Mon.Aug 12, 2024

article thumbnail

MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

The Last Watchdog

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024 : GenAI is very much in the mix as a potent X-factor in cybersecurity. Related: Prioritizing digital resiliency I spoke with over three dozen cybersecurity solution providers. Some of the more intriguing innovations had to do with leveraging GenAI/LLM-equipped chatbots as proprietary force multipliers.

article thumbnail

US Charges 2 for Running Russian-Speaking Carder Forum

Data Breach Today

Unemployed Defendants Allegedly Bought Luxury Car, Lived in Beach House U.S. law enforcement charged two alleged masterminds of one of the largest Russian-language cybercrime forums after they claimed asylum inside the United States and lived a luxurious life in Miami. Federal agents obtained an image of the server hosting the forum.

162
162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A FreeBSD flaw could allow remote code execution, patch it now!

Security Affairs

FreeBSD Project maintainers addressed a high-severity flaw in OpenSSH that could allow remote code execution with elevated privileges. The maintainers of the FreeBSD Project have released urgent security updates to address a high-severity flaw, tracked as CVE-2024-7589, (CVSS score of 7.4) in OpenSSH. A remote attacker could exploit the vulnerability to execute arbitrary code with elevated privileges.

IT 143
article thumbnail

X's Grok AI Plan Invites More European Scrutiny

Data Breach Today

Rights Group NOYB Files 9 Complaints Against X for Privacy Violation Social media platform X faces the prospect of more legal scrutiny in Europe over its decision to feed customer data into its Grok artificial intelligence system after it agreed Thursday to suspend harvesting tweets as training data. NOYB said the company it is still likely violating privacy law.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

EastWind campaign targets Russian organizations with sophisticated backdoors

Security Affairs

A campaign tracked as EastWind is targeting Russian government and IT organizations with PlugY and GrewApacha Backdoors. In late July 2024, Kaspersky researchers detected a series of targeted cyberattacks against the Russian government and IT organizations. Kaspersky named this campaign has EastWind. Threat actors sent phishing emails with RAR archive attachments containing a Windows shortcut to install malware.

Libraries 141

More Trending

article thumbnail

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE

Security Affairs

Microsoft found four bugs in OpenVPN that could be chained to achieve remote code execution and local privilege escalation. During the Black Hat USA 2024 conference, Microsoft researchers disclosed multiple medium-severity bugs in the open-source project OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE).

article thumbnail

Hacker Stories: A Facebook Physical Threat

KnowBe4

Most people take a lot of measures to secure their online bank accounts, credit card accounts, retirement accounts and other financial accounts. This often means enabling some form of multi-factor authentication (MFA), using a strong password, or other means of keeping money safe.

Passwords 130
article thumbnail

News alert: Criminal IP and Maltego team up to broaden threat intelligence data search

The Last Watchdog

Torrance, Calif., Aug. 12, 2024, CyberNewsWire — Criminal IP , an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with Maltego , a global all-in-one investigation platform that specializes in visualized analysis of combined cyber data. This collaboration integrates Criminal IP’s comprehensive database of malicious IPs, domains, and CVEs directly into Maltego’s unified user interface and adds Criminal IP to Malte

Phishing 130
article thumbnail

Taxonomy of Generative AI Misuse

Schneier on Security

Interesting paper: “ Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data “: Generative, multimodal artificial intelligence (GenAI) offers transformative potential across industries, but its misuse poses significant risks. Prior research has shed light on the potential of advanced AI systems to be exploited for malicious purposes.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

EU Governments Sign-off Proposed Reforms to GDPR Procedural Rules and Council Reaches Common Member States’ Position

Data Matters

On 24 May 2024, the Council of the European Union (the “Council”) released new details of a proposed reform of the General Data Protection Regulation’s (“GDPR”) procedural rules, which representatives of EU national governments approved on 29 May 2024. On 13 June 2024, the Council issued a press release detailing its agreed common Member States’ position that maintains the general thrust of the original proposed reforms, but which seeks to: (i) introduce clearer timelines; (ii) improve efficienc

GDPR 117
article thumbnail

Why CrowdStrike Is Eyeing a $1B Buy of Patching Firm Action1

Data Breach Today

CrowdStrike Probes Largest Deal in History Weeks After Causing Massive IT Outage CrowdStrike is in talks to acquire Houston-based patch management and vulnerability remediation startup Action1 for close to $1 billion, co-founder and CEO Alex Vovk told employees in an email Wednesday. This would be the largest acquisition in the endpoint security vendor's history.

