Wed.May 22, 2024

article thumbnail

An ongoing malware campaign exploits Microsoft Exchange Server flaws

Security Affairs

A threat actor is targeting organizations in Africa and the Middle East by exploiting Microsoft Exchange Server flaws to deliver malware. Positive Technologies researchers observed while responding to a customer’s incident spotted an unknown keylogger embedded in the main Microsoft Exchange Server page. The keylogger was used to collect account credentials.

article thumbnail

Anyone Can Trick AI Bots into Spilling Passwords

Data Breach Today

Thousands of People Tricked Bots into Revealing Sensitive Data in Lab Setting It doesn't take a skilled hacker to glean sensitive information anymore: all you need to trick a chatbot into spilling someone else's passwords is "creativity." In a multi-level test, nearly all participants were able to trick the chatbot into revealing a password on at least one level.

Passwords 296
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A consumer-grade spyware app found in check-in systems of 3 US hotels

Security Affairs

A researcher discovered a consumer-grade spyware app on the check-in systems of at least three Wyndham hotels across the US. The security researcher Eric Daigle discovered a commercial spyware app, called pcTattletale, on the check-in systems of at least three Wyndham hotels across the US, TechCrunch first reported. Parents often use the app to monitor their children’s online activities or by employers to keep track of employee productivity and internet usage.

Access 337
article thumbnail

Microsoft's Recall Stokes Security and Privacy Concerns

Data Breach Today

K ICO Announces Probe Into Microsoft Screenshot Storage Feature Microsoft's new automatic screenshot retrieval feature could enable hackers to steal sensitive information such as online banking credentials, security experts warned. Additionally, the U.K. data regulator will probe Recall for compliance with privacy law.

Privacy 288
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Critical GitHub Enterprise Server Authentication Bypass bug. Fix it now!

Security Affairs

GitHub addressed a vulnerability in the GitHub Enterprise Server (GHES) that could allow an attacker to bypass authentication. GitHub has rolled out security fixes to address a critical authentication bypass issue, tracked as CVE-2024-4985 (CVSS score: 10.0), in the GitHub Enterprise Server (GHES). GitHub Enterprise Server (GHES) is a self-hosted version of GitHub designed for use within organizations.

More Trending

article thumbnail

OmniVision disclosed a data breach after the 2023 Cactus ransomware attack

Security Affairs

The digital imaging products manufacturer OmniVision disclosed a data breach after the 2023 ransomware attack. OmniVision Technologies is a company that specializes in developing advanced digital imaging solutions. In 2023, OmniVision employed 2,200 people and had an annual revenue of $1.4 billion. OmniVision Technologies Inc. is an American subsidiary of Chinese semiconductor device and mixed-signal integrated circuit design house Will Semiconductor.

article thumbnail

How to find out if an AirTag is tracking you

Collaboration 2.0

Apple's handy trackers have been used to track people's location against their consent, but there's a way to determine if an AirTag is tracking you. Here's what to know.

246
246
article thumbnail

Critical Veeam Backup Enterprise Manager authentication bypass bug

Security Affairs

A critical security vulnerability in Veeam Backup Enterprise Manager could allow threat actors to bypass authentication. A critical vulnerability, tracked as CVE-2024-29849 (CVSS score: 9.8), in Veeam Backup Enterprise Manager could allow attackers to bypass authentication. Veeam Backup Enterprise Manager is a centralized management and reporting tool designed to simplify the administration of Veeam Backup & Replication environments.

article thumbnail

Rockwell Automation Urges Disconnection of ICS from the Internet

Data Breach Today

Advisory Says Disconnecting ICS Reduces Exposure to Malicious Cyber Activities Rockwell Automation warned customers to disconnect industrial control systems from the internet, citing escalating cyber threats and rising global geopolitical tensions. Disconnecting these systems is a proactive measure to reduce the attack surface.

222
222
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

How to use Windows Quick Assist for tech support - and why it's better than Remote Desktop

Collaboration 2.0

Whether you need to give or receive technical help, here's how to make the most of the Quick Assist tool in Windows 10 and 11.

IT 189
article thumbnail

Chinese Cyber Espionage Groups Tied to ORB Network Attacks

Data Breach Today

Beijing's Tough-to-Track Mesh Networks Built Using Hacked Devices, Mandiant Warns Multiple Chinese cyber espionage groups, including Volt Typhoon, are using operational relay box networks, aka ORBs, built using leased proxy servers and compromised or end-of-life routers, to avoid detection and complicate efforts to track their activities, warns Google Cloud's Mandiant.

Cloud 182
article thumbnail

The best identity theft protection and credit monitoring services of 2024

Collaboration 2.0

The best identity theft and credit monitoring services offer antivirus tools, social media monitoring, alerts, and assistance if something goes wrong.

189
189
article thumbnail

LockBit Demands $25M Ransom from Canadian Drug Store Chain

Data Breach Today

Threatens to Leak Stolen Data; Attack Temporarily Shut Down Retail Pharmacy Stores LockBit cybercriminals demanded a $25 million ransom from Canadian pharmacy retail chain London Drugs following an attack detected in late April that forced the company to temporarily close its 79 stores across western Canada for more than a week.

