Wed.Aug 14, 2024

article thumbnail

Microsoft Patch Tuesday security updates for August 2024 addressed six actively exploited bugs

Security Affairs

Microsoft’s August 2024 Patch Tuesday addressed 90 vulnerabilities, including six that are actively exploited. Patch Tuesday security updates for August 2024 addressed 90 vulnerabilities in Microsoft products including Windows and Windows Components; Office and Office Components; NET and Visual Studio; Azure; Co-Pilot; Microsoft Dynamics; Teams; and Secure Boot and others, bringing the total to 102 when including third-party bugs.

Security 349
article thumbnail

Suspected Ransom Cartel Operator Extradited to the US

Data Breach Today

Maksim Silnikau, aka 'J.P.Morgan,' Charged in New Jersey and Virginia Federal Court A pioneer of the ransomware-as-a-service model appeared in U.S. federal court Tuesday where he faces a slew of charges stemming from a nearly two-decade online career. Poland extradited Maksim Silnikau to the United States on Friday; authorities arrested him in a Spanish seaside town in 2023.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SolarWinds addressed a critical RCE in all Web Help Desk versions

Security Affairs

SolarWinds addressed a critical remote code execution vulnerability in its Web Help Desk solution for customer support. SolarWinds fixed a critical vulnerability, tracked as CVE-2024-28986 (CVSS score 9.8), in SolarWinds’ Web Help Desk solution for customer support. The flaw is a Java deserialization issue that an attacker can exploit to run commands on a vulnerable host leading to remote code execution.

article thumbnail

Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters

WIRED Threat Level

Researchers have discovered a way that would allow anyone with a few hundred dollars to hack into a wireless gear-shifting systems used by the top cycling teams for events like the Tour de France.

Security 280
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Kootenai Health data breach impacted 464,000 patients

Security Affairs

Kootenai Health suffered a data breach impacting over 464,000 patients following a 3AM ransomware attack. Kootenai Health disclosed a data breach impacting over 464,088 patients following the leak of their personal information by the ThreeAM (3AM) ransomware gang. Kootenai Health is a healthcare organization based in Coeur d’Alene, Idaho. It is a regional medical center that provides a wide range of medical services, including emergency care, surgical services, cancer care, and specialized

More Trending

article thumbnail

China-linked APT Earth Baku targets Europe, the Middle East, and Africa

Security Affairs

China-linked threat actor Earth Baku expanded its operations in Europe, the Middle East, and Africa starting in late 2022. China-linked APT group Earth Baku (a threat actor associated with APT41 ) has expanded its operations beyond the Indo-Pacific region to Europe, the Middle East, and Africa. Trend Micro researchers observed the APT targeting countries like Italy, Germany, UAE, and Qatar, and the group is suspected to have targeted also entities in Georgia and Romania.

article thumbnail

These impressive bone conduction headphones offer 3 important safety features

Collaboration 2.0

The Suunto Wing headphones sound amazing while allowing you to be fully aware of your surroundings.

246
246
article thumbnail

Your Gym Locker May Be Hackable

WIRED Threat Level

Security researchers say they’ve extracted digital management keys from select electronic lockers and revealed how they could be cloned.

Security 179
article thumbnail

I switched to a $150 Motorola phone for two weeks, and it was a pleasant surprise

Collaboration 2.0

Motorola's latest Moto G Play 2024 looks and feels great, with an enjoyable software experience for most people's needs.

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Iran Still Attempting to Hack US Elections: Google

Data Breach Today

Computing Giant Says APT42 Behind 'Small But Steady Cadence' of Phishing Emails Iranian nation-state hackers are continuing a campaign to infiltrate the U.S. presidential election by penetrating the email inboxes of campaign and election officials, Google said Wednesday. The Iranian cyberespionage group tracked as APT42 started "a small but steady cadence" of phishing emails.

Phishing 162
article thumbnail

Proton has a plan to boost your online privacy. And your friend can benefit, too

Collaboration 2.0

The tech company's new plan looks to protect you and a friend or loved one online. Proton has also announced a Proton VPN browser extension.

Privacy 245
article thumbnail

US NIST Formalizes 3 Post-Quantum Algorithms

Data Breach Today

Agency Also Formalizes 2 Digital Signature Standards; 1 More to Come Later in Year The National Institute of Standards and Technology, a global trendsetter for cryptographic standards, announced the publication of a post-quantum standard for general encryption and two digital signature standards. The agency solicited proposals in December 2016 and selected the algorithms in 2022.

article thumbnail

Google Pixel 9 Pro Fold vs. OnePlus Open: Is there a new foldable phone champion?

Collaboration 2.0

Google just unveiled its newest foldable phone, but it faces stiff competition from the OnePlus Open. Let's break down the pros and cons of both.

