Fri.Sep 27, 2024

article thumbnail

The Tor Project and Tails have merged operations

Security Affairs

The Tor Project and Tails OS have joined forces and merged operations to counter a growing number of digital threats. The Tor Project and Tails have merged operations to enhance collaboration and expand training, outreach, and strengthen both organizations’ efforts to protect users globally from digital surveillance and censorship. The two organizations aim to better counter growing digital threats, and the merger between them will enhance protections for users needing both network and sys

Privacy 323
article thumbnail

Meta Fined 91 Million Euros By The Irish DPC

Data Breach Today

Fine Is For 2019 Disclosure That Meta Stored User Passwords In Plaintext The Irish data regulator fined social media giant Meta 91 million euros after an investigation found the company insecurely stored passwords of millions of European Facebook and Instagram users. A Meta spokesperson said the company identified the problem in 2019 and took "immediate action.

Passwords 298
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A cyberattack on Kuwait Health Ministry impacted hospitals in the country

Security Affairs

The Kuwait Health Ministry is recovering from a cyberattack that disrupted systems at multiple hospitals and disabled the Sahel healthcare app. Kuwait’s Health Ministry was the victim of a cyberattack that took systems at several of the country’s hospitals offline. The cyber attack also impacted the Ministry of Health website, which is still offline, and Kuwait’s Sahel healthcare app. “Kuwaiti Health Ministry announced on Wednesday that many essential features are back and running after a

Insurance 322
article thumbnail

Linux Distros Patching Printer Hijacking Flaw

Data Breach Today

Exploitation Requires Victim to Print On Rogue Printer Attackers can exploit a series of vulnerabilities in the OpenPrinting Common Unix Printing System utility to remotely execute arbitrary code on certain machines. Major Linux distributions reacted Friday by releasing patches. Exploitation requires a victim to attempt to print from a malicious device.

290
290
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Cyber vandalism on Wi-Fi networks at UK train stations spread an anti-Islam message

Security Affairs

UK police are investigating a cyberattack that disrupted Wi-Fi networks at several train stations across the country. U.K. transport officials and police are investigating a cyber attack on public Wi-Fi networks at the country’s biggest railway stations. Following the ‘cyber-security incident,’ passengers trying to log onto the Wi-Fi at several stations on Wednesday evening were displayed a page with the message “We love you, Europe,” followed by an anti-Islam message listing a serie

More Trending

article thumbnail

U.S. sanctioned virtual currency exchanges Cryptex and PM2BTC for facilitating illegal activities

Security Affairs

The U.S. government sanctioned the virtual currency exchanges Cryptex and PM2BTC for facilitating cybercrime and money maundering. The U.S. government sanctioned two cryptocurrency exchanges, Cryptex and PM2BTC, and indicted a Russian national for allegedly facilitating cybercriminal activities and money laundering. The authorities believe that these exchanges facilitate the laundering of proceeds from cybercrime. “The Justice Department today announced actions coordinated with the Departm

article thumbnail

Google shuts down WearOS update that was soft-bricking Pixel watches

Collaboration 2.0

Most users were able to install Wear OS 5 successfully, but an unlucky few ended up with blank screens after attempting to update.

246
246
article thumbnail

CUPS flaws allow remote code execution on Linux systems under certain conditions

Security Affairs

A researcher has disclosed details of an unpatched Linux vulnerability, initially labeled as critical, that allows remote code execution. The popular cybersecurity researcher Simone Margaritelli ( @evilsocket ) disclosed technical details of an unpatched vulnerability impacting Linux systems. On September 23, Margaritelli announced plans to disclose an unauthenticated remote code execution (RCE) vulnerability affecting all GNU/Linux systems within two weeks.

Access 297
article thumbnail

Tesla’s Cybertruck Goes, Inevitably, to War

WIRED Threat Level

A handful of Tesla’s electric pickup trucks are armed and ready for battle in the hands of Chechen forces fighting in Ukraine as part of Russia’s ongoing invasion. Can the EV take the heat?

Security 217
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Have a Windows 10 PC that can't be upgraded? You have 5 options before support ends next year

Collaboration 2.0

Microsoft will officially end support for its most popular operating system in 2025. Here's what you should do with your Windows 10 PCs that fail Microsoft's Windows 11 compatibility tests before that day arrives.

IT 190
article thumbnail

Beyond Phishing: AI's New Tricks for Cyberattacks

Data Breach Today

Paramount's Surinder Lall on AI Impersonation, Deepfakes, AI Governance Frameworks While AI transforms business operations, it helps cybercriminals develop sophisticated impersonation techniques such as deepfakes and voice synthesis, posing new challenges for corporate security, said Surinder Lall, senior vice president of global information security risk management at Paramount.

Phishing 189
article thumbnail

Google's hidden AI tool turns your text into stunningly lifelike podcasts - for free. Listen for yourself

Collaboration 2.0

I've been studying AI for years, and Google's new AI podcast tool still astonishes me. Seriously, you have to hear this to believe it. But humans will beat the machines in the end. Here's why.

