Tue.Jul 30, 2024

article thumbnail

A crafty phishing campaign targets Microsoft OneDrive users

Security Affairs

Researchers detected a sophisticated phishing campaign targeting Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a sophisticated phishing campaign targeting Microsoft OneDrive users. Threat actors rely on social engineering tactics to trick users into executing a PowerShell script, which leads to their systems being compromised.

Phishing 357
article thumbnail

Study: Average Cost of a Data Breach Rises to $4.9 Million

Data Breach Today

Involving Law Enforcement After Ransomware Attacks Drives Down Costs, Study Finds Data breaches continue to grow more costly, with the average cost of a breach hitting an all-time high of $4.9 million, driven by greater business disruption and post-breach customer support and remediation expenses, according to the latest annual Cost of a Data Breach Report from IBM.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds VMware ESXi bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a VMware ESXi bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an authentication bypass VMware ESXi vulnerability, tracked as CVE-2024-37085 (CVSS score of 6.8), to its Known Exploited Vulnerabilities (KEV) catalog.

IT 323
article thumbnail

Ransomware Gangs Exploit VMware ESXi Flaw

Data Breach Today

Bug Allows Attackers to Add New Users to a Group With Full Admin Privileges Ransomware hackers discovered a way to gain full administrative privileges on VMware ESXi hypervisors connected to Microsoft's Active Directory, a finding that resulted in extortion demands from cybercriminals, including Storm-0506, Storm-1175, Octo Tempest and Manatee Tempest.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Mandrake Android spyware found in five apps in Google Play with over 32,000 downloads since 2022

Security Affairs

A new version of the Mandrake Android spyware has been found in five apps on Google Play, which have been downloaded over 32,000 times since 2022. Researchers from Kaspersky discovered a new version of the Mandrake Android spyware in five app on Google Play, totaling over 32,000 downloads between 2022 and 2024. Researchers from Bitdefender discovered the high-sophisticated Android spyware Mandrake in 2022, while investigating highly targeted attacks against specific devices.

Libraries 314

More Trending

article thumbnail

SideWinder phishing campaign targets maritime facilities in multiple countries

Security Affairs

The APT group SideWinder launched a new espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. SideWinder (also known as Razor Tiger, Rattlesnake, and T-APT-04) has been active since at least 2012, the group mainly targeted Police, Military, Maritime, and the Naval forces of Central Asian countries. In the 2022 attacks, the threat actors also targeted departments of Foreign Affairs, Scientific and Defence organisations, Aviation, IT industry, and Le

Phishing 301
article thumbnail

Judge Allows Lawsuit Against EHR Vendor in Hack to Proceed

Data Breach Today

Several Claims Dismissed, But Other Allegations in Breach Case Get a Green Light A federal judge has dismissed several claims but has given the green light for plaintiffs to move forward with other allegations in a proposed class action filed against electronic health records vendor NextGen in the aftermath of a 2023 ransomware attack that affected about 1 million people.

article thumbnail

Changing these 5 settings can instantly improve your TV picture quality

Collaboration 2.0

With a bit of patience and experimentation, you can adjust your TV's basic settings for a better viewing experience.

246
246
article thumbnail

A Senate Bill Would Radically Improve Voting Machine Security

WIRED Threat Level

This year’s Intelligence Authorization Act would mandate penetration testing for federally certified voting machines and allow independent researchers to work on exposing vulnerabilities.

Security 198
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

My new favorite rugged smartwatch is not made by Apple or OnePlus

Collaboration 2.0

Packed with cutting-edge features, enhanced durability, and a sleek design, the Galaxy Watch Ultra sets a new standard for a Wear OS device.

246
246
article thumbnail

UK ICO Reprimands Electoral Commission for 2021 Hack

Data Breach Today

Hackers Sued ProxyShell to Compromise Commission Systems The British data regulator reprimanded the U.K.'s Electoral Commission for its failure to prevent a 2021 cyberattack that resulted in the exposure of millions of voter records. Hackers breached the Electoral Commission's networks after exploiting the ProxyShell vulnerability.

IT 182
article thumbnail

Apple Vision Pro FAQ: Price, features, hands-on insights, and everything you need to know

Collaboration 2.0

Is Apple's spatial computing headset worth the price? Can you try it before buying? ZDNET answers all your burning questions.