IT 245
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Idaho-Based Medical Center Says 464,000 Affected by Attack

Data Breach Today

Ransomware Gang ThreeAM Claims It Leaked 22 Gbytes of Kootenai Health's Stolen Data An Idaho-based medical center is notifying about 464,000 patients and employees that their sensitive information was potentially compromised in an attack detected in March. Ransomware group ThreeAM claims to have leaked on its dark web site 22-Gbytes of Kootenai Health's stolen data.

article thumbnail

Wi-Fi problems? Add a wired network to your home without Ethernet cable - here's how

Collaboration 2.0

Running Ethernet wiring is a messy, expensive job. But if you have cable outlets, you can use an inexpensive adapter to set up a high-speed wired connection with minimal effort.

190
190
article thumbnail

Mimecast Acquires Aware to Advance Collaboration Security

Data Breach Today

Insights Bolster Human Risk Strategy, Target Insider Threat and Compliance Issues Mimecast's acquisition of Aware bolsters its human risk management by adding AI and natural language processing capabilities for collaboration tools. The deal enhances security across communication platforms, addressing insider threats and compliance issues while boosting Mimecast's market presence.

Security 130
article thumbnail

The best flashlights of 2024: Expert tested

Collaboration 2.0

We tested over a dozen of the best flashlights, and these are our top picks based on beam distance, lumen output, and other features.

190
190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

3 State AGs Fine Biotech Firm $4.5M for 2023 Hack

Data Breach Today

Investigators Highlight Enzo Biochem's Failure to Fix Known Security Risks New York-based biotechnology firm Enzo Biochem will pay $4.5 million in state fines and must implement a list of security improvements, thanks to a 2023 ransomware attack that affected 2.4 million patients nationwide. Investigators highlighted the company's failure to fix known security risks.

article thumbnail

Buy a Microsoft Office 2021 for Windows license for $40 with this deal

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 79% off right now (there's a deal for a Mac version, too).

189
189
article thumbnail

AI/ML's Role in Cybersecurity: Balancing Innovation, Safety

Data Breach Today

Trail of Bits' Michael Brown on the Intersection of AI/ML and Cybersecurity Threats Trail of Bits' Michael Brown explores the dual challenges of applying AI and ML to cybersecurity and securing these evolving technologies themselves. He discusses the complementary nature of traditional and AI/ML-based approaches and highlights the pressing need for secure development life cycles.

article thumbnail

Meet the world's first ruggedized Android smartphone with ultra-wideband

Collaboration 2.0

Ultra-wideband (UWB) is a feature that has many potential benefits for Android owners. Here's why.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Navigating AI-Based Data Security Risks in Microsoft Copilot

Data Breach Today

Zenity's Michael Bargury on AI Prompt Injection and Copilot Security Flaws AI-powered tools such as Microsoft Copilot can be manipulated by attackers to access sensitive data and perform unauthorized actions, says Michael Bargury, co-founder and CTO of Zenity. Enterprises must address these new security challenges when adopting AI technologies.

Risk 130
article thumbnail

The best free password managers of 2024: Expert tested

Collaboration 2.0

We tested the best free password managers, which can help keep your data safe and make it easier to log into sites and apps.

Passwords 189
article thumbnail

Is China's Threat to US Critical Infrastructure Overblown?

Data Breach Today

Scythe CEO Bryson Bort on Why US Concerns About Chinese Attacks May Be Misplaced As concerns grow about China's cyberthreat to U.S. critical infrastructure, Scythe founder and CEO Bryson Bort suggests the actual risk may not be as severe as feared. He explains the factors that might limit China's cyber activities and the real strategic vulnerabilities that could be targeted.

Risk 130
article thumbnail

Google Pixel 9 is first Android phone to get satellite SOS messaging

Collaboration 2.0

Skylo is powering the new emergency texting feature, which will be free for at least two years.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

'Her,' in Real Life?

Data Breach Today

OpenAI Evaluates GPT-4o's Capabilities, Risks in Scorecard Report The widespread use of generative artificial intelligence has brought on a case of real life imitating art: Humans have begun to bond with their AI chatbots. Such anthropomorphism - treating an object as a person - is not a total surprise, especially for companies developing AI models.

article thumbnail

'SinkClose' AMD CPU vulnerability explained: How dangerous is it really?

Collaboration 2.0

The flaw endangers essentially all - yes, all - AMD processors made since 2006, but it threatens servers, data centers, and clouds more than the PC in front of you. Here's what you need to know and what you can do about it.

IT 189
article thumbnail

Texas Sues GM for Collecting Driving Data without Consent

Schneier on Security

Texas is suing General Motors for collecting driver data without consent and then selling it to insurance companies: From CNN : In car models from 2015 and later, the Detroit-based car manufacturer allegedly used technology to “collect, record, analyze, and transmit highly detailed driving data about each time a driver used their vehicle,” according to the AG’s statement.

Insurance 127