Mon.Aug 19, 2024

article thumbnail

National Public Data Published Its Own Passwords

Krebs on Security

New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds of millions of Americans’ Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD data broker which shares access to the same consumer records inadvertently published the passwords to its back-end database in a file that was freely available from its homepage until today.

Passwords 356
article thumbnail

Microsoft Zero-Day CVE-2024-38193 was exploited by North Korea-linked Lazarus APT

Security Affairs

Microsoft addressed a zero-day vulnerability actively exploited by the North-Korea-linked Lazarus APT group. Microsoft has addressed a zero-day vulnerability, tracked as CVE-2024-38193 (CVSS score: 7.8), which has been exploited by the North Korea-linked Lazarus APT group. The vulnerability, tracked as CVE-2024-38193 (CVSS score: 7.8), is a privilege escalation issue that resides in the Windows Ancillary Function Driver (AFD.sys) for WinSock.

Access 339
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Florida-Based Drug Testing Lab Says 300,000 Affected in Hack

Data Breach Today

Cybercriminal Gang RansomHub Claims It Leaked 700 Gigabytes of Lab's Stolen Data Florida drug testing medical laboratory American Clinical Solutions told federal regulators that 300,000 individuals are caught up in a hacking incident now that criminal gang RansomHub has published 700 gigabytes worth of data stolen from the lab's network.

IT 286
article thumbnail

Experts warn of exploit attempt for Ivanti vTM bug

Security Affairs

Researchers at the Shadowserver Foundation observed an exploit attempt based on the public PoC for Ivanti vTM bug CVE-2024-7593. Researchers at the Shadowserver Foundation observed an exploit attempt based on the public proof of concept (PoC) for the Ivanti vTM bug, CVE-2024-7593. In Mid-August, Ivanti addressed a critical authentication bypass vulnerability, tracked as CVE-2024-7593 (CVSS score of 9.8), impacting Virtual Traffic Manager (vTM) appliances that can allow attackers to create rogue

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Building Timely and Truthful LLMs for Security Operations

Data Breach Today

NYUs Brennan Lodge on Training Your Own Model With Retrieval Augmented Generation Many cybersecurity organizations hope generative artificial intelligence and large language models will help them secure the enterprise and comply with the latest regulations. But to date, commercial LLMs have big problems - hallucinations and a lack of timely data, said NYU professor Brennan Lodge.

More Trending

article thumbnail

Background Check Firm National Public Data Confirms Breach

Data Breach Today

1.3 Million Individuals Being Notified Their Social Security Numbers Were Stolen Background check firm Jericho Pictures, which does business as National Public Data, is notifying 1.3 million individuals that their personal information was stolen via a December 2023 breach of its systems. The stolen information was listed for sale on a cybercrime market beginning in April.

Sales 271
article thumbnail

Your Android phone is getting an anti-theft upgrade, thanks to AI. How it works

Collaboration 2.0

One of several Android security enhancements, Google's theft detection feature is rolling out now to a limited number of users.

IT 246
article thumbnail

How the Paris Olympics Survived Unprecedented Cyberthreats

Data Breach Today

Officials Say the Olympic Games Saw 140 Cyberattacks. None Were Successful. France’s cyber defense agency teamed up with governments and security experts from across the globe to identify and mitigate a historic level of both physical and cyber threats following years of preparation, experts tell Information Security Media Group.

article thumbnail

How do AI checkers actually work?

Collaboration 2.0

AI-generated content detectors are the new gatekeepers of originality, and they're getting harder to beat. Here's what to know about the technologies powering them.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Embracing the Role of Educator: Guidance for Information Management Practitioners in the Era of AI

AIIM

As organizations explore the potential of AI, information management practitioners may face the challenge of being perceived as roadblocks rather than facilitators. However, by aligning Generative AI initiatives with business goals and promoting intentional adoption, these professionals can pivot into a critical educator role.

Education 206
article thumbnail

Why you should stop using your solar-powered power bank

Collaboration 2.0

I've spent the summer testing solar-powered power banks. It turns out the devices are universally rubbish and potentially unsafe. Here's what to use instead.

IT 246
article thumbnail

Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure

The Last Watchdog

President Biden’s call for the mainstreaming of Software Bill of Materials (SBOMs) is a major step forward. Related: Europe mandates resiliency Requiring a formal inventory of all components, libraries and modules in all business applications can help lock down software supply chains, especially in light of the SolarWinds and Colonial Pipeline attacks.

