Wed.Sep 25, 2024

article thumbnail

Data of 3,191 congressional staffers leaked in the dark web

Security Affairs

The personal information of over 3,000 congressional staffers was leaked on the dark web following a major cyberattack on the U.S. Capitol. The personal information of approximately 3,191 congressional staffers has been leaked on the dark web , according to new research from internet security firm Proton and Constella Intelligence. The leaked data includes passwords, IP addresses, and social media information.

Passwords 335
article thumbnail

Timeshare Owner? The Mexican Drug Cartels Want You

Krebs on Security

The FBI is warning timeshare owners to be wary of a prevalent telemarketing scam involving a violent Mexican drug cartel that tries to trick people into believing someone wants to buy their property. This is the story of a couple who recently lost more than $50,000 to an ongoing timeshare scam that spans at least two dozen phony escrow, title and realty firms.

Sales 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New variant of Necro Trojan infected more than 11 million devices

Security Affairs

Experts warn of Necro Trojan found in Google Play, threat actors are spreading it through fake versions of legitimate Android apps. Researchers from Kaspersky discovered a new version of the Necro Trojan in multiple apps uploaded to the Google Play store. The malware was hidden in popular applications and game mods. Kaspersky researchers first spotted the Necro Trojan in 2019, the malicious code was in the free version of the popular PDF creator application CamScanner app.

Metadata 329
article thumbnail

6 ways the new AirPods Max could have been so much better

Collaboration 2.0

I love my AirPods Max, which is why I'm so baffled by Apple's recent update. Here's how I want to see them improved before I'll be willing to upgrade.

246
246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

U.S. CISA adds Ivanti Virtual Traffic Manager flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Virtual Traffic Manager vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Ivanti Virtual Traffic Manager authentication bypass vulnerability CVE-2024-7593 (CVSS score of 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 327

More Trending

article thumbnail

Arkansas City water treatment facility switched to manual operations following a cyberattack

Security Affairs

Arkansas City, a small city in Cowley County, Kansas, was forced to switch its water treatment facility to manual operations due to a cyberattack. Arkansas City, Kansas, had to switch its water treatment facility to manual operations over the weekend due to a cyberattack that was detected on Sunday. As of the 2020 census, Arkansas City has a population of 11,974.

article thumbnail

October Prime Day 2024: Everything you need to know

Collaboration 2.0

Amazon's Prime Big Deal Days sale will run Oct. 8-9, with deals on top tech, flagship devices, and more. Here's what to know.

Sales 243
article thumbnail

US CISA Releases Toolkit for Anonymous School Threats

Data Breach Today

New Guidance Aims to Improve School Responses to ‘Scourge’ of Anonymous Threats The Cybersecurity and Infrastructure Security Agency unveiled a new toolkit Wednesday aimed at improving school responses to anonymous threats of violence, as the agency kicked off a two-day summit focusing on school security amid increasing threats targeting school systems nationwide.

article thumbnail

Why Windows 11 requires a TPM - and how to get around that

Collaboration 2.0

Windows 11 officially requires a Trusted Platform Module. Here's what it does and how you can work around that requirement if your old PC doesn't have one.

IT 190
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Commvault to Boost AWS Data Protection With $47M Clumio Buy

Data Breach Today

Clumio Adds Advanced Cyber Resilience, AWS Data Recovery to Commvault's Platform Commvault aims to boost its AWS cyber resilience capabilities through the buy of Clumio. With a focus on protecting critical data stored in Amazon S3, this move will boost Commvault’s recovery efforts for hybrid cloud customers, offering near-instant data recovery and better application protection.

Cloud 182
article thumbnail

Asking medical questions through MyChart? Your doctor may let AI respond

Collaboration 2.0

A popular patient portal now employs an AI bot that thousands of US doctors use to write messages to patients. Disclosure is optional.

190
190
article thumbnail

Managing Security at the Network Layer

Data Breach Today

How to Safeguard Critical Infrastructure Neglecting network security can lead to serious consequences for organizations. Here are the essential practices for managing network security, along with real-world examples that reinforce the importance of comprehensive protection. The time to secure your network is now - before it's too late.

Security 173
article thumbnail

Meta's new 512GB Quest 3 deal may be the best VR headset offer right now

Collaboration 2.0

Meta announced that it will discontinue the 128GB version of the Quest 3 VR headset, and drop the price of the the 512GB by $150. Here's where to buy it.

