Tue.Aug 20, 2024

article thumbnail

Ransomware payments rose from $449.1 million to $459.8 million

Security Affairs

Blockchain analysis firm Chainalysis revealed that ransomware payments rose by approximately 2%, from $449.1 million to $459.8 million. Blockchain analysis firm Chainalysis revealed that while overall on-chain illicit activity has decreased by nearly 20% year-to-date, stolen funds and ransomware significantly increased. Stolen funds inflows almost doubled, rising from $857 million to $1.58 billion, and ransomware inflows grew by about 2%, from $449.1 million to $459.8 million.

article thumbnail

How Ransomware Group Stability Affects Payment Decisions

Data Breach Today

Robert Boyce on Accenture's Strategy for Assessing the Behavior of Ransomware Gangs Accenture Global Cyber Resilience Lead Robert Boyce outlines why organizations must assess the stability of ransomware groups before deciding how to respond to extortion threats. He outlines how trustworthiness of ransomware gangs can affect the likelihood of receiving decryption keys after payment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Oracle NetSuite misconfiguration could lead to data exposure

Security Affairs

Researchers discovered thousands of Oracle NetSuite e-stores that are vulnerable to data leak, sensitive customer information is at risk. Cybersecurity researchers from AppOmni warn of a potential issue in Oracle NetSuite SuiteCommerce platform could allow attackers to access customer sensitive data. NetSuite is a widely used SaaS Enterprise Resource Planning (ERP) platform, valued for its capability to deploy external-facing online stores through SuiteCommerce or SiteBuilder.

Access 323
article thumbnail

North Korea Exploited Windows Zero-Day to Deploy Fudmodule

Data Breach Today

Lazarus Espionage Group's Sophisticated Malware Evades Antivirus Monitoring North Korea's Lazarus hacking team, which focuses on cryptocurrency theft and espionage, has once again been exploiting a zero-day vulnerability in Microsoft Windows to install antivirus-suppressing malware dubbed Fudmodule to aid its intrusions.

IT 282
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Previously unseen Msupedge backdoor targeted a university in Taiwan

Security Affairs

Experts spotted a previously undetected backdoor, dubbed Msupedge, that was employed in an attack against a university in Taiwan. Broadcom Symantec researchers discovered a previously undetected backdoor, called Msupedge, that was employed in an attack targeting an unnamed university in Taiwan. The most notable feature of the backdoor is that it relies on DNS tunnelling to communicate with a C2 server. “Msupedge is a backdoor in the form of a dynamic link library (DLL).” reads the r

Libraries 300

More Trending

article thumbnail

Toyota disclosed a data breach after ZeroSevenGroup leaked stolen data on a cybercrime forum

Security Affairs

Toyota has confirmed a data breach after a threat actor leaked 240GB of data stolen from its infrastructure on a cybercrime forum. Toyota disclosed a data breach after a threat actor leaked an archive of 240GB of data stolen from its systems on a cybercrime forum, BleepingComputer reported. The threat actor ZeroSevenGroup claims to have breached a U.S. branch of Toyota, stealing 240GB of files containing information on Toyota employees, customers, contracts, and financial details.

article thumbnail

McLaren Health Expects IT Disruption to Last Through August

Data Breach Today

Patients Still Asked to Bring Paper Records to Appointments Post-Ransomware Attack McLaren Health Care expects IT disruptions caused by a ransomware attack earlier this month to last through the end of August. While most of McLaren's facilities are open, IT systems across its hospitals, cancer centers and clinics are still affected, including electronic medical record access.

IT 274
article thumbnail

ChatGPT vs. ChatGPT Plus: Is a paid subscription still worth it?

Collaboration 2.0

OpenAI's new and improved GPT-4o model makes it harder to determine who'll find free ChatGPT adequate and who should go for Plus. We break down your options to help you decide.

IT 246
article thumbnail

Real-Time Deepfakes: A Growing Threat to Corporate Security

Data Breach Today

Bishop Fox's Brandon Kovacs on the Security Risks of Real-Time Voice, Video Cloning The ability to create real-time deepfakes of trusted figures has transformed the landscape of corporate security threats. Brandon Kovacs, senior red team consultant at Bishop Fox, details how attackers can now clone voices and video in real-time, enabling new forms of social engineering and fraud.

Security 274
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The 2-in-1 laptop I recommend for the office is not a Lenovo or HP

Collaboration 2.0

Dell's Inspiron 14 2-in-1 delivers a solid suite of hardware the line is known for, but with the added benefit of a convertible form factor.

246
246
article thumbnail

No Deal: Action1 Rebuffs CrowdStrike's Interest in $1B Buy

Data Breach Today

Action1 Opts For Independence, Believes It Can Become Multi-Billion Dollar Business Action1 has rebuffed CrowdStrike's interest in acquiring the patch management and vulnerability remediation startup for $1 billion and opted to remain independent. Action 1 has decided to turn down acquisition inquiries since the company believes it can grow into a multi-billion dollar business.

IT 273
article thumbnail

Apple may release multiple AirPods next month. Here are the top 4 features I want to see

Collaboration 2.0

Industry insiders are confident Apple will announce new AirPods next month. Although that's exciting to hear, there are a few things I'd like to see first.

