Mon.Aug 12, 2024

article thumbnail

A FreeBSD flaw could allow remote code execution, patch it now!

Security Affairs

FreeBSD Project maintainers addressed a high-severity flaw in OpenSSH that could allow remote code execution with elevated privileges. The maintainers of the FreeBSD Project have released urgent security updates to address a high-severity flaw, tracked as CVE-2024-7589, (CVSS score of 7.4) in OpenSSH. A remote attacker could exploit the vulnerability to execute arbitrary code with elevated privileges.

IT 351
article thumbnail

MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

The Last Watchdog

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024 : GenAI is very much in the mix as a potent X-factor in cybersecurity. Related: Prioritizing digital resiliency I spoke with over three dozen cybersecurity solution providers. Some of the more intriguing innovations had to do with leveraging GenAI/LLM-equipped chatbots as proprietary force multipliers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EastWind campaign targets Russian organizations with sophisticated backdoors

Security Affairs

A campaign tracked as EastWind is targeting Russian government and IT organizations with PlugY and GrewApacha Backdoors. In late July 2024, Kaspersky researchers detected a series of targeted cyberattacks against the Russian government and IT organizations. Kaspersky named this campaign has EastWind. Threat actors sent phishing emails with RAR archive attachments containing a Windows shortcut to install malware.

Libraries 342
article thumbnail

Intel chip bug FAQ: Which PCs are affected, how to get the patch, and everything else you need to know

Collaboration 2.0

Does your desktop PC have a 13th- or 14th-generation Raptor Lake CPU? Read this now. Don't know your CPU? Then you really need to read this.

246
246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE

Security Affairs

Microsoft found four bugs in OpenVPN that could be chained to achieve remote code execution and local privilege escalation. During the Black Hat USA 2024 conference, Microsoft researchers disclosed multiple medium-severity bugs in the open-source project OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE).

More Trending

article thumbnail

US Charges 2 for Running Russian-Speaking Carder Forum

Data Breach Today

Unemployed Defendants Allegedly Bought Luxury Car, Lived in Beach House U.S. law enforcement charged two alleged masterminds of one of the largest Russian-language cybercrime forums after they claimed asylum inside the United States and lived a luxurious life in Miami. Federal agents obtained an image of the server hosting the forum.

162
162
article thumbnail

Nvidia will train 100,000 California residents on AI in a first-of-its-kind partnership

Collaboration 2.0

The program aims to open up new career pathways that could benefit students and California, too. Here's how it works.

IT 190
article thumbnail

X's Grok AI Plan Invites More European Scrutiny

Data Breach Today

Rights Group NOYB Files 9 Complaints Against X for Privacy Violation Social media platform X faces the prospect of more legal scrutiny in Europe over its decision to feed customer data into its Grok artificial intelligence system after it agreed Thursday to suspend harvesting tweets as training data. NOYB said the company it is still likely violating privacy law.

article thumbnail

'Logical, beautiful, perfect' WordStar rises again: How you can type faster with this old tech

Collaboration 2.0

Older than the floppy drive and long favored by writers and typists alike, WordStar makes a comeback thanks to the efforts of this Hugo-winning sci-fi author. Here's how to try it.

IT 190
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Tech School Hack Affects Health, Personal Data of 209,000

Data Breach Today

East Valley Institute of Technology Is One of LockBit's Education Sector Victims An Arizona-based technical school is notifying nearly 209,000 current and former students, parents and faculty that their personal, health and financial information was potentially compromised in a LockBit attack earlier this year. The ransomware hack is one of many hits in the education sector.

article thumbnail

System76's new COSMIC Linux desktop is out of this world

Collaboration 2.0

One of the most popular sellers of Linux desktops and laptops has finally released the alpha version of its new COSMIC desktop and it's something special.

IT 189
article thumbnail

Hacker Stories: A Facebook Physical Threat

KnowBe4

Most people take a lot of measures to secure their online bank accounts, credit card accounts, retirement accounts and other financial accounts. This often means enabling some form of multi-factor authentication (MFA), using a strong password, or other means of keeping money safe.

Passwords 130
article thumbnail

How to use AI to create a logo for free

Collaboration 2.0

Need a logo fast? Generative AI can do that - here's how to get started.