Security 173
article thumbnail

My favorite DeWalt cordless drill and impact driver set is 33% off

Collaboration 2.0

Save $80 on this brilliant DeWalt power tool kit with this early Labor Day deal -- perfect for DIY beginners and tradespeople.

246
246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Chinese Hacking Firm iSoon Targeted European Networks

Data Breach Today

German Government Analysis Finds Screenshots of File Directories A massive February leak of internal documents from Chinese hacking contractor iSoon revealed apparent hacking against European institutions and states, a German federal agency warned this week. Previous analysis of the leaked data by security researchers focused on iSoon's activities in Asia.

article thumbnail

This great Amazon Fire TV Omni Series QLED is $130 off right now

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming, and you can save $130 on the 55-inch version.

246
246
article thumbnail

Is Disabling Clickable URL Links Enough?

KnowBe4

Recently, we had a customer reach out to ask if disabling clickable uniform resource locator (URL) links in emails was enough protection by itself to potentially not need employee security awareness training and simulated phishing.

article thumbnail

I recommend this $50 anti-spy camera finder and bug detector to anyone traveling

Collaboration 2.0

Social media is awash with ads for gadgets that detect hidden cameras and bugs in your hotel room, Airbnb, or even your own home. So I tested one to see if it actually works.

IT 244
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ransomware Group Known as ‘Royal’ Rebrands as BlackSuit and Is Leveraging New Attack Methods

KnowBe4

Despite changing their stripes, the FBI warns organizations of new tactics used by this known ransomware threat group that are only making them more.

article thumbnail

These $400 XR glasses gave me a 200-inch screen to game and watch movies on

Collaboration 2.0

XR glasses are great for providing big-screen experiences in a comfortable, compact form factor. Here's my buying advice for the latest from RayNeo.

243
243
article thumbnail

Why MDR Stalwart eSentire Is Looking to Sell Itself for $1B

Data Breach Today

Aging Technology and Rising Competition Have Created a Need for Greater Investment The owners of eSentire are exploring a potential sale that could value the company at about $1 billion and attract the interest of private equity firms. The company is hoping to command a valuation equivalent to more than seven times its annual recurring revenue of about $150 million.

Sales 124
article thumbnail

How to use ChatGPT to write your resume

Collaboration 2.0

Summarizing your experiences and strengths in a single document could just be the hardest part about landing the perfect job. OpenAI's chatbot is here to help.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

U.K. Management Almost Twice as Likely to Fall for Phishing Attacks Versus Entry-Level Employees

KnowBe4

Highlights from a new survey focused on employee compliance reveals just how targeted and susceptible U.K. businesses are to phishing attempts.

Phishing 122
article thumbnail

The Windows BitLocker recovery bug is fixed, according to Microsoft

Collaboration 2.0

Last month's BitLocker Recovery bug should be a wake-up call for everyone who owns a Windows PC. Make sure you have a copy of your recovery key so you can avoid being locked out of your data files. Here's how.

190
190
article thumbnail

The State of Ransomware

Schneier on Security

Palo Alto Networks published its semi-annual report on ransomware. From the Executive Summary: Unit 42 monitors ransomware and extortion leak sites closely to keep tabs on threat activity. We reviewed compromise announcements from 53 dedicated leak sites in the first half of 2024 and found 1,762 new posts. This averages to approximately 294 posts a month and almost 68 posts a week.

article thumbnail

5 ways ChatGPT can help you write an essay

Collaboration 2.0

Back-to-school season is in full swing, and AI can help with brainstorming and writing your next paper. Here's how.

Paper 190
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Long Road to Recovery Following a Ransomware Attack

KnowBe4

When it comes to the duration of a ransomware attack and the subsequent recovery process, the numbers are staggering and vary wildly. Partly because there’s no single source which compiles all the information in a consistent manner.

article thumbnail

5 essential Linux terms every new user needs to know

Collaboration 2.0

If you're considering trying the open-source OS but are put off by all the terminology, relax! Here's the list of definitions I wish I had handy 30 years ago.

190
190
article thumbnail

Exploring AI: Regulations and Threat Mitigation

Thales Cloud Protection & Licensing

Exploring AI: Regulations and Threat Mitigation josh.pearson@t… Tue, 08/20/2024 - 07:05 It’s something we’ve all heard repeatedly, but it’s a point worth hammering home: AI will shape the future of humanity. This fact is not lost on policymakers, and they are reacting accordingly. In October 2022, the US released its Blueprint for an AI Bill of Rights.