Wed.Aug 28, 2024

article thumbnail

US offers $2.5M reward for Belarusian man involved in mass malware distribution

Security Affairs

The US Department of State offers a $2.5 million reward for information leading to the arrest of a Belarusian cybercriminal involved in the mass malware distribution. The US Department of State announced a $2.5 million reward for information leading to the arrest of Volodymyr Kadariya (38), a Belarusian national allegedly involved in a significant malware organization.

article thumbnail

When Get-Out-The-Vote Efforts Look Like Phishing

Krebs on Security

Multiple media reports this week warned Americans to be on guard against a new phishing scam that arrives in a text message informing recipients they are not yet registered to vote. A bit of digging reveals the missives were sent by a California political consulting firm as part of a well-meaning but potentially counterproductive get-out-the-vote effort that had all the hallmarks of a phishing campaign.

Phishing 311
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked group APT33 adds new Tickler malware to its arsenal

Security Affairs

Iran-linked group APT33 used new Tickler malware in attacks against organizations in the government, defense, satellite, oil and gas sectors. Microsoft researchers reported that the Iran-linked cyberespionage group APT33 (aka Peach Sandstorm , Holmium , Elfin , Refined Kitten , and Magic Hound ) used new custom multi-stage backdoor called Tickler to compromise organizations in sectors such as government, defense, satellite, oil, and gas in the U.S. and UAE.

IT 316
article thumbnail

The Samsung phone most people should buy in 2024 is only $299 during Labor Day

Collaboration 2.0

The Samsung Galaxy A35 5G has its flaws, but with a two-day battery life and a gorgeous display, it's hard to ignore how good it is for the price.

IT 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

U.S. CISA adds Google Chromium V8 bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium V8 bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium V8 Inappropriate Implementation Vulnerability CVE-2024-38856 (CVSS score of 8.8) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 311

More Trending

article thumbnail

BlackByte Ransomware group targets recently patched VMware ESXi flaw CVE-2024-37085

Security Affairs

BlackByte ransomware operators are exploiting a recently patched VMware ESXi hypervisors vulnerability in recent attacks. Cisco Talos observed the BlackByte ransomware group exploiting the recently patched security flaw CVE-2024-37085 in VMware ESXi hypervisors in recent attacks. The flaw CVE-2024-37085 (CVSS score of 6.8) is an authentication bypass vulnerability in VMware ESXi.

article thumbnail

These 5 Linux file managers are way better than your default

Collaboration 2.0

Not happy with your Linux distro's default file manager? Stop struggling and try something different. Considering that these are all free, what do you have to lose?

246
246
article thumbnail

U.S. CISA adds Apache OFBiz bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache OFBiz bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apache OFBiz Incorrect Authorization Vulnerability CVE-2024-38856 (CVSS score of 9.8) to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability is an incorrect authorization issue in Apache OFBiz that impacts versions through 18.12.14, version 18.12.15 addressed the flaw.

IT 307
article thumbnail

This 13-inch laptop I recommend for work travel is not a MacBook or a Dell

Collaboration 2.0

Lenovo's ThinkBook 13x Gen 4 has the lightweight and durable form factor the series is known for, with added integrations from the new Magic Bay, which makes swapping peripherals easy.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Young Consulting data breach impacts 954,177 individuals

Security Affairs

A ransomware attack by the BlackSuit group on Young Consulting compromised the personal information of over 950,000 individuals. Software solutions provider Young Consulting disclosed a data breach impacting 950,000 individuals following a BlackSuit ransomware attack. On April 13 the company “became aware of technical difficulties” that impacted its infrastructure.

article thumbnail

The tablet I recommend most for business travel is not an iPad or ThinkPad

Collaboration 2.0

The 11th-edition Surface Pro is Microsoft's first Copilot+ PC to hit the market, featuring a brilliant OLED display and snappy processor that's as versatile as it is efficient.

Marketing 246
article thumbnail

Nothing to Smile About: Hacks on Dental Practices Swell

Data Breach Today

Over 1.2 Million Patients' Sensitive Data Exposed So Far This Year Some dentists don't have much to smile about these days when it comes to cyberattacks. More than 1.2 million of their patients have had their sensitive data compromised in at least two dozen hacks and other breaches so far in 2024, including several incidents reported in the past month.

IT 173
article thumbnail

The $30 Echo Dot deal is a great way to upgrade your smart home

Collaboration 2.0

Looking for a way to add a hands-free virtual assistant to your life? You can buy the latest Echo Dot for only $30 ahead of Labor Day.