190
190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

News alert: Criminal IP and Maltego team up to broaden threat intelligence data search

The Last Watchdog

Torrance, Calif., Aug. 12, 2024, CyberNewsWire — Criminal IP , an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with Maltego , a global all-in-one investigation platform that specializes in visualized analysis of combined cyber data. This collaboration integrates Criminal IP’s comprehensive database of malicious IPs, domains, and CVEs directly into Maltego’s unified user interface and adds Criminal IP to Malte

Phishing 130
article thumbnail

WordStar lives! What's behind this retro-techno revival, and how to try it for yourself

Collaboration 2.0

WordStar, the word processor from 1978, which last saw a new version in 1994, is finding new life.

IT 190
article thumbnail

Taxonomy of Generative AI Misuse

Schneier on Security

Interesting paper: “ Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data “: Generative, multimodal artificial intelligence (GenAI) offers transformative potential across industries, but its misuse poses significant risks. Prior research has shed light on the potential of advanced AI systems to be exploited for malicious purposes.

article thumbnail

Worried about the Windows BitLocker recovery bug? 6 things you need to know

Collaboration 2.0

Microsoft alerted its customers to a frightening bug in Windows 11. What are the chances you'll encounter that bug, and what should you do to prepare? I have the answers here.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

EU Governments Sign-off Proposed Reforms to GDPR Procedural Rules and Council Reaches Common Member States’ Position

Data Matters

On 24 May 2024, the Council of the European Union (the “Council”) released new details of a proposed reform of the General Data Protection Regulation’s (“GDPR”) procedural rules, which representatives of EU national governments approved on 29 May 2024. On 13 June 2024, the Council issued a press release detailing its agreed common Member States’ position that maintains the general thrust of the original proposed reforms, but which seeks to: (i) introduce clearer timelines; (ii) improve efficienc

GDPR 117
article thumbnail

The best services for deleting yourself from the internet in 2024

Collaboration 2.0

Erasing yourself from the internet isn't an easy or quick process, but our recommended data removal services take the legwork out of the journey.

189
189
article thumbnail

Why CrowdStrike Is Eyeing a $1B Buy of Patching Firm Action1

Data Breach Today

CrowdStrike Probes Largest Deal in History Weeks After Causing Massive IT Outage CrowdStrike is in talks to acquire Houston-based patch management and vulnerability remediation startup Action1 for close to $1 billion, co-founder and CEO Alex Vovk told employees in an email Wednesday. This would be the largest acquisition in the endpoint security vendor's history.

Security 113
article thumbnail

Microsoft to kill off its Paint 3D app soon: Here's what that means for current users

Collaboration 2.0

Paint 3D's impending demise was revealed through a banner that appears for some people in the app itself. But if you're a fan, there is some good news.

IT 189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Embracing digital inclusivity

OpenText Information Management

In our increasingly interconnected digital world, accessible documents are no longer optional—they're essential for fostering inclusive communication and breaking down barriers for individuals with diverse abilities. As we approach 2025, the implementation deadline for the European Accessibility Act (EAA), ensuring digital independence for all has become a critical priority for organizations worldwide.

article thumbnail

Upgrade to Windows 11 Pro license for $20 - the lowest price we've seen

Collaboration 2.0

Buy a lifetime Windows 11 Pro license with more productivity features that will help you get things done -- and it's 89% off with this deal.

IT 189
article thumbnail

How HID and Microsoft Are Making Passkeys More Accessible to Enterprise

HID Global

Don’t leave your organization vulnerable with weak passwords. Implement passkeys across your enterprise with HID® & Microsoft.

Access 52
article thumbnail

Google Meet will take notes for you now, thanks to AI

Collaboration 2.0

'Take notes for me' aims to keep track of key meeting points so you can stay focused - but only some users can access it.

Access 189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Enhancing HIPAA Compliance With Biometrics: A Guide for Healthcare Providers

HID Global

Strengthen healthcare HIPAA compliance with advanced biometric technologies. Explore effective solutions to protect patient data & improve security for healthcare providers.

article thumbnail

How to use Apple Maps on the web (and 3 reasons why you should)

Collaboration 2.0

Think about it. Wouldn't you rather research your route on a bigger screen?

IT 189
article thumbnail

How Cybersecurity Can Save Critical Infrastructure

Thales Cloud Protection & Licensing

How Cybersecurity Can Save Critical Infrastructure josh.pearson@t… Tue, 08/13/2024 - 07:05 Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS). Motivated by various factors – from monetary to geopolitical – malevolent actors seek to disrupt critical operations.