Security 113
article thumbnail

Intel chip bug FAQ: Which PCs are affected, how to get the patch, and everything else you need to know

Collaboration 2.0

Does your desktop PC have a 13th- or 14th-generation Raptor Lake CPU? Read this now. Don't know your CPU? Then you really need to read this.

98
article thumbnail

How Cybersecurity Can Save Critical Infrastructure

Thales Cloud Protection & Licensing

How Cybersecurity Can Save Critical Infrastructure josh.pearson@t… Tue, 08/13/2024 - 07:05 Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS). Motivated by various factors – from monetary to geopolitical – malevolent actors seek to disrupt critical operations.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Disposing of an old Windows laptop? Here's the safest way to erase your personal data (for free!)

Collaboration 2.0

Before you sell, give away, or otherwise dispose of an old laptop, make sure your personal files are thoroughly deleted and unrecoverable. Everything you need is available as part of Windows.

article thumbnail

Embracing digital inclusivity

OpenText Information Management

In our increasingly interconnected digital world, accessible documents are no longer optional—they're essential for fostering inclusive communication and breaking down barriers for individuals with diverse abilities. As we approach 2025, the implementation deadline for the European Accessibility Act (EAA), ensuring digital independence for all has become a critical priority for organizations worldwide.

article thumbnail

Nvidia will train 100,000 California residents on AI in a first-of-its-kind partnership

Collaboration 2.0

The program aims to open up new career pathways that could benefit students and California, too. Here's how it works.

IT 76
article thumbnail

How HID and Microsoft Are Making Passkeys More Accessible to Enterprise

HID Global

Don’t leave your organization vulnerable with weak passwords. Implement passkeys across your enterprise with HID® & Microsoft.

Access 52
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

'Logical, beautiful, perfect' WordStar rises again: How you can type faster with this old tech

Collaboration 2.0

Older than the floppy drive and long favored by writers and typists alike, WordStar makes a comeback thanks to the efforts of this Hugo-winning sci-fi author. Here's how to try it.

IT 76
article thumbnail

Enhancing HIPAA Compliance With Biometrics: A Guide for Healthcare Providers

HID Global

Strengthen healthcare HIPAA compliance with advanced biometric technologies. Explore effective solutions to protect patient data & improve security for healthcare providers.

article thumbnail

How to use AI to create a logo for free

Collaboration 2.0

Need a logo fast? Generative AI can do that - here's how to get started.

76
article thumbnail

Trump Leak Likely a Harbinger of More Interference to Come

Data Breach Today

Current Foreign Disinformation Attempt Using Leaked Documents Branded 'Incompetent' Cybersecurity experts are urging election campaign officials and policymakers to revisit their defenses in the wake of the Trump campaign confirming it was breached and that internal documents were stolen and leaked as part of an apparent foreign disinformation campaign.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

WordStar lives! What's behind this retro-techno revival, and how to try it for yourself

Collaboration 2.0

WordStar, the word processor from 1978, which last saw a new version in 1994, is finding new life.

IT 76
article thumbnail

Worried about the Windows BitLocker recovery bug? 6 things you need to know

Collaboration 2.0

Microsoft alerted its customers to a frightening bug in Windows 11. What are the chances you'll encounter that bug, and what should you do to prepare? I have the answers here.

IT 76
article thumbnail

System76's new COSMIC Linux desktop is out of this world

Collaboration 2.0

One of the most popular sellers of Linux desktops and laptops has finally released the alpha version of its new COSMIC desktop and it's something special.

IT 75
article thumbnail

The best services for deleting yourself from the internet in 2024

Collaboration 2.0

Erasing yourself from the internet isn't an easy or quick process, but our recommended data removal services take the legwork out of the journey.

75
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Upgrade to Windows 11 Pro license for $20 - the lowest price we've seen

Collaboration 2.0

Buy a lifetime Windows 11 Pro license with more productivity features that will help you get things done -- and it's 89% off with this deal.

IT 75
article thumbnail

How to use Apple Maps on the web (and 3 reasons why you should)

Collaboration 2.0

Think about it. Wouldn't you rather research your route on a bigger screen?

IT 75
article thumbnail

Grab a Microsoft Office 2021 for Windows license for $40

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 79% off right now (there's a deal for a Mac version, too).

75