Fri.Nov 22, 2024

article thumbnail

Zero Days Top Cybersecurity Agencies' Most-Exploited List

Data Breach Today

Cybersecurity Officials Urge to Prioritize Fixing These 15 Most-Exploited Flaws Which vulnerabilities need fixing first to best block nation-state and other hacking attempts? Enter the latest Five Eyes intelligence partnership list of the 15 flaws most targeted by attackers, of which 11 were zero-days. Many organizations have yet to patch them all.

article thumbnail

Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

WIRED Threat Level

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: China-Linked Espionage Targets U.S. Telecoms

Data Breach Today

Also: Highlights from ISMG's Financial Services Summit and Key Insights on AI Adoption On the 200th episode of the ISMG Editors' Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG's Financial Services Summit in New York, and unpacked the top findings from ISMG’s annual Generative AI Survey.

article thumbnail

The Scale of Geoblocking by Nation

Schneier on Security

Interesting analysis : We introduce and explore a little-known threat to digital equality and freedom­websites geoblocking users in response to political risks from sanctions. U.S. policy prioritizes internet freedom and access to information in repressive regimes. Clarifying distinctions between free and paid websites, allowing trunk cables to repressive states, enforcing transparency in geoblocking, and removing ambiguity about sanctions compliance are concrete steps the U.S. can take to ensur

Paper 92
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

NIST IoT Device Security Framework to Get an Update

Data Breach Today

Revised Framework to Address Emerging IoT Risks and Technologies The U.S. National Institute of Standards and Technology plans to revise its Internet of Things cybersecurity framework to address evolving risks posed by emerging technologies and use cases, such as AI and immersive tech. The proposed updates will broaden the focus to entire product ecosystems.

IoT 146

More Trending

article thumbnail

US Cyber Force Surges Global Operations Amid Rising Threats

Data Breach Today

US Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024 A secretive U.S. military unit has surged its support to partner nations across the globe in 2024 while combatting escalating threats from foreign adversaries like China and North Korea, a top official from Cyber Command told the Cyberwarcon summit on Friday.

Military 153
article thumbnail

The best password managers of 2024: Expert tested

Collaboration 2.0

Are you tired of remembering complex passwords across all your online services? A good password manager will do this for you. We tested the best password managers of 2024 to keep your credentials safe and simplify your login process.

article thumbnail

Google AI Tool Finds 26 Bugs in Open-Source Projects

Data Breach Today

One Vulnerability Had Been Undiscovered for Two Decades, Researchers Said Google researchers used an AI-powered fuzzing tool to identify 26 vulnerabilities in open-source code repositories, some of which had been lurking undiscovered for several decades. Each was found with AI, using AI-generated and enhanced fuzz targets, Google said.

153
153
article thumbnail

The best Windows laptops of 2024: Expert tested and reviewed

Collaboration 2.0

It's been an exciting year in the PC laptop industry, and we've gone hands-on with dozens of the best Windows laptops, putting their performance, battery life, and value to the test. Here are our top picks.

IT 81
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Haveli Purchases AppViewX to Strengthen Identity Automation

Data Breach Today

PE Firm Takes Majority Stake to Drive Certificate Lifecycle Management Innovation Private equity firm Haveli has purchased a majority stake in AppViewX to scale globally, targeting automation in certificate lifecycle management and public key infrastructure. CEO Gregory Webb says the acquisition will fund international expansion and next-gen technology investments.

135
135
article thumbnail

Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle

Collaboration 2.0

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $55 for a limited time.

Access 81
article thumbnail

China's DeepSeek Aims to Rival OpenAI's 'Reasoning' Model

Data Breach Today

DeepSeek-R1 Struggles with Logic Tests and Is Vulnerable to Jailbreaks Chinese artificial intelligence research company DeepSeek, funded by quantitative trading firms, introduced what it says is one of the first reasoning models to rival OpenAI o1. Reasoning models engage in self-fact checking and perform multi-step reasoning tasks.

article thumbnail

The best VPN services for iPhone: Expert tested and reviewed

Collaboration 2.0

We tested and analyzed popular VPNs compatible with Apple's iPhone range and the iOS operating system to find the best options for protecting your privacy, streaming content, and more.

