Tue.Aug 27, 2024

article thumbnail

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Krebs on Security

Malicious hackers are exploiting a zero-day vulnerability in Versa Director , a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon , a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

China-linked APT group Volt Typhoon exploited a zero-day flaw in Versa Director to upload a custom webshell in target networks. China-linked APT Volt Typhoon exploited a zero-day vulnerability, tracked as CVE-2024-39717 , in Versa Director, to deploy a custom webshell on breached networks. Versa Director is a centralized management and orchestration platform used primarily by Internet Service Providers (ISPs) and Managed Service Providers (MSPs) to manage and monitor Software-Defined Wide Area N

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Hackers Steal Medical Insurance Data of 1M People

Data Breach Today

Young Consulting Says Health Data Exposed; Ransomware Group Leaked Stolen Data Young Consulting, which develops software for the stop-loss insurance market, is notifying 1 million individuals that their personal information was stolen earlier this year in a hack attack. The BlackSuit ransomware group, a rebrand of Royal, subsequently claimed credit and leaked stolen data.

Insurance 305
article thumbnail

Researchers unmasked the notorious threat actor USDoD

Security Affairs

CrowdStrike researchers have identified the notorious hacker USDoD who is behind several high-profile data leaks. The notorious hacker USDoD (aka EquationCorp), who is known for high-profile data leaks, is a man from Brazil, according to a CrowdStrike investigation. The news was first reported by the Brazilian website TecMundo who received a CrowdStrike report via an anonymous source.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Amazon Echo Studio review: My buying advice after testing with the Sonos Era

Collaboration 2.0

Amazon's flagship Echo device is one of the best smart speakers we've tested, and the $200 price tag can still be justified two years after release.

246
246

More Trending

article thumbnail

I gave away my Kindle and iPad within hours of testing this tablet

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G is my new favorite e-reader for its versatile display and value.

IT 246
article thumbnail

AI Readiness Assessment: Preparing Your Organization's Unstructured Data for the Future

AIIM

I recently had the pleasure of hosting a conversation with Rob Bogue, the core author of AIIM's new resource " Organizational Readiness for Generative AI: Leveraging Unstructured Data for Success." This assessment focuses on how to prepare unstructured data for AI implementation. In this blog post, I'll share key insights from our discussion and highlight the importance of this tool for information management professionals.

article thumbnail

I thought I knew about rugged tablets, until I tested a Getac running Windows

Collaboration 2.0

Getac has launched its latest rugged tablet with upgraded internal components, making it one of the best options if you work in challenging environments.

IT 246
article thumbnail

Tech Orgs: UN Cybercrime Treaty Will Worsen Global Security

Data Breach Today

Cybersecurity Tech Accord Urges Nations to Reject the Treaty A coalition of technology organizations says a draft United Nations cybercrime treaty would facilitate crime and is urging nations to reject the treaty. "The best option now is for a majority of the U.N.'s member states to decide not to adopt the convention," said Nick Ashton-Hart.

Security 182
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

I supersized my Surface Pro storage in 7 easy steps - and saved hundreds of dollars

Collaboration 2.0

Double? Quadruple? Nah, I OCTUPLED my Surface Pro storage. If you can use a screwdriver, you can do it, too. Here's how.

IT 246
article thumbnail

McLaren Health: IT Operations Fully Back Online Post-Attack

Data Breach Today

Restoration Completed Days Ahead of Schedule But Still a Lot of Catch-Up Work to Do McLaren Health says its IT systems are fully restored a few days earlier than expected, following an Aug. 6 ransomware attack that disrupted clinical and administrative operations at its 13 hospitals and other facilities. The Michigan-based entity had expected the recovery to last through August.

IT 173
article thumbnail

Grab this Microsoft Office Pro and Windows 11 Pro bundle for $50 - the lowest price of the year

Collaboration 2.0

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro at 88% off for a limited time.

Access 246
article thumbnail

Patelco Breach Affected 726,000 Customers, Employees

Data Breach Today

Ransomware Attackers Had Access to Data for More Than a Month Hackers stole the data of more 700 million current and former customers and employees of Patelco Credit Union in a monthlong ransomware attack detected in June, the California financial institution said. Not all 726,000 individuals victimized in the breach were equally affected.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Pixel 9 Pro XL users report charging problems and a strange camera tilt

Collaboration 2.0

Google says 'a known bug' is preventing some Pixel 9 Pro XL devices from supporting wireless charging. Here's what you can do while you wait for a patch.

