Mon.Jul 01, 2024

article thumbnail

Critical unauthenticated remote code execution flaw in OpenSSH server

Security Affairs

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux systems. OpenSSH maintainers addressed a critical vulnerability, tracked as CVE-2024-6387, that can lead to unauthenticated remote code execution with root privileges in glibc-based Linux systems. OpenSSH maintained have addressed the vulnerability with the release of version 9.8 on July 01, 2024. “A critical vulnerability in sshd(8) was present

Risk 340
article thumbnail

Purple Teaming: Evaluate the Efficacy of Security Controls

Data Breach Today

Red teaming is not effective for evaluating the efficacy of preventative or detective security controls, said Jared Atkinson of Specter Ops, but purple teaming is. Purple teaming as "the evaluation of security control efficacy through atomic testing, using deliberately selected test cases.

Security 295
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769

Security Affairs

Experts spotted threat actors exploiting the critical vulnerability CVE-2024-0769 affects all D-Link DIR-859 WiFi routers. Researchers from cybersecurity firm GreyNoise have spotted exploitation attempts for the critical vulnerability CVE-2024-0769 (CVSS score 9.8) impacting all D-Link DIR-859 WiFi routers. The vulnerability is a path traversal issue that can lead to information disclosure.

Passwords 327
article thumbnail

New Tech Q&A: Adaptiva – CrowdStrike alliance highlights trend of blending IT and security systems

The Last Watchdog

The coalescing of the next-gen security platforms that will carry us forward continues. Related: Jump starting vulnerability management Adaptiva, a leader in autonomous endpoint management, recently announced the launch of OneSite Patch for CrowdStrike. This new solution integrates with CrowdStrike’s Falcon XDR platform to improve the efficiency and speed of patching critical vulnerabilities in enterprise systems.

Security 278
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Juniper Networks fixed a critical authentication bypass flaw in some of its routers

Security Affairs

Juniper Networks released out-of-band security updates to address a critical authentication bypass vulnerability impacting some of its routers. Juniper Networks has released out-of-band security updates to address a critical vulnerability, tracked as CVE-2024-2973 (CVSS score of 10.0), that could lead to an authentication bypass in some of its routers.

More Trending

article thumbnail

The Problem the US TikTok Crackdown and Kaspersky Ban Have in Common

WIRED Threat Level

While Kaspersky and TikTok make very different kinds of software, the US has targeted both over national security concerns. But the looming bans have larger implications for internet freedom.

Security 179
article thumbnail

Groups Ask HHS for Guidance on Massive Change Breach Reports

Data Breach Today

Industry Associations Want Feds to Put Regulatory Onus on Change Healthcare Two weeks ago, Change Healthcare began notifying thousands of medical practices about a massive data breach affecting millions of patients. The healthcare software firm says it will handle breach notifications, but industry groups want to ensure the government will go along with that plan.

article thumbnail

The Curious Case of the Payroll Pilfering

KnowBe4

In a world where cyber espionage has become as common as a rainy day in London, the recent events surrounding the UK armed forces' payroll database have had us all raising our eyebrows higher than a butler's in a posh British drama.

article thumbnail

Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys

Data Breach Today

Over 14 Million Servers May Be Affected by Bug First Fixed Decades Ago More than 14 million servers may be affected by a regressed vulnerability in a remote server management and file transfer tool that can allow hackers to completely take over the affected systems. The flaw is an accidental repeat of a flaw patched in 2006.

173
173
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

New Malware Campaign Impersonates AI Tools To Trick Users

KnowBe4

Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide infostealer, for example, is being distributed via a malicious browser extension posing as Sora or Gemini.