246
246
article thumbnail

NEWS ANALYSIS Q&A: The early going of Generative AI and LLMs impacting cybersecurity

The Last Watchdog

The art of detecting subtle anomalies, predicting emergent vulnerabilities and remediating novel cyber-attacks is becoming more refined, day by day. Related: GenAI’s impact on elections It turns out that the vast datasets churned out by cybersecurity toolsets happen to be tailor-made for ingestion by Generative AI ( GenAI ) engines and Large Language Models ( LLMs.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Offline Google Maps comes to WearOS - how to check if your watch has it

Collaboration 2.0

Navigating using your smartwatch without an internet connection is about to get a lot easier.

IT 244
article thumbnail

An AWS Configuration Issue Could Expose Thousands of Web Apps

WIRED Threat Level

Amazon has updated its instructions for how customers should more securely implement AWS's traffic-routing service known as Application Load Balancer, but it's not clear everyone will get the memo.

Security 181
article thumbnail

This handy AI app can read anything aloud to you for free - now in 32 languages

Collaboration 2.0

The Reader app from ElevenLabs can read text aloud in hundreds of different voices, including celebrities, on Android and iOS. Here's how to use it.

IT 189
article thumbnail

News alert: INE Security advisory: The steep cost of neglecting cybersecurity training

The Last Watchdog

Cary, NC, Aug. 22, 2024, CyberNewsWire — In modern business, cybersecurity is not merely a technical concern but a crucial financial safeguard. With cyber threats growing in sophistication and frequency, the financial implications of neglecting cybersecurity training are severe and multifaceted. INE Security , a global leader in cybersecurity training and certifications, is exploring how overlooking this critical aspect of organizational strategy can lead to a financial crisis and laying o

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The best WordPress hosting services of 2024: Expert tested

Collaboration 2.0

We tested the best WordPress hosting services to help you manage your websites. These are the best WordPress-ready hosts in the market.

Marketing 190
article thumbnail

2.9 Billion Records Exposed in NPD Breach: How to Stay Safe

eSecurity Planet

A cataclysmic data breach has cast a long shadow over the privacy of billions of individuals. Reports claim that a staggering 2.9 billion records, including Social Security numbers, have been compromised in a cyberattack targeting National Public Data (NPD), a company specializing in background checks. This unprecedented scale of data exposure highlights the vulnerabilities inherent in our interconnected world and the immense value placed on personal information by cybercriminals.

article thumbnail

Why RefreshOS 2.0 is the Linux distro even a Windows user could love

Collaboration 2.0

Focusing on stability, customization, and seamless Qt integration, this Debian/Plasma-based desktop distribution is designed to work well for all types of users.

190
190
article thumbnail

Hacking Wireless Bicycle Shifters

Schneier on Security

This is yet another insecure Internet-of-things story , this one about wireless gear shifters for bicycles. These gear shifters are used in big-money professional bicycle races like the Tour de France, which provides an incentive to actually implement this attack. Research paper. Another news story. Slashdot thread.

Paper 118
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

This lightweight Linux distro is the best way to revive your old computer. Here's how

Collaboration 2.0

If you want to breathe life back into a slow or aging computer, Linux Lite 7.0 is a lightweight, efficient distribution with solid performance.

190
190
article thumbnail

CyberheistNews Vol 14 #34 [HEADS UP] Real Social Engineering Attack on KnowBe4 Employee Foiled

KnowBe4

CyberheistNews Vol 14 #34 [HEADS UP] Real Social Engineering Attack on KnowBe4 Employee Foiled

115
115
article thumbnail

The fastest VPNs of 2024: Great speeds and secure connections anywhere

Collaboration 2.0

We tested the fastest VPNs on the market to help you decide which is best for you to avoid slowing down your internet while staying secure.

Security 190
article thumbnail

Vulnerability Recap 8/20/24 – Microsoft Has the Spotlight This Week

eSecurity Planet

This past week was Patch Tuesday: Microsoft released CVEs for 90 new vulnerabilities. But that wasn’t the vendor’s only contribution to our list — Entra ID, Microsoft’s cloud directory product, also had a recent snag. Additionally, I looked at Linux, SolarWinds, and Android vulnerabilities. Ivanti continues to have issues, this time with its Virtual Traffic Manager product.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Samsung's $99 Galaxy Watch is the best Wear OS deal right now - here's how to qualify

Collaboration 2.0

With this promotion, you have no reason to pay full price for the latest Samsung Galaxy Watch FE.

189
189
article thumbnail

How threat hunters stay informed and collaborate 

OpenText Information Management

In the ever-evolving landscape of cybersecurity, threat hunters play a crucial role in proactively detecting and mitigating security threats. A recent study by The CHISEL Group at the University of Victoria sheds light on the collaboration and information-sharing practices of threat hunters. Here are some key findings from the report that can help threat hunters and their managers enhance their strategies.

article thumbnail

7 Android accessibility features that can make your life easier

Collaboration 2.0

For those who need their mobile OS to assist them with specific tasks, Android has plenty of features to make life a little bit more accessible.

Access 189