Tue.Sep 17, 2024

article thumbnail

Qilin ransomware attack on Synnovis impacted over 900,000 patients

Security Affairs

The personal information of a million individuals was published online following a ransomware attack that in June disrupted NHS hospitals in London. In June, a ransomware attack on pathology and diagnostic services provider Synnovis has severely impacted the operations at several major NHS hospitals in London. The attack forced the impacted hospitals to cancel some healthcare procedures, in some cases, patients were redirected to other hospitals.

article thumbnail

The Mystery of Hezbollah’s Deadly Exploding Pagers

WIRED Threat Level

At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point toward a supply chain compromise, not a cyberattack.

Security 295
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese man charged for spear-phishing against NASA and US Government

Security Affairs

US DoJ charged a Chinese national who used spear-phishing emails to obtain sensitive info from NASA, the U.S. Air Force, Navy, Army, and the FAA. The U.S. DoJ charged a Chinese national, Song Wu (39), who used spear-phishing emails to target employees of NASA, the U.S. Air Force, Navy, Army, and the FAA.” The man, who remails at large, used fake email accounts posing as US-based researchers and engineers to target government personnel to obtain software and source code created by the Natio

Phishing 330
article thumbnail

UK Orgs Tout Government Help in Ransomware Incidents

Data Breach Today

Former Royal Mail and Manchester University CISOs Talk Ransomware Response Timely notification of ransomware incidents to British law enforcement agencies played a crucial role in understanding the threats and in developing mitigation strategies, the former security heads of Royal Mail and the University of Manchester said.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Remote attack on pagers used by Hezbollah caused 9 deaths and thousands of injuries

Security Affairs

Remote attack on pagers used by Hezbollah in Lebanon and Syria caused their explosion; at least 8 nine people dead and more than 2,800 injured. At least nine eight individuals, including a child, were killed and over 2,800 were injured due to the explosion of their pagers across Lebanon. A Hezbollah official told Reuters that this incident is the “biggest security breach” in nearly a year of conflict with Israel.

More Trending

article thumbnail

U.S. CISA adds Microsoft Windows MSHTML Platform and Progress WhatsUp Gold bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows MSHTML Platform and Progress WhatsUp Gold bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SonicWall SonicOS, ImageMagick and Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.

IT 317
article thumbnail

Apple Moves to Dismiss Suit Against Spyware Firm NSO Group

Data Breach Today

iPhone Maker Seeks Voluntary Dismissal, Citing Concerns Over Sensitive Data Leaking Apple has filed a motion to dismiss its lawsuit against NSO Group, citing concerns over the potential exposure of sensitive threat intelligence information. The tech giant believes continuing the lawsuit could compromise its ability to protect users and lead to the disclosure of sensitive data.

IT 283
article thumbnail

Taking Control Online: Ensuring Awareness of Data Usage and Consent

Security Affairs

Why do consumers refuse to consent to their data being shared? Ensuring transparency on their usage and consent. In the digital world, trust is essential for the relationships between brands and consumers. However, trust is not a once-off exercise; it’s a continuous process in which each interaction helps build and nurture loyalty over time. This is why it’s crucial to understand the factors contributing to trust, particularly how online brands manage consumers’ personal data.

article thumbnail

Can CISA’s Federal Cybersecurity Alignment Plan Really Work?

Data Breach Today

Experts Warn Federal Cyber Strategies Increasingly Lack Accompanying Resources The U.S. Cybersecurity and Infrastructure Security Agency has released a new plan to further align federal cybersecurity operations that experts say will likely face significant implementation roadblocks due to a lack of funding, leadership buy-in and technical resources.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The best SSH clients for Android - including my two favorites

Collaboration 2.0

Connecting to an SSH-enabled machine from Android doesn't have to be hard - and these apps prove it.

IT 246
article thumbnail

BlackCloak Raises $17M to Boost Cybersecurity for Executives

Data Breach Today

New Funding Will Help BlackCloak Improve Protection Against Rising Cyberthreats BlackCloak’s $17 million Series B funding round will help the company triple its engineering and product teams, enhancing cybersecurity for executives and high-net-worth individuals. The funding will help BlackCloak address emerging issues such as deepfakes and threat intelligence and modeling.

article thumbnail

My new favorite travel accessory gives me an extra screen to work and play on

Collaboration 2.0

Plugable's 15.6-inch portable monitor is a second screen for your laptop, powered by USB-C pass-through for a one-click setup.

