Wed.Jun 05, 2024

article thumbnail

Cisco addressed Webex flaws used to compromise German government meetings

Security Affairs

Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government. In early May, German media outlet Zeit Online revealed that threat actors exploited vulnerabilities in the German government’s implementation of the Cisco Webex software to access internal meetings. In March, the German authorities admitted the hack by Russia-linked actors of a military meeting where participants discussed giving military support to Ukraine. “In early May 2024, Ci

article thumbnail

The Age of the Drone Police Is Here

WIRED Threat Level

A WIRED investigation, based on more than 22 million flight coordinates, reveals the complicated truth about the first full-blown police drone program in the US—and why your city could be next.

Privacy 307
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNN, Paris Hilton, and Sony TikTok accounts hacked via DMs

Security Affairs

A vulnerability in the popular video-sharing platform TikTok allowed threat actors to take over the accounts of celebrities. Threat actors exploited a zero-day vulnerability in the video-sharing platform TikTok to hijack high-profile accounts. The vulnerability resides in the direct messages feature implemented by the platform, reported Forbes. The malware spreads through direct messages within the app and only requires the user to open a message.

Access 332
article thumbnail

ISMG Editors: Opening Day Overview of InfoSec Europe 2024

Data Breach Today

Panel Discusses Trends in Ransomware, Application Security and Generative AI Information Security Media Group editors are live at InfoSecurity Europe Conference 2024 in London with an overview of opening-day activities and hot topics including the latest ransomware trends, software security, election security and artificial intelligence risks.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Zyxel addressed three RCEs in end-of-life NAS devices

Security Affairs

Zyxel Networks released an emergency security update to address critical vulnerabilities in end-of-life NAS devices. Zyxel Networks released an emergency security update to address three critical flaws in some of its NAS devices that have reached end-of-life. An attacker can exploit the vulnerabilities to perform command injection attacks and achieve remote code execution.

More Trending

article thumbnail

Chinese South China Sea Cyberespionage Campaign Unearthed

Data Breach Today

Sophos Finds 3 Clusters of Activity Dating at Least to May 2023 A government agency in a country that has repeatedly clashed with China over Beijing's territorial ambitions in the South China Sea was the subject of a prolonged cyberespionage campaign that used previously undetected backdoors and partially overlaps with known Sino state threat actors.

article thumbnail

An American Company Enabled a North Korean Scam That Raised Money for WMDs

WIRED Threat Level

Wyoming’s secretary of state has proposed ways of “preventing fraud and abuse of corporate filings by commercial registered agents” in the aftermath of the scheme’s exposure.

Security 179
article thumbnail

UK Official Touts CHERI for Memory-Safe Computing

Data Breach Today

CHERI Architecture Enforces Memory Safety in Hardware A U.K. government official on Tuesday touted the potential of a processor designed to prevent memory-based cyberattacks even as he acknowledged commercial hurdles to its widespread adoption. The CHERI processor reduces attack surface, said John Goodacre.

article thumbnail

Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google

Elie

This case-study explores the effectiveness of virtual reality (VR) for diversity, equity, and inclusion (DEI) training through the lens of a custom VR application developped to train Google employees.

138
138
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

SecurityScorecard Accuses Vendor of Stealing Trade Secrets

Data Breach Today

Firm Claims Safe Security Competed Unfairly, Engaged in 'Skullduggery' SecurityScorecard accused Safe Security and former employee Mary Polyakova in a civil complaint of stealing confidential customer information and engaging in unfair competition. The lawsuit seeks to protect SecurityScorecard's trade secrets and recover monetary damages.

Security 279
article thumbnail

U.S. SEC Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Customer Information Amendments Adopted

Data Matters

On May 16, 2024, the U.S. Securities and Exchange Commission (SEC) adopted amendments to its Regulation S-P. These final amendments impose significant cybersecurity requirements for several SEC-registered entities and transfer agents registered with another appropriate regulatory agency, including with respect to these entities’ policies and procedures, incident response and notification procedures, and cybersecurity risk management.

Privacy 97
article thumbnail

Zyxel Releases Emergency Security Update for NAS Devices

Data Breach Today

Company Addresses Flaws in End-of-Life NAS Devices Networking solutions vendor Zyxel fixed critical vulnerabilities in end-of-life network-attached storage devices that allow remote code execution. It left two vulnerabilities allowing attacks by authenticated local attackers unpatched.

article thumbnail

Balancing privacy and security in education: Jamf webinar

Jamf

This webinar for school Apple administrators shows innovative ways of maintaining school security standards without putting student data or privacy at risk.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Australian Mining Giant Confirms BianLian Ransomware Attack

Data Breach Today

News Comes on Heels of Treasury Forcing Chinese Investors to Divest BianLian Shares Australian mining giant Northern Minerals says cybercriminals stole sensitive corporate secrets from its systems not long after the government forced several Chinese investors to divest their shares in the company. The incident did not have a material impact on Northern's operations or systems.