Retail 173
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

News alert: AI SPERA integrates its ‘Criminal IP’ threat intelligence tool into AWS Marketplace

The Last Watchdog

Torrance,Calif., May 22, 2024, CyberNewsWire — AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal IP , is now available on the AWS Marketplace. This integration ensures efficient software procurement and deployment, aligning seamlessly with customers’ existing cloud architectures.

IT 130
article thumbnail

OpenText Boosts MDR Offering for MSPs With Pillr Acquisition

Data Breach Today

Purchase Fills Gap in OpenText's Cyber Offering for Small and Mid-Sized Businesses OpenText has acquired Pillr to strengthen its managed detection and response capabilities for small and mid-sized businesses. The integration will provide managed service providers with advanced security solutions, addressing increasing cyber threats and expanding OpenText's security portfolio.

Security 162
article thumbnail

Malicious Use of Generative AI Large Language Models Now Comes in Multiple Flavors

KnowBe4

Analysis of malicious large language model (LLM) offerings on the dark web uncovers wide variation in service quality, methodology and value – with some being downright scams.

Security 128
article thumbnail

Pakistani-Aligned APT36 Targets Indian Defense Organizations

Data Breach Today

Espionage Group Using Linux-based Espionage Tools to Nab Defense Secrets A politically motivated hacking group aligned with Pakistani interests is matching the Indian military's shift away from the Windows operating system with a heavy focus on malware encoded for Linux. BlackBerry observed the cyberespionage group targeting government agencies and the defense industry.

Military 162
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Announcing KnowBe4 Student Edition: Cybersecurity Education Tailored for the Next Generation

KnowBe4

I recently heard another heartbreaking story of students who were scammed out of financial aid by a phishing attack. We have also heard stories of employment scams and social media based attacks where students fell victim to cybercriminals.

Education 126
article thumbnail

Unfading Sea Haze APT Targeting South China Sea Governments

Data Breach Today

Bitdefender Exposes Unfading Sea Haze's Advanced Cyberespionage Tactics A previously undetected, suspected Chinese-state threat actor has been targeting governments in the South China Sea for years with a remote access Trojan that has been a favorite of Chinese hackers since its creation almost two decades ago, say security researchers from Bitdefender.

article thumbnail

Unredacting Pixelated Text

Schneier on Security

Experiments in unredacting text that has been pixelated.

124
124
article thumbnail

Proof of Concept: Ensuring AI Compliance, Security Controls

Data Breach Today

Panelists Troy Leach and Avani Desai on AI Organizational and Regulatory Challenges In the latest "Proof of Concept," Troy Leach of CSA and Avani Desai of Schellman discussed integrating AI into organizational frameworks. They highlighted the evolving roles of compliance and leadership and the importance of regulatory frameworks in ensuring robust and trustworthy AI deployment.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Don't Let Criminals Steal Your Summer Fun

KnowBe4

Summer has finally arrived in certain parts of the world, and with it come many exciting events — from the grandeur of the Olympics to the grass courts of Wimbledon, from the electrifying performances of Taylor Swift to the many other concerts that light up the season.

IT 115
article thumbnail

News analysis Q&A: Shake up of the SIEM, UEBA markets continues as LogRhythm-Exabeam merge

The Last Watchdog

It’s easy to compile a checklist on why the announced merger of LogRhythm and Exabeam could potentially make strategic sense. Related: Cisco pays $28 billion for Splunk LogRhythm’s is a long established SIEM provider and Exabeam has been making hay since its 2013 launch advancing its UEBA capabilities. Combining these strengths falls in line with the drive to make cloud-centric, hyper-interconnected company networks more resilient.

Marketing 100
article thumbnail

UK Cybersecurity Org Offers Advice for Thwarting BEC Attacks

KnowBe4

The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organizations defend themselves against business email compromise (BEC) attacks, especially those targeting senior staff members.

article thumbnail

ICO Publishes Its Strategic Approach to Regulating AI

Data Matters

On 30 April 2024, the UK’s Information Commissioner’s Office (“ICO”) published its strategic approach to regulating artificial intelligence (“AI”) (the “Strategy”), following the UK government’s request that key regulators set out their approach to AI regulation and compliance with the UK government’s previous AI White Paper (see our previous blog post here).

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

INFORM24 Conference for the ARMA New Jersey Chapter on June 12th, 2024

IG Guru

Check out the event link here. The post INFORM24 Conference for the ARMA New Jersey Chapter on June 12th, 2024 first appeared on IG GURU.

article thumbnail

OpenText sets its sights on the Payments Canada Summit 2024 

OpenText Information Management

We are excited to be a lead sponsor at the 2024 Payments Canada Summit! As we prepare for one of the most important events in payments, we understand that the financial services industry is undergoing significant changes, driven by standards like ISO 20022 and the rapid adoption of artificial intelligence. That's why we’re committed to leading the discussion on these critical topics at The Summit.

article thumbnail

CILIP welcomes General Election call

CILIP

Looking for opportunities A general election has been called by Prime Minister Rishi Sunak, with a date set for 4 July. The election will give voters across the country the chance to have their say at the ballot box as they decide on a new government. Whatever the outcome of the 4 July vote, there is guaranteed to be a huge number of new MPs entering the House of Commons for the first time.