Tue.Sep 03, 2024

article thumbnail

Vulnerabilities in Microsoft apps for macOS allow stealing permissions

Security Affairs

Vulnerabilities in Microsoft apps for macOS could allow attackers to steal permissions and access sensitive data. Cisco Talos researchers discovered eight vulnerabilities in Microsoft apps for macOS. These flaws could allow attackers to inject malicious libraries into Microsoft’s apps and steal permissions. This could enable access to sensitive resources like the microphone, camera, and screen recording, potentially leading to data leaks or privilege escalation.

Libraries 325
article thumbnail

Halliburton Says Hackers Stole Data

Data Breach Today

Firm Says It Is Still 'Evaluating the Nature and Scope of the Information' Oil service giant Halliburton told U.S. federal regulators Tuesday that hackers stole data after the firm acknowledged "unauthorized activity" on its networks in late August. The incident "caused disruptions and limitation of access to portions of the company's business applications," the firm said.

Access 287
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. oil giant Halliburton disclosed a data breach

Security Affairs

U.S. oil company Halliburton disclosed a data breach following the RansomHub ransomware gang attack that occurred in August. In August, Halliburton, a major U.S. oil company, announced that a cyberattack hit its IT infrastructure, particularly impacting operations at its Houston offices. Halliburton Company is an American multinational corporation and the world’s second largest oil service company which is responsible for most of the world’s largest fracking operations.

article thumbnail

The US Navy Is Going All In on Starlink

WIRED Threat Level

The Navy is testing out the Elon Musk–owned satellite constellation to provide high-speed internet access to sailors at sea. It’s part of a bigger project that’s about more than just getting online.

Access 266
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Three men plead guilty to running MFA bypass service OTP.Agency

Security Affairs

Three men have pleaded guilty to operating OTP.Agency, an online service that allowed crooks to bypass Multi-Factor authentication (MFA). Three men, Callum Picari (22), Vijayasidhurshan Vijayanathan (21), and Aza Siddeeque (19), have pleaded guilty to operating OTP.Agency , an online platform that allowed crooks to bypass MFA used by customers of several banks and services.

More Trending

article thumbnail

Zyxel fixed critical OS command injection flaw in multiple routers

Security Affairs

Taiwanese manufacturer Zyxel addressed a critical OS command injection flaw affecting multiple models of its business routers. Zyxel has released security updates to address a critical vulnerability, tracked as CVE-2024-7261 (CVSS v3 score of 9.8), impacting multiple models of its business routers. The flaw is an operating system (OS) command injection issue that stems from the improper neutralization of special elements in the parameter “host” in the CGI program of some AP and security router

article thumbnail

Windows 11 finally outscores Windows 10 among PC gamers

Collaboration 2.0

Since its debut almost three years ago, Windows 11 has struggled to catch up to its predecessor in popularity and market share. But with the clock now running out for Windows 10, things seem to be shifting a little faster.

Marketing 246
article thumbnail

VMware fixed a code execution flaw in Fusion hypervisor

Security Affairs

VMware released a patch to address a high-severity code execution flaw in its Fusion hypervisor, users are urged to apply it. VMware addressed a high-severity code execution vulnerability, tracked as CVE-2024-38811 (CVSS 8.8/10), in its Fusion hypervisor. The vulnerability is due to the usage of an insecure environment variable, a threat actor with standard user privileges can trigger the flaw to execute code in the context of the Fusion application. “VMware Fusion contains a code-execut

IT 297
article thumbnail

This great Amazon Fire TV Omni Series QLED is still $170 off after Labor Day

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming, and you can save $170 on the 55-inch version in this still-live Labor Day deal.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Match Made in Heaven: Exploring the Relationship Between AI and Information Management

AIIM

Why are information management and AI even in the same sentence? It's an interesting question. What's the relationship? Well, the answer is simple: there is no AI without information.

IT 231
article thumbnail

Every power user needs this laptop accessory to keep their device running cool

Collaboration 2.0

The AICHESON K1 features an interesting pit design that, when combined with a 5.5-inch fan, can cool down hot laptops in no time at all.

246
246
article thumbnail

The Japanese Robot Controversy Lurking in Israel’s Military Supply Chain

WIRED Threat Level

Activists claim Japanese industrial robots are being used to build military equipment for Israel. The robot maker denies the claims, but the episode reveals the complex ethics of global manufacturing.

Military 214
article thumbnail

7 things I never do after I install Linux (and why you shouldn't either)

Collaboration 2.0

Linux is a powerful and user-friendly operating system that allows you to do far more than you can with Windows. There are, however, some things you should never do.