Mining 255
article thumbnail

Making sense of mobile security: requirements, considerations and strategies

Jamf

Discover strategies to secure your organization's mobile device fleet. Learn about security set up, attack prevention techniques, and threat hunting methods.

article thumbnail

George Kurtz: CrowdStrike Falcon Driving Cyber Consolidation

Data Breach Today

CrowdStrike CEO Says Market Embracing AI-Driven Security Platform for Consolidation George Kurtz said CrowdStrike's Falcon platform is leading the way in cybersecurity consolidation, with deals involving cloud, identity or SIEM doubling year-over-year. Customer are seeing significant cost savings and faster response times, which Kurtz said has solidified CrowdStrike's position.

Marketing 252
article thumbnail

Reimagining Cyber podcast: 100 episodes strong

OpenText Information Management

Reimaging Cyber is 100 episodes old! To celebrate how far we have come, let’s take a look back at where it all started and how far we have come. The Reimaging Cyber podcast first launched in December 2020, with hosts Stan Wisseman and Rob Aragao interviewing a variety of guests about their unique perspectives and insights on different topics of cybersecurity.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting Topics at Google Cloud NEXT

Thales Cloud Protection & Licensing

Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting Topics at Google Cloud NEXT madhav Thu, 06/06/2024 - 05:18 Thales and Google Cloud have worked together for years to develop cybersecurity solutions for Google Cloud and Google Workspace using sovereign controls to protect sensitive data. Once again, this year, Thales participated in Google Cloud’s annual conference, Google Cloud NEXT.

Cloud 62
article thumbnail

RADEEMA lets data flow with paper-free processes

OpenText Information Management

In Morocco, the city of Marrakesh is home to almost a million people. With an area of approximately four square miles, hundreds of thousands of people across the city rely on the Régie Autonome de Distribution d'Eau et d'Electricité de Marrakech (RADEEMA) to deliver water and electrical power. As a public utility company, we are an integral part of our customers’ lives.

Paper 64
article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related Stories Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk Citing Attacks On Small Utilities, Dragos Launches Community Defense

article thumbnail

Insights on AI and ISO 20022: OpenText helps shape the narrative at the Payments Canada Summit

OpenText Information Management

The 2024 Payments Canada Summit recently concluded, bringing together industry leaders, innovators, and key stakeholders to discuss the most recent trends and insights in payments. As a lead sponsor of the event, OpenText made a significant impact at this year’s event by hosting two highly anticipated speaking sessions and making significant contribution to the overarching narrative at the conference.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Prioritizing operational resiliency to reduce downtime in payments

IBM Big Data Hub

The average lost business cost following a data breach was USD 1.3 million in 2023, according to IBM’s Cost of a Data Breach report. With the rapid emergence of real-time payments, any downtime in payments connectivity can be a significant threat. This downtime can harm a business’s reputation, as well as the global financial ecosystem. For this reason, it’s paramount that financial enterprises support their resiliency needs by adopting a robust infrastructure that is integrate

article thumbnail

ONCD Urges Congress to Harmonize Cybersecurity Regulations

Data Breach Today

ONCD Director Harry Coker Calls on Congress to Improve Cybersecurity Reciprocity ONCD Director Harry Coker called on Congress to better harmonize cross-sector baseline cybersecurity requirements in regulated industries after years of federal and international guidance. Organizations told the White House the lack of harmonization hurts cybersecurity and business competitiveness.

article thumbnail

Online Privacy and Overfishing

Schneier on Security

Microsoft recently caught state-backed hackers using its generative AI tools to help with their attacks. In the security community, the immediate questions weren’t about how hackers were using the tools (that was utterly predictable), but about how Microsoft figured it out. The natural conclusion was that Microsoft was spying on its AI users, looking for harmful hackers at work.

Privacy 136
article thumbnail

Maximizing SaaS application analytics value with AI

IBM Big Data Hub

Software as a service (SaaS) applications have become a boon for enterprises looking to maximize network agility while minimizing costs. They offer app developers on-demand scalability and faster time-to-benefit for new features and software updates. SaaS takes advantage of cloud computing infrastructure and economies of scale to provide clients a more streamlined approach to adopting, using and paying for software.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.