IT 246
article thumbnail

Meta Prompt Guard Is Vulnerable to Prompt Injection Attacks

Data Breach Today

Researchers Add Spaces in 'Ignore Previous Instructions' Prompt to Bypass Security A machine learning model that Meta released last week to prevent prompt injection attacks is vulnerable to prompt injection attacks, researchers said. There is as yet no definitive solution to the problems of jailbreaking and prompt injection attacks.

Security 173
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The square-shaped robot vacuum that kept my floors free of muddy paw prints this summer

Collaboration 2.0

The Ecovacs Deebot X2 Omni is a jack-of-all-trades robot vacuum mop with a unique square form that sets it apart from the competition.

IT 245
article thumbnail

How Cribl Lake Transformed IT and Security Data Management

Data Breach Today

CEO Clint Sharp on Launching a Turnkey Data Lake Offering, AI Copilot Integration Cribl CEO Clint Sharp introduces Cribl Lake, a turnkey data lake solution that addresses common data storage challenges. Sharp highlights the benefits of seamless integration with Cribl Cloud and the use of AI for enhanced data management and security for IT leaders.

IT 162
article thumbnail

This Linux distro is inspired by Windows' UI - and it works surprisingly well

Collaboration 2.0

Windows 11 is a divisive operating system, but it does get some things right. If you like the way Windows looks but you want to use Linux, Deepin is the way to go.

IT 189
article thumbnail

Account Takeover Fraud Declines in Financial Services

Data Breach Today

Tighter Security Controls Help Stop Fraud, But Fake IDs and Web Scraping Are Rising Account takeover fraud in the financial services industry is declining in contrast with other industries such as retail and hospitality. Researchers at Human Security attribute the nearly 50% reduction to one of the basic controls in cybersecurity: multifactor authentication.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

TV running slow? Changing these 6 settings can instantly speed up performance

Collaboration 2.0

Try these quick fixes to eliminate lag and juddering from your TV viewing experience.

189
189
article thumbnail

Human Risk and Email Security: New Mimecast CEO's Vision

Data Breach Today

Marc Van Zadelhoff Highlights Email Security Enhancements and International Growth New Mimecast CEO Marc van Zadelhoff talks about the integration of Elevate to manage human risk and the company's strategy for technological innovation. He also details plans for expanding Mimecast's presence in non-English-speaking markets and enhancing channel partnerships.

Risk 130
article thumbnail

The best budget gaming laptops: Expert tested

Collaboration 2.0

We found the best budget gaming laptops from Lenovo, MSI, and more (starting at just $550) to help you find the best fit for your wallet and your game library.

Libraries 190
article thumbnail

New Phishing Kit Uses Voice Call Generator to Impersonate Spanish Banks

KnowBe4

A new cybercriminal group is selling “a sophisticated AI-powered phishing-as-a-service platform” that targets 36 Spanish banks, according to researchers at Group-IB.

Phishing 128
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

The best gaming PCs of 2024: Expert tested

Collaboration 2.0

We tested the best gaming PCs from Alienware, Lenovo, HP, and more to help you find the right one for your budget and library.

Libraries 190
article thumbnail

Providing Security Updates to Automobile Software

Schneier on Security

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight years after their purchase date. Samsung and Google provide Android OS updates and security updates for seven years. Apple halts servicing products seven years after they stop selling them. That might not cut it in the auto world, where the average age of cars on US roads is only going up.

Security 127
article thumbnail

Microsoft 365 goes down - again

Collaboration 2.0

It's not just you (or Crowdstrike) - Microsoft 365 really is going through an outage. Here's what we know.

IT 190
article thumbnail

Dark Angels Ransomware Group Scores Record-Breaking $75 Million Payday

KnowBe4

In the ever-evolving world of cybercrime, ransomware attacks continue to be a lucrative business for cybercriminals.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

One of the best budget Android tablets I've tested is not made by Samsung or TCL

Collaboration 2.0

If you want a tablet for normal use and entertainment, the $169 AGM Pad P2 gets my recommendation.

190
190
article thumbnail

Organizations Prepare for More Evolved AI-Based Cyber Attacks as Deepfakes Become Top Concern

KnowBe4

New data on how the threat of AI in cyber crime is being seen as a growing risk provides insight into how organizations are shifting from reaction to prevention.

Risk 122
article thumbnail

You'll soon be able to manage your Android device from the Windows 11 file manager

Collaboration 2.0

If you're an Android and Windows user, you'll be relieved to know that your PC will soon let you wirelessly browse the files on your phone as if it were a drive connected to your computer.

IT 190