246
246
article thumbnail

The Rising Importance of Information Management in the Age of AI

AIIM

As the potential of Generative AI (Gen AI) continues to unfold, one resounding theme emerges: better AI starts with better information management. The ability of Gen AI to deliver reliable and valuable outputs is directly contingent upon the quality and curation of the underlying data.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

This portable monitor has a game-changing feature for remote workers

Collaboration 2.0

Plugable's 15.6-inch portable monitor is a second screen for your laptop, powered by USB-C pass-through for a one-click setup.

246
246
article thumbnail

Remotely Exploding Pagers

Schneier on Security

Wow. It seems they all exploded simultaneously, which means they were triggered. Were they each tampered with physically, or did someone figure out how to trigger a thermal runaway remotely? Supply chain attack? Malicious code update, or natural vulnerability? I have no idea, but I expect we will all learn over the next few days. EDITED TO ADD: I’m reading nine killed and 2,800 injured.

article thumbnail

How to create IFTTT automations on Android - and why you should

Collaboration 2.0

Have you ever wished Android had the built-in ability to automate daily tasks? If so, you might want to look into IFTTT.

245
245
article thumbnail

[Cybersecurity Awareness Month] Prepare for All Manner of Cyber Threats Like the Heroes of ‘The Inside Man’

KnowBe4

KnowBe4's Data-Driven Defense Evangelist Roger A.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

This 12-in-1 Thunderbolt 5 dock offers some of the fastest charging speeds for laptops

Collaboration 2.0

The SD5000T5 EQ Docking Station supports 140W power delivery to quickly charge laptops and can output to triple 4K displays without a single drop in quality.

238
238
article thumbnail

Python Developers Targeted with Malware During Fake Job Interviews

Schneier on Security

Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article These particular attacks from North Korean state-funded hacking team Lazarus Group are new, but the overall malware campaign against the Python development community has been running since at least August of 2023, when a number of popular open source Python tools were maliciously duplicated with added malware.

IT 119
article thumbnail

I upgraded to the Google Pixel 9 Pro, and its most impressive feature was not the software

Collaboration 2.0

The Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out.

IT 189
article thumbnail

From Dreams to Reality: The Magic of 3D Printing, with Elle Hunt

Troy Hunt

I was in my mid-30s before I felt comfortable standing up in front of an audience and talking about technology. Come to think of it, "comfortable" isn't really the right word, as, frankly, it was nerve-racking. This, with my obvious bias as her father, makes it all the more remarkable that Elle was able to do it at NDC Oslo when she was just 11 years old.

IT 118
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

5 Linux commands you should never run (and why)

Collaboration 2.0

Don't ever run these Linux commands if you want to preserve your system.

190
190
article thumbnail

Cost of Cybercrime Estimated 15.6 Trillion in 2029

KnowBe4

Statista projects that the total cost of cybercrime will increase from $6.4 trillion between 2024 and 2029, reaching a staggering $15.63 trillion by the end of this period.

116
116
article thumbnail

Apple officially rolls out RCS for iPhone, but many carriers still don't support it

Collaboration 2.0

RCS is now available on the iPhone - here's how to find out if your carrier offers it.

IT 189
article thumbnail

8 Ways to Reduce Your PCI DSS Compliance Burden

IT Governance

How to reduce your PCI DSS scope and CDE The PCI DSS (Payment Card Industry Data Security Standard) – now at v4.0.1 – can appear intimidating, at 360 pages, listing 277 prescriptive sub-requirements. But this robust standard, administered by the PCI SSC (Payment Card Industry Security Standards Council), recognises that not every organisation accepting card payments needs to meet all 277 requirements.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google finally created a phone worthy of the flagship title in every way

Collaboration 2.0

The Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out.

189
189
article thumbnail

WordPress To Require Two-Factor Authentication for Plugin Developers

eSecurity Planet

With over 40% of the world’s websites powered by WordPress, its vast ecosystem of plugins and themes offers flexibility and customization on a global scale. However, this popularity also makes it a prime target for cyberattacks. WordPress is introducing mandatory two-factor authentication (2FA) for all plugin and theme developers to tackle rising security threats, effective October 1, 2024.

article thumbnail

These Linux distributions are best for developers - here's why

Collaboration 2.0

Sure, Linux is a great OS for all sorts of users. But developers need just the right tools to do their jobs - and these 5 distros deliver.

189
189