190
190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Radiology IT Vendor Hack Hits 4 Practices, 411,000 People

Data Breach Today

Tennessee-Based Specialty Networks Incident Is Latest Attack on Business Associates A vendor that provides information systems and transcription services to radiology practices is alerting 411,037 people of a hack discovered last December involving the theft of sensitive data. The firm already faces at least four proposed federal class action lawsuits related to the hack.

IT 182
article thumbnail

Real-life computer bugs? Student Chromebooks infested with bedbugs - and it's not the first time

Collaboration 2.0

Bedbugs in school laptops have been a recurring issue. Here's a look at why.

IT 190
article thumbnail

US NTIA Probes Data Center Security Risks

Data Breach Today

Agency Publishes Notice Soliciting Comments on Potential Federal Response An artificial intelligence-fueled growth in data center construction has the federal government asking what it should do to help manage data security risks. The NTIA is interested in identifying opportunities "to improve data centers’ market development, supply chain resilience, and data security.

Risk 173
article thumbnail

How to run a Windows app on Linux with Wine

Collaboration 2.0

Wine has you covered if you want to make Linux your go-to operating system and still need to run Windows apps.

190
190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

3 Men Plead Guilty to Running Service That Bypasses MFA

Data Breach Today

Automated Service Helped Subscribers Trick Victims Into Sharing One-Time Codes Three men have pleaded guilty to running OTPAgency, a subscription service for fraudsters designed to automatically phone targets and trick them into sharing the one-time codes criminals need to log into their bank accounts. The service targeted more than 12,500 individuals over its 18-month run.

IT 173
article thumbnail

Is AI the new bloatware?

Collaboration 2.0

AI has quickly become a part of the mobile landscape. But what does that mean for the future of our devices' operating systems and hardware?

189
189
article thumbnail

New HackerOne CEO Kara Sprague to Expand Beyond Bug Bounties

Data Breach Today

Sprague Replaces Veteran CEO, Plans to Double Down on PTaaS and AI Red Teaming HackerOne has tapped F5's longtime product leader as it next chief executive to continue expanding its portfolio beyond operating vulnerability disclosure programs. The firm tasked Kara Sprague with building on existing growth in areas including AI red teaming and penetration testing as a service.

IT 162
article thumbnail

Grab this Blue XLR microphone for almost 50% off at Amazon

Collaboration 2.0

The Blue Baby Bottle XLR cardioid microphone is designed for experienced content creators, podcasters, and musicians with its XLR connection and high-fidelity recording, and you can snag one for 47% off at Amazon now.

IT 189
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Quantifying Risks to Make the Right Cybersecurity Investments

Data Breach Today

CRQ Can Help Organizations Optimize Investment, Improve Resilience, Manage Threats When executives fully understand the potential impact and cost of cyberthreats, they can better assign the necessary resources to combat them. Learn about how Verizon's CRQ can help to improve an organization's cybersecurity investments and resilience.

article thumbnail

A third of all Gen AI projects will be abandoned, says Gartner

Collaboration 2.0

The high upfront cost of deployment is one of the challenges that can doom generative AI projects.

189
189
article thumbnail

Verkada Agrees to $2.95M Civil Penalty With US FTC

Data Breach Today

Cloud-Based Security Camera Firm Pledges Better Security in US FTC Settlement A California security camera company agreed to pay a $2.95 million civil penalty and implement a security program after hackers in 2021 accessed video from 150,000 internet-connected security cameras, including from devices placed inside psychiatric hospitals and women's health clinics.

Cloud 162
article thumbnail

I tested Google's $1,800 Pixel 9 Pro Fold for a week, and I'm ready to ditch Samsung

Collaboration 2.0

The successor to last year's Pixel Fold has brighter displays, a lighter form factor, and AI features meant for the big screen, but you'll still have to pay to play.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

List of Old NSA Training Videos

Schneier on Security

The NSA’s “ National Cryptographic School Television Catalogue ” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a bunch explaining the operations of various cryptographic equipment, and a few code words I have never heard of before.

FOIA 127
article thumbnail

5 new (and handy) Android features to look forward to this month

Collaboration 2.0

The new September patch for Android introduces new ways to look up music, help select groups navigate the internet, and more.

189
189
article thumbnail

Organizations in the Middle East Targeted By Malware Impersonating Palo Alto GlobalProtect VPN

KnowBe4

A social engineering campaign is targeting entities in the Middle East using malware that impersonates Palo Alto Networks’ GlobalProtect VPN, according to researchers at Trend Micro.