Mon.Sep 09, 2024

article thumbnail

Electronic payment gateway Slim CD disclosed a data breach impacting 1.7M individuals

Security Affairs

Payment gateway provider Slim CD disclosed a data breach, credit card and personal data of almost 1.7 million individuals were compromised. The electronic payment gateway Slim CD disclosed a data breach following a cyberattack. Personal data and credit card details of 1,693,000 individuals were compromised. Slim CD’s gateway system allows merchants to accept any kind of electronic payment with a single piece of software.

article thumbnail

Patch Alert Issued for Veeam Backup & Replication Software

Data Breach Today

Expect Ransomware Groups to Abuse Critical-Severity Bug to Steal Data, Experts Warn Security experts are urging all Veeam Backup & Replication users to immediately update their software to patch a flaw that attackers can remotely exploit to take full control of a system. Experts say ransomware groups likely will target the critical-severity vulnerability for double extortion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts demonstrated how to bypass WhatsApp View Once feature

Security Affairs

Users are exploiting a privacy flaw in WhatsApp to bypass the app’s “View once” feature, allowing them to re-view messages. The ‘View Once ‘ feature in WhatsApp allows users to send photos, videos, and voice messages that can only be viewed once by the recipient. Recipients cannot forward, share, or copy the “View Once” media, and they cannot take screenshots or screen recordings of it.

Privacy 351
article thumbnail

Everything Apple announced at iPhone 16 event: AirPods, Apple Watch Series 10, AI, more

Collaboration 2.0

Apple unveiled a slew of new hardware and features during its Monday keynote. Here's a roundup of the company's announcements.

IT 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

TIDRONE APT targets drone manufacturers in Taiwan

Security Affairs

A previously undocumented threat actor tracked TIDRONE targets organizations in military and satellite industries in Taiwan. Trend Micro spotted an allegedly China-linked threat actor, tracked TIDRONE, targeting drone manufacturers in Taiwan. The group, which was previously undocumented, uses enterprise resource planning (ERP) software and remote desktops to deploy advanced malware, including CXCLNT and CLNTEND.

More Trending

article thumbnail

What You Need to Know About Grok AI and Your Privacy

WIRED Threat Level

xAI's generative AI tool, Grok AI, is unhinged compared to its competitors. It's also scooping up a ton of data people post on X. Here's how to keep your posts out of Grok—and why you should.

Privacy 216
article thumbnail

The 7 best iOS 18 features that will make updating your iPhone worthwhile

Collaboration 2.0

Apple announced the new iPhone 16 lineup with iOS 18 today. Here are the best new features coming to your old iPhone.

246
246
article thumbnail

Progress Software Fixes Critical LoadMaster Vulnerability

Data Breach Today

Urgent Fix Addresses Critical Flaw That Allows Remote Code Execution Progress Software released an urgent patch Thursday to fix a critical vulnerability that hackers could exploit to launch remote attacks. The company is no stranger to urgent patching. It was at the center of a Memorial Day 2023 mass hacking incident.

IT 173
article thumbnail

iPhone 16 Pro vs. iPhone 14 Pro: Is it worth an upgrade?

Collaboration 2.0

Apple's new iPhone 16 Pro has some notable improvements, but are they enough to warrant upgrading from the iPhone 14 Pro just two years later? Here's how to decide.

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Acadian Ambulance Notifying Nearly 3 Million of Data Theft

Data Breach Today

Ransomware Gang Daixin Claims It Published Sensitive Patient Info on Dark Web Site A Louisiana-based ambulance company that provides emergency medical care services in four states is notifying nearly 3 million people that their sensitive health information was potentially stolen in a June hack. Ransomware gang Daixin claims to have published the data on its dark web leak site.

article thumbnail

Every iPhone 16 model compared: Which new iPhone should you buy?

Collaboration 2.0

Apple unveiled the new iPhone 16 with standout camera improvements and larger displays, but which one is right for you? We'll break down how each model compares.

246
246
article thumbnail

FBI Report Says Cryptocurrency Scams Surged in 2023

Data Breach Today

Victims Reported $5.6 Billion in Financial Losses Associated With Crypto Schemes The FBI's Internet Crime Complaint Center on Monday issued a report revealing victims filed more than 69,000 public complaints related to cryptocurrency fraud and $5.6 billion in financial losses in 2023, while investment scams made up the bulk of losses throughout the year.

173
173
article thumbnail

The iPhone 16 is undeniably great hardware - but you should still probably skip it

Collaboration 2.0

Opinion: The iPhone 16's hardware is impressive, but Apple Intelligence currently leaves much to be desired.