IT 190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

To Be a Cybersecurity Pro, Think Like a Puzzle Solver

Data Breach Today

How Curiosity and Gamification Drive Cybersecurity Excellence Curiosity is one of the most important traits for success in cybersecurity. Professionals in this field regularly face complex problems that require an inquisitive mind, and gamified, hands-on learning is one of the best ways to develop an inquisitive mindset.

article thumbnail

Your doctor might be using AI to answer your questions - here's how that works

Collaboration 2.0

A popular patient portal called MyChart now employs an AI bot that thousands of US doctors are using to write messages to their patients. Disclosure is optional.

190
190
article thumbnail

Over 100 EU Firms Commit to Implementing Key AI Act Provisions

Data Breach Today

Meta, Apple, Mistral, Nvidia Not Among AI Pact's Signatories More than 100 tech companies including OpenAI, Microsoft and Amazon on Wednesday made voluntary commitments to conduct trustworthy and safe development of artificial intelligence in the European Union, with a few notable exceptions, including Meta, Apple, Nvidia and Mistral.

article thumbnail

The best rugged laptops of 2024

Collaboration 2.0

We tested and researched some of the best rugged laptops from Getac, Lenovo, and more to help you find the most durable mobile PC to fit your needs.

190
190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CMS Now Says 3.1 Million Affected by MOVEit Hack

Data Breach Today

New Estimate Is 3 Times Higher Than Number Agency Initially Publicly Disclosed The U.S. Centers for Medicare and Medicaid Services has updated the scope of the MOVEit hacking breach last year, telling a sister agency that the software supply chain attack affected more than 3.1 million individuals - about three times the number of victims disclosed publicly earlier this month.

CMS 173
article thumbnail

I found the best AirTags for Android users, and they're very accurate

Collaboration 2.0

Chipolo's latest One and Card trackers are perfect for keys and wallets that have a habit of disappearing.

190
190
article thumbnail

Stopping Business Email Compromise and Ransomware Attacks with Human-centric Security

Data Breach Today

In the ever-evolving cybersecurity landscape, two substantial threats persist: ransomware and Business Email Compromise (BEC).

article thumbnail

Is OneDrive messing with your files? How to get your Windows storage under control

Collaboration 2.0

If you're not paying close attention, your local files can get moved to Microsoft's OneDrive cloud storage. Here's what's happening, and how you can clean up the mess.

Cloud 190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

US FTC Targets AI Firms in Crackdown on Deceptive Practices

Data Breach Today

Federal Trade Commission Takes Aim at Deceptive Use of Artificial Intelligence The U.S. Federal Trade Commission on Wednesday announced a series of law enforcement actions targeting companies the commission said is using deceptive artificial intelligence practices to defraud consumers, from promising "AI lawyers" to generating countless fake reviews.

article thumbnail

Meta's new AR glasses offer neural control - no implant necessary

Collaboration 2.0

The Orion prototype is much closer to the AR dream than Apple's Vision Pro - at least at first glance.

189
189
article thumbnail

Election-Themed Phishing Threats Are on the Rise

KnowBe4

Researchers at ReliaQuest have published a report looking at cyber threats surrounding the upcoming US presidential election, warning that election-related phishing will continue to increase over the next month.

article thumbnail

Arc browser creator believes it's time to move on from Chrome - and I agree

Collaboration 2.0

In a move that shouldn't surprise anyone who uses Arc browser, the man behind the software says the web browser and the web need to be reinvented.

IT 189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The AI Revolution: Balancing Innovation and Ethics in the Age of Intelligent Technology

KnowBe4

Artificial intelligence (AI) is revolutionizing most, if not all, industries worldwide. AI systems use complex algorithms and large datasets to analyze information, make predictions and adjust to new scenarios through machine learning – enabling them to improve over time without being explicitly programmed for every task.

article thumbnail

98% of small firms are using AI tools to 'punch above their weight'

Collaboration 2.0

Small businesses are looking to artificial intelligence to gain a competitive edge - and they're succeeding, according to a US Chamber of Commerce survey.

article thumbnail

[WTH?] Critical Vulnerabilities in Automated Tank Gauges. This Is Not OK.

KnowBe4

A new wave of concern has surfaced around the security of Automated Tank Gauges (ATGs), critical systems that monitor and manage liquid levels in storage tanks at facilities like oil refineries and chemical plants.