Privacy 76
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

North Korean IT Workers Using Fake Sites to Evade Detection

Data Breach Today

Researches Find Deep Ties to North Korea Among Fake IT Services Firms Websites North Korean state actors are using fake websites of foreign technology services firms sidestep sanctions and raise funding for Kim Jong-un regime's weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations.

IT 130
article thumbnail

Phishing Attacks Exploits the Open Enrollment Period

KnowBe4

A phishing campaign is impersonating HR to target employees who are making annual insurance changes during the open enrollment period, according to researchers at Abnormal Security.

article thumbnail

I deleted my personal info from the internet with this service (and it's on sale for Black Friday)

Collaboration 2.0

DeleteMe helps remove your address, phone number, and other personal information from online platforms to protect you from identity theft, robocalls, and data breaches -- and it's 25% off for Black Friday.

Sales 72
article thumbnail

Threat Group Use AI Adult-Based “Deepnude” Image Generator Honeypots to Infect Victims

KnowBe4

Appealing to the most depraved of society, threat group FIN7 use the lure of generating nude images of favorite celebrities to get victims to download their NetSupport RAT.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

This gadget can help you drive safer and save money (and get 20% off for Black Friday)

Collaboration 2.0

Maintaining the correct tire pressure on your vehicle not only helps you save on gas, but also makes driving safer. Stay properly inflated with the Syncwire Tire Inflator.

66
article thumbnail

U.S. CISA adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-44308 Apple Multiple Products Code Execution Vulnerability CVE-2024-44309 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability CVE-2024-21287 Oracle Agile Product Lifecycle Man

IT 64
article thumbnail

One of the best laptops for work travel I've tested isn't a MacBook Air or Lenovo ThinkPad

Collaboration 2.0

MSI's ultra-lightweight Prestige 13 AI Plus Evo can last an entire workday on one charge and delivers great performance - courtesy of its Lunar Lake processor.

IT 74
article thumbnail

Build easy applications to manage your supply chain

OpenText Information Management

Today, integrating technology into supply chain management isn’t just a nice-to-have—it’s a necessity. Whether you're sourcing materials for an EV battery, authenticating luxury sneakers, or ensuring the quality of a high-end water cooler, digital tools can streamline your operations, reduce errors, and protect your brand reputation. The good news? Building customized applications to tackle supply chain challenges is easier than you think, even for complex systems.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Can your old PC even handle the Windows 11 upgrade? Here's how to tell

Collaboration 2.0

Does your PC have a future or is it time to consider retirement options? Here's what to look for.

IT 91
article thumbnail

The new wave of application quality

OpenText Information Management

The world of software engineering has never been more dynamic—or more challenging. With the rise of DevOps and now DevSecOps , modern software development is evolving at insane speeds. But as exciting as fast delivery and automation sound, they introduce new obstacles that demand smarter solutions. Enter DevSecOps, the hybrid hero that merges development , security , and operations into one cohesive powerhouse.

article thumbnail

This new YouTube tool adds AI backgrounds to your videos instantly - for free

Collaboration 2.0

YouTube's AI-generated feature enables users to add images or videos to the background of their Shorts using text-to-image prompts.

72
article thumbnail

Video: How to Protect Your Online Identity with a Password Manager

eSecurity Planet

In this video, we’ll explain why safeguarding your online identity is essential, as well as how password managers work, their advantages, and how to pick the right one. By the end, you’ll be ready to enhance your security to protect your online identity and personal information. The post Video: How to Protect Your Online Identity with a Password Manager appeared first on eSecurity Planet.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

I tested the world's smallest power station, and it's a solar-charging beast, and you can get $60 off this Black Friday

Collaboration 2.0

Normally, I'm looking for the biggest power stations with the greatest capacity, but the Jackery Explorer 100 Plus made me appreciate the smaller things.

IT 72
article thumbnail

The US Is Calling Out Foreign Influence Campaigns Faster Than Ever

WIRED Threat Level

The 2024 elections were a high-water mark for naming and shaming threat actors from foreign governments. There’s still work to be done, though, on how to attribute disinformation campaigns most effectively.

article thumbnail

Claude AI can analyze your Google Docs and offer feedback now

Collaboration 2.0

There are a few caveats to consider but this could be a major productivity enhancer for people who use Claude and Docs.

105
105