242
242
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Chinese Nation-State Attackers Tied to Versa Zero-Day Hit

Data Breach Today

Targeted Versa Software Used by Service Providers to Manage Wide Area Networks Chinese nation-state attackers are actively exploiting a zero-day vulnerability in Versa Director software, used by major internet and managed service providers to deploy, configure and monitor network infrastructure, security experts warn. Versa updated its software last month to patch the flaw.

Security 173
article thumbnail

The great 2022 iPad Pro is $700 off this Labor Day

Collaboration 2.0

Want a new iPad Pro for less? The 6th-generation iPad Pro is on sale for Labor Day weekend.

Sales 237
article thumbnail

Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor

WIRED Threat Level

In addition to its longstanding password spraying attacks, Microsoft says Iran-backed hacker group Peach Sandstorm— or APT 33—has developed custom malware dubbed “Tickler.

Passwords 168
article thumbnail

Chrome bug hunters can earn up to $250,000 for serious vulnerabilities now - here's how

Collaboration 2.0

Google is bumping up the cash prizes for its Vulnerability Reward Program across all of its current categories.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cisco Bolsters AI Security by Buying Robust Intelligence

Data Breach Today

Acquisition Underscores the Importance of AI Security in Modern IT Infrastructure Cisco announced its intent to acquire Robust Intelligence to fortify the security of AI applications. With this acquisition, Cisco aims to address AI-related risks, incorporating advanced protection to guard against threats such as jailbreaking, data poisoning and unintentional model outcomes.

Security 162
article thumbnail

Chrome bug hunters can earn up to $250,000 for serious vulnerabilities now - how's how

Collaboration 2.0

Google is bumping up the cash prizes for its Vulnerability Reward Program across all of its current categories.

IT 190
article thumbnail

True Zero Trust Should Mean VPN Retirement

Data Breach Today

It’s now clear that remote and hybrid work environments are here to stay—but so are the headaches caused by legacy VPN, which grants network-wide access

Access 162
article thumbnail

The best phones of 2024: Expert tested and reviewed

Collaboration 2.0

Ahead of Labor Day weekend, we tested the best phones you can buy. These are the top picks for power users, content creators, budget shoppers, and more.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Microsoft Copilot Fixes ASCII Smuggling Vulnerability

Data Breach Today

Security Researcher Uncovered the Flaw, Which Allowed System Takeover Microsoft says it fixed a security flaw in artificial intelligence chatbot Copilot that enabled attackers to steal multifactor authentication code using a prompt injection attack. Security researcher Johann Rehberger said he discovered a way to invisibly force Copilot to send data.

article thumbnail

The best kids' tablets: Parent recommended

Collaboration 2.0

Back-to-school season is in full swing, and a kid-friendly tablet for homework and entertainment is a must-have. We've tested the best tablets for kids from brands like Apple, Amazon, and Samsung, and more.

190
190
article thumbnail

US Law Enforcement Cracks Down on AI-Led Child Abuse Content

Data Breach Today

Police, Prosecutors Say CSAM Generated by AI Is the Same as Traditional CSAM U.S. law enforcement is cracking down on users who use artificial intelligence to generate child sexual abuse material, stating there is no difference between material made by a computer and material from real life. "Put simply, CSAM generated by AI is still CSAM," said a U.S. attorney.

article thumbnail

Business leaders are losing faith in IT, according to this IBM study. Here's why

Collaboration 2.0

Generative AI seems to have changed business leaders' expectations about what technology needs to deliver.

IT 189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Netskope + Illumio: North, South, East, West—Securing Your Network with Zero Trust

Data Breach Today

Discover how you can successfully implement a zero-trust strategy with Netskope Zero Trust Network Access (ZTNA) and Illumio Zero Trust Segmentation (ZTS)

Security 162
article thumbnail

The 7 biggest practical differences between Windows and Linux for users

Collaboration 2.0

If you're considering a move from Windows to Linux, there are a few things you should know about before you do.

190
190
article thumbnail

Telegram Founder Set to Appear Before French Court

Data Breach Today

Hearing Is Scheduled to Take Place Wednesday Telegram CEO and owner Pavel Durov is set to appear before a French court on Wednesday after being freed from police custody. Paris authorities arrested Durov on Saturday evening. French authorities also issued a warrant for the arrest of Durov's brother, Nikolai.

162
162