246
246
article thumbnail

Check Point to Buy External Risk Management Vendor Cyberint

Data Breach Today

Acquisition Will Enhance Security Operations, Expand Managed Threat Intel Solutions Check Point plans to purchase an external risk management vendor led by an Israeli intelligence veteran to boost its SOC and managed threat intelligence capabilities. The proposed acquisition of Cyberint will make it easier for companies to defend against both internal and external cyberthreats.

Risk 162
article thumbnail

The best Labor Day 2024 deals: Shop Amazon, Walmart, Best Buy, and more

Collaboration 2.0

Labor Day weekend is almost here, and there are already tons of great deals on headphones, TVs, smart home devices, and more that you can grab across major retailers.

Retail 246
article thumbnail

Wipro, AWS Team up to Address Compliance in the Cloud Era

Data Breach Today

Wipro's Siva Vrs on How AI Impacts Regulatory and Compliance Mandates Data integrity, collection, analytics - they all are essential for compliance reporting, and yet each remains a challenge for enterprises across business sectors. Siva Vrs of Wipro discusses the challenge of compliance in the cloud era, including Wipro's partnership with AWS to alleviate cloud compliance challenges.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Amazon's revamped Alexa with generative AI to roll out in October

Collaboration 2.0

Alexa's 'Remarkable' overhaul is now expected a bit later than originally planned. Here's what we know so far.

190
190
article thumbnail

Cribl Gets $319M on $3.5B Valuation to Boost Data Management

Data Breach Today

Google Ventures Leads Round as Sales of Cribl's Vendor-Agnostic Data Tools Grow Cribl has completed a $319 million Series E funding round led by Google Ventures. The financing pushes the company’s valuation to $3.5 billion, with backing from prominent investors as Cribl's data engine technology continues to be rapid adoped by enterprises globally.

Sales 162
article thumbnail

I've tested dozens of power banks, but I haven't seen one quite like this

Collaboration 2.0

The Cuktech P-series power bank may look like something out of a sci-fi movie, but its efficiency, premium build, and durability are very real. And right now, it's on sale on Amazon for $89.

Sales 189
article thumbnail

The Present and Future of TV Surveillance

Schneier on Security

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

Privacy 124
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

The best Android tablets of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best Android tablets from Samsung, Amazon, Google, and more that offer bright displays, customizable storage options, and ecosystem integration.

190
190
article thumbnail

More Carrots and Fewer Sticks

KnowBe4

This blog was co-written by Perry Carpenter and Roger A. Grimes. As I sit in the 2024 Seattle Convene conference this week and listen to speaker after speaker talk about their successful security awareness training programs, one thing is perfectly clear. They all prefer carrots and fewer sticks.

article thumbnail

Microsoft isn't killing Windows Control Panel after all

Collaboration 2.0

The 40-year-old tool still seems to have plenty of life left, though certain settings will continue to be deprecated.

189
189
article thumbnail

Ransomware Recovery Costs Have Doubled for State and Local Governments

KnowBe4

Thirty-four percent of state and local government entities were hit by ransomware in 2024, a new report from Sophos has found. While this is a decrease compared to the attack rate in 2023, the mean cost of recovery for these entities has more than doubled to $2.83 million.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Need a firewall for your 10 Gbps small business or home network? The Firewalla Gold Pro gets my vote

Collaboration 2.0

The Firewalla Gold Pro is a high-performance firewall designed for small offices and power users, offering robust security features, seamless setup, and advanced management through a user-friendly app and web-based subscription service.

Security 189
article thumbnail

How to support threat hunters

OpenText Information Management

Threat hunting is a critical aspect of cybersecurity, involving the proactive search for threats and vulnerabilities within an organization's network. For threat hunters to be effective, they need robust support from their managers and teams. This post will explore three ways that managers and leadership, including CISOs, can best support their threat hunting teams: Address workplace challenges.

Education 120
article thumbnail

How does Claude work? Anthropic reveals its secrets

Collaboration 2.0

In a rare move, the company shared the commands that tell Claude what it can and cannot do when chatting with someone. Here's how each model works.

IT 189