Fri.Nov 01, 2024

article thumbnail

Chinese Hackers Use Quad7 Botnet for Credential Theft

Data Breach Today

Hackers Using Password Spraying to Steal User Microsoft Account Credentials Multiple Chinese hacking groups are using a botnet named for a TCP routing port number to conduct password spraying attacks, warned Microsoft Thursday. The Quad7 operators are almost certainly located in China. Botnet activity can be difficult to monitor.

Passwords 277
article thumbnail

Booking.com Phishers May Leave You With Reservations

Krebs on Security

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We’ll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world’s most visited travel website.

Phishing 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Verizon's Trusted Connection Boosts Mid-Market Cybersecurity

Data Breach Today

Making the Case for Stronger Mid-Market Cybersecurity Cybersecurity is an ever-evolving field. Verizon's Trusted Connection provides strong, easy-to-manage security for mid-market organizations. With a focus on usability, adaptability and comprehensive protection, Trusted Connection can help safeguard your organization's operations today, and in the future.

Marketing 273
article thumbnail

New LightSpy spyware version targets iPhones with destructive capabilities

Security Affairs

New LightSpy spyware targets iPhones supporting destructive features that can block compromised devices from booting up. In May 2024, ThreatFabric researchers discovered a macOS version of LightSpy spyware that has been active in the wild since at least January 2024. ThreatFabric observed threat actors using two publicly available exploits (CVE-2018-4233, CVE-2018-4404) to deliver macOS implants.

IT 126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Regulator's Call to Breached Organizations: 'Be Human'

Data Breach Today

Breaches Often Have Harmful, Under-Acknowledged 'Ripple Effect' on Victims' Lives Too many breached organizations fail to acknowledge the detrimental impact their mishandling of people's personal data can have on affected individuals, and to treat victims with the "empathy" they deserve, said the U.K.'s privacy watchdog, the Information Commissioner's Office.

More Trending

article thumbnail

HardPwn 2024: a Researcher's Passion for Hacking IoT Devices

Data Breach Today

Engineer Dennis Giese on Hacking Robot Vacuum Cleaners and Running Hackathons Dennis Giese, a security researcher and engineer, built his first computer at around age 8 using spare parts. Years later, he hacked his first robotic vacuum cleaner. Giese reflects on his journey as a researcher and ethical hacker during HardPwn, a hardware hackathon hosted by Hardwear.io in Amsterdam.

IoT 255
article thumbnail

Turn your AirPods Pro 2 into hearing aids: Testing and tracking hearing health in iOS 18.1

Collaboration 2.0

Your hearing health is important to your mental or physical health. Now, Apple's new hearing health features can help you track, manage, and supplement it. Here's how.

IT 104
article thumbnail

German Pharma Wholesaler AEP Targeted in Ransomware Attack

Data Breach Today

Firm Supplies More Than 6,000 Pharmacies A ransomware attack on German pharmaceutical distributor AEP detected Monday has not led to medication shortages so far, report local media. AEP disclosed Wednesday that hackers successfully encrypted some of its IT systems. Pharmacies usually work with several wholesalers.

article thumbnail

Threat Actors Abuse LinkedIn to Target Job Seekers

KnowBe4

Threat actors are targeting people who have recently lost their jobs with employment scams on LinkedIn, according to researchers at Malwarebytes.

Phishing 100
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

CyberEdBoard Profiles in Leadership: Alex Gahlo

Data Breach Today

CIO Alex Gallo on Balancing Digital Change, Security and Continuous Learning Alex Gallo, CyberEdBoard member and CIO, shared how he drives secure digital transformation by balancing AI integration with cybersecurity, fostering a security-first culture, and emphasizing continuous learning across his teams and the organization’s leadership.

article thumbnail

The Rise of Outsourced Cybersecurity: How CISOs are Adapting to New Challenges

KnowBe4

Chief Information Security Officers (CISOs) are facing unprecedented challenges. The combination of increasingly sophisticated cyber threats, persistent talent shortages, and complex regulatory requirements has led many organizations to rethink their approach to cybersecurity. As a result, we're seeing a significant shift towards outsourcing key security functions to managed service providers.

article thumbnail

Everfox Deepens Cyber Case Management Expertise with Yakabod

Data Breach Today

Yakabod Deal to Strengthen Everfox's Insider Risk, Cyber Incident Response Platform With its acquisition of Yakabod, Everfox expands capabilities in insider risk and cyber incident management. The move promises stronger integration and greater control over security workflows, benefiting public sector and critical infrastructure clients who operate in highly regulated environments.

