text editors that aren't vi or Emacs (and why they are my favorite)

Collaboration 2.0

Name your desktop distro - I've got great and easy-to-use text editors to recommend.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

How to Address AI Security Risks With ISO 27001

IT Governance

AI penetration tests, user education, and more Artificial intelligence is taking the world by storm. But for all its potential, there are legitimate concerns around, among other things, data security. Bridget Kenyon is the CISO (chief information security officer) for SSCL, a member of the UK Advisory Council for (ISC) 2 , and a Fellow of the Chartered Institute of Information Security.

Risk 108
article thumbnail

Google Chrome adds 3 new security features to boost your online safety and privacy

Collaboration 2.0

Safety Check is getting an upgrade, and now you'll be able to better manage website notifications and permissions.

Privacy 190
article thumbnail

System extension changes in macOS Sequoia

Jamf

With the release of macOS Sequoia, admins will see changes to system extensions on managed devices. Find out what this means for your device fleet.

81
article thumbnail

Gemini Live is rolling out to all Android users - for free. Here's how to access it

Collaboration 2.0

Want a voice assistant you can have natural conversations with? You may not need to wait for ChatGPT's Voice Mode.

Access 190
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

UK datacentres to be designated critical infrastructure

The Guardian Data Protection

Facilities to receive greater protection in attempt to reduce potential impact of adverse incidents or attacks Datacentres in the UK are to be designated as critical national infrastructure in an effort to protect them from cyber-attacks and IT blackouts, the government has said. The buildings store much of the data generated in the UK, including photos taken on smartphones, financial information and NHS records.

article thumbnail

Google will now link you to webpages of the past via the Wayback Machine

Collaboration 2.0

Thanks to the Internet Archive's Wayback Machine, you'll be able to find older versions of the sites that appear in your search results.

Archiving 189
article thumbnail

Dobeles dzirnavnieks finds the perfect recipe for growth success

OpenText Information Management

At Dobeles dzirnavnieks , we provide flour, pasta, cereal flakes and many more food products to millions of consumers across more than 70 countries. Based in Latvia, we operate production facilities that cover over 21 hectares. Dobeles dzirnavnieks is already the largest pasta producer in Northern Europe—and we continue to grow. Driving one of the largest food production businesses in Baltics is no simple task.

Paper 59