IT 190
article thumbnail

UK CMA Clears Amazon, Anthropic Partnership

Data Breach Today

The U.K. antitrust regulator called off an investigation into the March $4 billion deal between Amazon and artificial intelligence firm Anthropic. "Amazon’s partnership with Anthropic does not qualify for investigation under the merger provisions of the Enterprise Act 2002," the regulator said.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Listen: Google's hidden AI tool turns your text into stunningly lifelike podcasts - for free

Collaboration 2.0

I've been studying AI for years, and Google's new AI podcast tool still astonishes me. Seriously, you have to hear this to believe it. But humans will beat the machines in the end. Here's why.

IT 190
article thumbnail

Tech Orgs Urge Targeted AI Regulations to Foster Innovation

Data Breach Today

Coalition of Leading Institutions Push for Policymakers to Develop Focused AI Rules A group of leading organizations across industries and technology giants is calling on lawmakers in the United States to develop focused regulations around artificial intelligence that limit the risks associated with emerging technologies while allowing innovation to flourish.

article thumbnail

One of the most immersive headphones I've listened to isn't made by Sony or Bose

Collaboration 2.0

Soundcore's new premium headphones, the Space One Pro, have a powerful ANC feature that delivers an immersive audio experience.

189
189
article thumbnail

Healthcare Cyber Bill Calls for 'Corporate Accountability'

Data Breach Today

Senate Bill Would Mean Cyber Funding for Hospitals, Prison Time for Lying CEOs Two U.S. senators are proposing stricter cyber mandates for the healthcare sector. The bill provides funding to help hospitals adopt enhanced requirements, but lifts HIPAA enforcement fine caps and threatens executives with prison time for falsely attesting their organizations' compliance in audits.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

This hidden Windows 11 setting adds an 'End task' option to every task on your taskbar

Collaboration 2.0

Dealing with unresponsive apps much? Stop digging through Task Manager and get back to work (or play) faster simply by changing this setting.

189
189
article thumbnail

NIST Recommends Some Common-Sense Password Rules

Schneier on Security

NIST’s second draft of its “ SP 800-63-4 “—its digital identify guidelines—finally contains some really good rules about passwords: The following requirements apply to passwords: lVerifiers and CSPs SHALL require passwords to be a minimum of eight characters in length and SHOULD require passwords to be a minimum of 15 characters in length.

Passwords 128
article thumbnail

The best phones for battery life in 2024: Expert tested and reviewed

Collaboration 2.0

Of the dozens of phones we've tested this year, these are the best phones for battery life, that also offer great cameras, design, and performance.

189
189
article thumbnail

The Data Breach Disclosure Conundrum

Troy Hunt

The conundrum I refer to in the title of this post is the one faced by a breached organisation: disclose or suppress? And let me be even more specific: should they disclose to impacted individuals, or simply never let them know? I'm writing this after many recent such discussions with breached organisations where I've found myself wishing I had this blog post to point them to, so, here it is.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Buy a Samsung Galaxy A35 and get a free pair of Buds FE ahead of October Prime Day

Collaboration 2.0

Right now at Amazon, if you buy a Samsung Galaxy A35 smartphone, you'll get a pair of Buds FE earbuds for free -- and who doesn't love free stuff?

189
189
article thumbnail

From Tetris to Minecraft: The Evolution of Security Awareness into Human Risk Management

KnowBe4

Once upon a time, security awareness training resembled a never-ending game of Tetris. Threats cascaded down, demanding swift action and strategy, only to speed up until we inevitably faltered.

article thumbnail

Microsoft announces sweeping changes to controversial Recall feature for Windows 11 Copilot+ PCs

Collaboration 2.0

The 'photographic memory' feature in Windows 11 is set to begin rolling out soon. Will these security improvements be enough to satisfy critics?

Security 189
article thumbnail

2024 threat hunter perspectives: Key insights from OpenText’s latest report

OpenText Information Management

In today’s evolving threat landscape, cyber defenders are constantly adapting to new adversarial tactics and emerging vulnerabilities. The latest 2024 Threat Hunter Perspective from OpenText sheds light on the most pressing threats, nation-state activities, and security recommendations enterprises must consider in the months ahead. Here are the key findings and expert insights to help you stay ahead of the curve.

Military 105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

One of the best Android smartwatches I've tested is cheaper than what Samsung and Google offer

Collaboration 2.0

The OnePlus Watch 2R is a streamlined version of its flagship sibling, with a sharp design and marathon battery life at a competitive price.

IT 189
article thumbnail

A guide to building a successful data governance program

Collibra

A successful data governance program must align with the business’ strategic goals and have the ability to operationalize processes, people and technology to deliver outcomes. A repeatable operational process is important to help the program continuously improve with each iteration. Why keep reinventing the wheel and repeating the same mistakes when one can make the wheel better and bigger, ensuring trusted data that allows the business to innovate?

article thumbnail

How to level up your job in the emerging AI economy

Collaboration 2.0

Higher-level architectural skills are needed for technology projects, and the AI economy requires evaluation and logical-thinking capabilities.

189
189