IT 246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Hackers Target Taiwan UAV, Military Industries

Data Breach Today

Threat Actor Is Likely a Beijing Cyberespionage Operator A Chinese-speaking hacking group is targeting drone manufacturers in Taiwan and other military-related industries on the island country located roughly 100 miles from mainland China. Trend Micro on Friday said it tracks the threat actor as "Tidrone.

Military 173
article thumbnail

iPhone 16 Pro gets innovative cooling features - but it may still run hotter than you expect

Collaboration 2.0

Better cooling means the hardware can run harder, but that could lead to problems down the line.

IT 246
article thumbnail

US Prepares to Gather AI Foundational Model Developer Info

Data Breach Today

Action Aims to Ensure That Domestic Defense Industry Keeps Up With AI Developments The U.S. federal government is preparing to collect reports from foundational artificial intelligence model developers, including details about their cybersecurity defenses and red-teaming efforts. The Department of Commerce said it wants thoughts on how data should be safety collected and stored.

article thumbnail

The 4 biggest new health features Apple just announced

Collaboration 2.0

Actionable health insights were an overarching theme across Apple's new line of products, including the ability for the AirPods Pro 2 to act as an over-the-counter hearing aid.

246
246
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Darktrace CEO Swap: Gustafsson Steps Down; Popelka Steps Up

Data Breach Today

COO Jill Popelka Promoted to Chief Executive as Thoma Bravo Acquisition Nears Close Darktrace has promoted COO Jill Popelka to CEO, replacing long-time leader Poppy Gustafsson. As the cybersecurity AI vendor prepares to finalize its sale to Thoma Bravo, Popelka will steer Darktrace into its next phase of growth. Gustafsson will join the board as a non-executive director.

Sales 162
article thumbnail

The Google Pixel Watch 3 lets me run smarter, not harder - thanks to AI

Collaboration 2.0

The new Google Pixel Watch 3 is bigger, better, more connected, and still a beautiful watch.

246
246
article thumbnail

My Experience is Your Best Teacher

Weissman's World

Julius Caesar had it right when he observed that “experience is the best teacher, and the worst experiences teach the best lessons.” How do I know? Because I’ve been helping organizations Do Information Right™ for a long time and have learned a great many lessons that you can benefit from without having to learn them the hard way. The post My Experience is Your Best Teacher appeared first on Holly Group.

IT 156
article thumbnail

iPhone 16 Pro vs. iPhone 15 Pro: Should you upgrade to the latest model?

Collaboration 2.0

The newest iPhone model features a larger and stronger display than last year's, a more powerful and efficient processor, and a camera control button. Is it worth upgrading?

IT 246
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Australia Threatens to Force Companies to Break Encryption

Schneier on Security

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption. The Assistance and Access Act includes key components that outline investigatory powers between government and industry. These components include: Technical Assistance Requests (TARs): TARs are voluntary requests for assistance accessing encrypted data from law enforcement to teleco and technology companies.

article thumbnail

Early adopters are deploying AI agents in the enterprise now, with scaled adoption in 2025

Collaboration 2.0

Technology, innovation, and strategy experts share their points of view on AI agent adoption and the future of the autonomous AI-powered enterprise.

246
246
article thumbnail

Election-Themed Scams Are on the Rise

KnowBe4

Researchers at Malwarebytes warn of a surge in election-themed scams ahead of November’s presidential election in the US. These attacks can be expected to increase as the election grows closer.

article thumbnail

Apple AirPods 4 vs. AirPods 4 with noise cancellation: Which earbuds fit you best?

Collaboration 2.0

Apple announced two new AirPods in the fourth-generation lineup. Here are some key differences to consider before upgrading.

230
230
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What Is Industrial Control System (ICS) Cyber Security?

eSecurity Planet

Industrial control systems (ICS) are the backbone of critical infrastructure, powering essential operations in the energy, manufacturing, water treatment, and transportation sectors. These systems ensure the seamless functioning of processes that keep industries running smoothly and efficiently. However, as ICSs become more integrated with digital networks, their vulnerability to cyberthreats grows, making robust security measures essential to safeguarding these vital operations.

Security 111
article thumbnail

5 best Linux distributions for gamers in 2024

Collaboration 2.0

The idea that Linux isn't a practical choice for gamers is slowly becoming outdated. Here are the best Linux distros every gamer should consider using.

189
189
article thumbnail

Vulnerability Recap 9/9/24 – Exploited Vulnerabilities Persist

eSecurity Planet

Last week’s vulnerability news highlighted major security problems that affect a wide range of technologies. These vulnerabilities represent significant dangers for end users and organizations — from the remote code execution vulnerabilities in Veeam Backup & Replication and Apache OFBiz to the severe access control issues in SonicWall and Google Android.

Access 111