Fri.Sep 20, 2024

article thumbnail

Tor Project responded to claims that law enforcement can de-anonymize Tor users

Security Affairs

The maintainers of the Tor Project have responded to claims that German police have devised a technique to deanonymize users. The maintainers of the Tor Project have responded to claims that German law enforcement has devised a technique to deanonymize its users. According to German media, law enforcement has infiltrated the anonymizing network and in at least one case they unmasked a criminal.

Privacy 352
article thumbnail

ENISA Warns About Hacktivist, Ransomware Crossover

Data Breach Today

Hacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says Ransomware hacks and self-declared hacktivist denial-of-services attacks were the most prolific threat to European Union members over the 12-month period ending in June, the EU cyber agency warned, adding that the nexus between nation-state hackers and hacktivist groups poses an emerging threat.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine bans Telegram for government agencies, military, and critical infrastructure

Security Affairs

Ukraine’s NCCC banned the Telegram app for government agencies, military, and critical infrastructure, due to national security concerns. Ukraine’s National Coordination Centre for Cybersecurity (NCCC) has banned the Telegram messaging app on government agencies, military, and critical infrastructure, due to national security concerns. The ban does not affect Ukrainian citizens.

Military 341
article thumbnail

Training AI on Social Media: What Could Go Wrong?

Data Breach Today

Unfiltered Training Data Can Cause Safety Issues, Spread Misinformation LinkedIn this week joined its peers in using social media posts as training data for AI models, raising concerns of trustworthiness and safety. The question for AI developers is not whether companies use the data or even whether it is fair to do so - it is whether the data is reliable or not.

IT 276
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

Security Affairs

Microsoft warns that financially motivated threat actor Vanilla Tempest is using INC ransomware in attacks aimed at the healthcare sector in the U.S. Microsoft Threat Intelligence team revealed that a financially motivated threat actor, tracked as Vanilla Tempest (formerly DEV-0832 ) is using the INC ransomware for the first time to target the U.S. healthcare sector.

More Trending

article thumbnail

US DoJ charged two men with stealing and laundering $230 Million worth of cryptocurrency

Security Affairs

The US DoJ arrested two people and charged them with stealing and laundering more than $230 million worth of cryptocurrency. The U.S. DoJ arrested two people, Malone Lam (20) (aka “Greavys,” “Anne Hathaway,” and “$$$”) and Jeandiel Serrano (21) (aka “Box,” “VersaceGod,” and “@SkidStar”) in Miami and charged them with stealing more than $230 million worth of cryptocurrency.

Access 323
article thumbnail

iPhone 16 Pro: Upgrading from iPhone 13 Pro or earlier? Your list of new features is impressive

Collaboration 2.0

The average iPhone upgrader has at least a 3 year-old phone. If you're coming from an iPhone 13 Pro or earlier, here's your list of upgrades for 2024.

246
246
article thumbnail

U.S. CISA adds new Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Ivanti Cloud Services Appliance a path traversal vulnerability CVE-2024-8190 (CVSS score of 9.4) to its Known Exploited Vulnerabilities (KEV) catalog.

Cloud 317
article thumbnail

Protecting Your Data and Company From Cyberthreats

Data Breach Today

Why Cybersecurity Is a Public Imperative Data is one of the most valuable assets in today's digital age. Cyberthreats come in many forms, such as phishing attacks, ransomware, data breaches and malware infections, and failing to protect your data can cause severe financial, reputational and operational damage.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

UNC1860 provides Iran-linked APTs with access to Middle Eastern networks

Security Affairs

Iran-linked APT group UNC1860 is operating as an initial access facilitator that provides remote access to Middle Eastern Networks. Mandiant researchers warn that an Iran-linked APT group, tracked as UNC1860, is operating as an initial access facilitator that provides remote access to target networks in the Middle East. UNC1860 is linked to Iran’s Ministry of Intelligence and Security (MOIS), the APT specializes in using customized tools and passive backdoors to gain persistent access to h

Access 311
article thumbnail

Every iPhone model compatible with Apple's iOS 18 (and which ones aren't)

Collaboration 2.0

The new software version features AI enhancements to popular apps, better home screen customization, improved Siri, and more.