Security 122
article thumbnail

Balancing AI Potential and Risk Management in Cybersecurity

Data Breach Today

Dunphy of Omron on Enhancing Productivity Through Strategic Gen AI Implementation Generative AI offers significant potential for enhancing productivity across various organizational functions. The integration of gen AI demands meticulous oversight to mitigate errors and ensure alignment with company mission, vision and values, said Patrick Dunphy, head of cybersecurity, Omron.

article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from June 2024

KnowBe4

Check out the June updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

Juniper Releases Emergency Fix for Maximum-Severity Flaw

Data Breach Today

Vulnerability Can Allow Authentication Bypass; No Evidence of Exploitation Yet Juniper Networks released an out-of-band fix for a maximum-severity vulnerability that can allow hackers to bypass authentication in three Juniper products. The CVSS 10-rated bug could allow an attacker to take full control of a compromised system.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Model Extraction from Neural Networks

Schneier on Security

A new paper , “Polynomial Time Cryptanalytic Extraction of Neural Network Models,” by Adi Shamir and others, uses ideas from differential cryptanalysis to extract the weights inside a neural network using specific queries and their results. This is much more theoretical than practical, but it’s a really interesting result. Abstract: Billions of dollars and countless GPU hours are currently spent on training Deep Neural Networks (DNNs) for a variety of tasks.

Paper 113
article thumbnail

Payer innovation council weighs improvements to provider data management experience via Fierce Healthcare

IG Guru

Check out the article here The post Payer innovation council weighs improvements to provider data management experience via Fierce Healthcare first appeared on IG GURU.

73
article thumbnail

Vulnerability Recap 7/1/24 – Apple, GitLab, AI Platforms at Risk

eSecurity Planet

Last week, critical vulnerability news emerged on multiple platforms. Ollama AI Platform, which permitted remote code execution via path traversal, patched its vulnerabilities in its version updates. MOVEit Transfer had an authentication bypass that affected 2,700 instances. GrimResource method leveraged MMC XSS vulnerabilities. Fortra’s FileCatalyst patched a SQL injection vulnerability.

Risk 64
article thumbnail

Open banking and PSD2: Secure innovative services via Open API

Thales Cloud Protection & Licensing

Open banking and PSD2: Secure innovative services via Open API josh.pearson@t… Mon, 07/01/2024 - 21:28 Access Control Identity & Access Management Ammar Faheem | Product Marketing Manager More About This Author > E-commerce is now a fact of life. Whether buying groceries with one click on Amazon or ordering a taxi on your phone with Uber, customers worldwide increasingly rely on the convenience of online services.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Human + artificial intelligence: Driving fortitude and a human-centric future

CGI

This CGI blog post shares insights on creating a symbiotic relationship between AI and human intelligence to drive business outcomes.

article thumbnail

Redefining Security: The Power of Passwordless Authentication

Thales Cloud Protection & Licensing

Redefining Security: The Power of Passwordless Authentication josh.pearson@t… Tue, 07/02/2024 - 07:01 In the face of rapidly evolving cyber threats, the traditional method of securing sensitive information through passwords has become alarmingly vulnerable. As organizations urgently seek to fortify their defenses, a paradigm shift towards passwordless authentication has emerged as a compelling solution to enhance security, streamline the user experience, and mitigate the risks associated with pa

article thumbnail

Payer innovation council weighs improvements to provider data management experience via Fierce Healthcare

IG Guru

Check out the article here Read more here

40
article thumbnail

Jamf and Apple updates to support education app choices

Jamf

Jamf Teacher adds a new interface so educators can add apps from the Apple Education Partner Program. Also, the latest version of Jamf Teacher includes improvements to Raise Hand notifications. Read to learn more.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Upcoming Book on AI and Democracy

Schneier on Security

If you’ve been reading my blog, you’ve noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce that we’re writing a book on the topic. This isn’t a book about deep fakes, or misinformation. This is a book about what happens when AI writes laws, adjudicates disputes, audits bureaucratic actions, assists in political strategy, and advises citizens on what candidates and issues to support.

article thumbnail

New and updated Jamf 100 Course released

Jamf

A new Jamf 100 Course release is here with support for Jamf Pro 11, a streamlined curriculum, new simulations and a fresh Jamf Pro Associate certification.

40