Risk 232
article thumbnail

Phishing Alert: Cybercriminals Impersonating KnowBe4 Training Emails

KnowBe4

In the ever-evolving landscape of cybersecurity threats, we've recently encountered a sophisticated phishing attempt targeting one of our valued KnowBe4 customers. This incident serves as a crucial reminder of the importance of remaining vigilant and maintaining robust email security measures.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Doctor Hit With $500K HIPAA Fine: Feds Worse Than Hacker

Data Breach Today

Plastic Surgeon Paid $53K Ransom But Says ‘the Real Criminal’ Is HHS Dr. James Breit recalled the day a hacker locked up his systems with ransomware at his plastic surgery practice. He paid $53,000 in ransom. Nearly, seven years later, after paying a $500,000 HIPAA fine, Breit claims he got better treatment from the cybercriminals than he did federal regulators.

article thumbnail

New LightSpy spyware version targets iPhones with destructive capabilities

Security Affairs

New LightSpy spyware targets iPhones supporting destructive features that can block compromised devices from booting up. In May 2024, ThreatFabric researchers discovered a macOS version of LightSpy spyware that has been active in the wild since at least January 2024. ThreatFabric observed threat actors using two publicly available exploits (CVE-2018-4233, CVE-2018-4404) to deliver macOS implants.

Access 84
article thumbnail

MSP Efficiency Set to Surge With SaaS Alerts Joining Kaseya

Data Breach Today

Kaseya Acquisition of SaaS Alerts to Boost MSP Efficiency, Security With New Hires Kaseya’s SaaS Alerts acquisition promises a streamlined experience for MSPs by enhancing integrations with existing products. According to CEO Jim Lippie, SaaS Alerts' current and future users can expect more seamless, automated solutions with a 20% developer expansion dedicated to MSP security.

Security 217
article thumbnail

Your KnowBe4 Fresh Content Updates from October 2024

KnowBe4

Check out the 60 new pieces of training content added in October, alongside the always fresh content update highlights, events and new features.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Passkeys are more popular than ever. This research explains why

Collaboration 2.0

Some 57% of people surveyed this year for a FIDO Alliance report are aware of passkeys, up from 39% just two years ago.

133
133
article thumbnail

Every Cybersecurity List Should Be a Risk-Ranked List

KnowBe4

Cybersecurity is all about risk management and reduction. You cannot get rid of all risk. Well, I guess you could, but you (and everyone else) would probably not want to work in a true zero-risk environment. It would be too locked down, super slow, and incredibly inflexible. Cybersecurity is all about identifying the most likely and impactful risks and reducing them.

Risk 76
article thumbnail

This $200 Android phone has no business being this good (and it's not a Samsung or Motorola)

Collaboration 2.0

Key features make the CMF Phone 1 one of the few budget phones I'd recommend to almost anyone. Just make sure your carrier supports it.

IT 96
article thumbnail

LottieFiles confirmed a supply chain attack on Lottie-Player

Security Affairs

LottieFiles confirmed a supply chain attack on Lottie-Player, and threat actors targeted cryptocurrency wallets to steal funds. LottieFiles confirmed that threat actors have hacked the Lottie-Player software in a supply chain attack. Lottie-Player is a web component from LottieFiles designed to render Lottie animations , which are lightweight, vector-based animations in JSON format.

Cloud 76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The 30+ best Black Friday Apple deals 2024: Early sales available now

Collaboration 2.0

We found the best early Black Friday deals on Apple products like iPhones, iPads, MacBooks, AirPods, and more, so you can get a head start on your holiday shopping.

Sales 111
article thumbnail

OS upgrades 2024: macOS/iPadOS/iOS Feature Blog: Education

Jamf

Each new Apple software update brings new learning and teaching opportunities for both iPad and Mac users. macOS 15 and iOS/iPadOS include a host of new features, but in this blog, we take a look at some of the more prominent ones supporting the classroom and beyond.

article thumbnail

The 30 best early Black Friday phone deals

Collaboration 2.0

While Black Friday doesn't officially start until the end of November, you can already score big deals on the latest smartphones from Samsung, Google, Motorola, and even Apple.

105
105
article thumbnail

LottieFiles confirmed a supply chain attack on Lottie-Player

Security Affairs

LottieFiles confirmed a supply chain attack on Lottie-Player, and threat actors targeted cryptocurrency wallets to steal funds. LottieFiles confirmed that threat actors have hacked the Lottie-Player software in a supply chain attack. Lottie-Player is a web component from LottieFiles designed to render Lottie animations , which are lightweight, vector-based animations in JSON format.

Cloud 64
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The best sports watches of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best sports watches that capture your metrics for recovery, sleep, and detailed training guidance without a coach. Here's how to choose the right one for you.

81
article thumbnail

Total cost of ownership: iPad vs. Chromebook

Jamf

Chromebook or iPad? Discover the perfect classroom technology with the best TCO for schools. See what's the ideal fit for modern learning environments.

76
article thumbnail

Preorder Samsung's newest gaming monitor and get up to $225 off a Logitech accessory

Collaboration 2.0

Preordering one of Samsung's new Odyssey displays now on Amazon gets you a choice of free gear. But act fast because this deal ends the same day the monitors go on sale.

Sales 81