190
190
article thumbnail

ISMG Editors: How to Survive a Major Ransomware Attack

Data Breach Today

CyberEdBoard Members and ISMG Editors on Incident Response, AI and Defense Trends This week, CyberEdBoard members Jon Staniforth and Helmut Spöcker joined ISMG editors to unpack the hot topics at ISMG's London Cybersecurity Summit 2024, including ransomware lessons learned, AI trends and the growing importance of continuous learning and resilience in the cybersecurity industry.

article thumbnail

LinkedIn is training AI with your personal data. Here's how to stop it

Collaboration 2.0

Your information and how you interact with LinkedIn is helping to train AI. If you don't want that to happen, you can opt out and check what it already knows.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Who Will Take the Lead in Setting Healthcare AI Regulations?

Data Breach Today

It's yet to be determined whether a handful of states or the federal government will lead the charge in adopting comprehensive regulations involving the use of artificial intelligence in healthcare, said regulatory attorney Betsy Hodge, a partner in law firm Akerman.

article thumbnail

Upgrading to MacOS Sequoia? Here's why you may want to hold off

Collaboration 2.0

The new version of Apple's MacOS is breaking the functionality of security products from Microsoft, CrowdStrike, SentinelOne, and other vendors. But that's not all.

Security 189
article thumbnail

London Cybersecurity Summit: Building Cyber Resilience

Data Breach Today

Security Leaders Explored Trends in Identity Threats, Post-Brexit Compliance and AI At the annual Cybersecurity Summit: London, Information Security Media Group recently brought together top cybersecurity professionals, executives and thought leaders to find solutions to the latest threats, identity-related weaknesses and emerging risks posed by AI technology.

article thumbnail

Buy a Microsoft Office 2019 license for Windows or Mac for $25

Collaboration 2.0

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 89% off.

Access 189
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Delay Upgrading to macOS Sequoia, Security Experts Recommend

Data Breach Today

Not Yet Compatible: Many Third-Party Endpoint Security, Authentication, VPN Tools Multiple makers of third-party Apple security tools, including CrowdStrike and SentinelOne, are warning users not to upgrade to the new macOS 15 Sequoia, pending needed OS bug fixes. Users have also reported seeing problems with third-party VPNs crashing and single sign-on tools failing.

Security 162
article thumbnail

5 Linux commands I use to keep my device running smoothly

Collaboration 2.0

Knowing what's going on under the hood of your Linux OS is essential for optimizing performance. These commands will give you insight into system resources and processes.

190
190
article thumbnail

Clever Social Engineering Attack Using Captchas

Schneier on Security

This is really interesting. It’s a phishing attack targeting GitHub users, tricking them to solve a fake Captcha that actually runs a script that is copied to the command line. Clever.

Phishing 123
article thumbnail

4 ways to become a more effective business leader

Collaboration 2.0

This expert explains what makes an excellent manager and, more importantly, how to craft an effective team environment.

189
189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Phishing Attacks Abuse Content Creation and Collaboration Platforms

KnowBe4

Researchers at Barracuda have observed an increase in phishing attacks that abuse popular content creation and collaboration platforms. These include online graphic design platforms and document-sharing services widely used by educational institutions and businesses.

article thumbnail

6 iOS 18 settings I changed immediately - and why you should too

Collaboration 2.0

Reviewing these iPhone settings under Apple's latest iOS can improve privacy and battery life and even save you money. Here's how.

Privacy 189
article thumbnail

Online Scams Are Shortening Their Cycles and Making More Money

KnowBe4

New analysis of blockchain activity shows scammers are needing less time to be successful at obtaining crypto payments, and are seeing higher payoffs.

article thumbnail

Reports of the iPhone 16 Pro's 48-megapixel camera being 'fake' have been greatly exaggerated. Here's why

Collaboration 2.0

The fact of the matter is that all megapixels are not created equal.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

California and artificial intelligence watermarking law

Data Protection Report

On September 19, 2024, California enacted another law relating to artificial intelligence, this time relating to watermarking. The new law ( SB 942 ) requires making certain AI detection tools available at no cost to users. The new law does not take effect until January 1, 2026. AI Detection Tools (SB 942) This bill, the California AI Transparency Act, will impose a series of obligations on GenAI providers related to the creation of AI content utilizing their systems.

article thumbnail

I upgraded to the iPhone 16 Plus - here's why it's the model most people should buy

Collaboration 2.0

With new hardware that brings added utility, a chipset fit for Apple Intelligence, and a winning design, justifying the standard iPhone just got easier.

IT 189
article thumbnail

How to use Jamf Teacher to restrict the Calculator app

Jamf

Learn how Jamf Teacher helps educators manage the new Calculator app in iPadOS 18 by restricting access during lessons to keep students focused on learning.