Wed.Sep 18, 2024

article thumbnail

Experts warn of China-linked APT’s Raptor Train IoT Botnet

Security Affairs

Researchers warn of a new IoT botnet called Raptor Train that already compromised over 200,000 devices worldwide. Cybersecurity researchers from Lumen’s Black Lotus Labs discovered a new botnet, named Raptor Train, composed of small office/home office (SOHO) and IoT devices. The experts believe the botnet is controlled by a Chine-linked APT group Flax Typhoon (also called Ethereal Panda or RedJuliett).

IoT 342
article thumbnail

Scam ‘Funeral Streaming’ Groups Thrive on Facebook

Krebs on Security

Scammers are flooding Facebook with groups that purport to offer video streaming of funeral services for the recently deceased. Friends and family who follow the links for the streaming services are then asked to cough up their credit card information. Recently, these scammers have branched out into offering fake streaming services for nearly any kind of event advertised on Facebook.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcom fixed Critical VMware vCenter Server flaw CVE-2024-38812

Security Affairs

Broadcom addressed a critical vulnerability in the VMware vCenter Server that could allow remote attackers to achieve code execution. Broadcom released security updates to address a critical vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), in VMware vCenter Server that could lead to remote code execution. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

Cloud 320
article thumbnail

Australian Police Arrest Alleged Head of Ghost Encrypted App

Data Breach Today

International Law Enforcement Dismantles End-to-End Encrypted Messaging Service An international law enforcement operation dismantled the Ghost encrypted messaging service in a takedown that resulted in the arrest of 51 suspects across three continents including alleged members of the Italian Mafia and motorcycle gangs. Australian police arrested Ghost's alleged administrator.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Credential Flusher, understanding the threat and how to protect your login data

Security Affairs

Credential Flusher is a method that allows hackers to steal login credentials directly from the victim’s web browser. The cyber attacks have become increasingly sophisticated, putting our personal information at risk. One of the latest and most insidious techniques is Credential Flusher, a method that allows hackers to steal login credentials directly from the victim’s web browser.

Passwords 314

More Trending

article thumbnail

Deal alert: Get a Shark handheld vacuum for $30 (50% off) right now

Collaboration 2.0

An extra coupon code brings down the already discounted Shark Cyclone PET handheld vacuum to only $30.

246
246
article thumbnail

Chinese Hackers Build Massive Botnet Targeting US Devices

Data Breach Today

Global Botnet's Victims Are in United States, Germany, Romania and Hong Kong FBI Director Christopher Wray said Wednesday the bureau seized control of a Chinese-developed botnet that maintained access to thousands of compromised devices across the globe as part of an effort to launch widespread disruptive cyberattacks. The botnet is a Mirai variant.

Access 278
article thumbnail

I added 1TB of storage to my sluggish PC with this thumb-sized accessory

Collaboration 2.0

If you're dealing with a laggy PC, the PNY 1TB storage drive can speed up your system with added storage. And it dealt with my stress tests exceedingly well.

IT 246
article thumbnail

How Mega Attacks Are Spotlighting Critical 3rd-Party Risks

Data Breach Today

Recent mega data breaches involving third-party vendors - such as the Change Healthcare cyberattack - are intensifying the spotlight on critical security risk management and governance issues for business associates and other suppliers, said regulatory attorney Rachel Rose.

Risk 276
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Move over, Sonos. Bose just announced its own twist to headphones and soundbar compatibility

Collaboration 2.0

The new Bose Smart Soundbar debuts with two new software features, one of which is a direct response to Sonos' TV Audio Swap.

IT 246
article thumbnail

California Enacts Laws to Combat Election, Media Deepfakes

Data Breach Today

Laws Seek Removal of Deceptive Content, Labeling of Less Malicious Content California enacted regulation to crack down on the misuse of artificial intelligence as Gov. Gavin Newsom on Tuesday signed five bills focused on curbing the impact of deepfakes. The Golden State has been on the national forefront of tech regulation.

article thumbnail

The 2-in-1 laptop I recommend most is not a Lenovo or a Dell (and its price continues to drop)

Collaboration 2.0

The 2024 HP Envy x360 2-in-1 stands out from a sea of similar devices with its well-optimized hardware, vibrant displays, and low cost.

IT 246
article thumbnail

Beware the Great AI Bubble Popping

Data Breach Today

Crashing Markets, Slower Innovation, But More Sustainable AI Development If the bubble isn't popping already, it'll pop soon, say many investors and close observers of the AI industry. If past bubbles are a benchmark, the burst will filter out companies with no solid business models and pave the way for more sustainable growth for the industry in the long term.

Marketing 266
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Step aside, Sonos. Bose delivers another path to headphone and soundbar compatibility

Collaboration 2.0

The new Bose Smart Soundbar debuts with two new software features, one of which is a direct response to Sonos' TV Audio Swap.

246
246
article thumbnail

Intezer's $33M Series C Funding to Fuel AI, Customer Support

Data Breach Today

Norwest Money Fuels Integration of Cloud Defense Tools, Autonomous Alert Management Norwest Venture Partners led a $33 million Series C round to accelerate Intezer's product development, strengthen AI models and broaden security alert coverage. The funding will enable the New York-based company to offer more support for cloud security while growing its customer success teams.

Cloud 263
article thumbnail

Google Veo is coming to YouTube, bringing dynamic AI backgrounds to Shorts

Collaboration 2.0

Later this year, content creators and users will be able to generate more interesting backdrops with an upgraded Dream Screen feature.

244
244
article thumbnail

Swiss Post to Strengthen Cybersecurity With Open Systems Buy

Data Breach Today

Acquisition Set to Boost SASE Protection, Network Connectivity for Swiss Businesses Swiss Post has signed an agreement to acquire Open Systems, a cybersecurity leader specializing in secure access service edge. The deal, expected to close by late 2024, will expand Swiss Post's offerings for secure digital communications for public and private organizations across Switzerland.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Walkie-Talkies Explode in New Attack on Hezbollah

WIRED Threat Level

In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths.

Security 228
article thumbnail

20 years later, real-time Linux makes it to the kernel - really

Collaboration 2.0

The work done on real-time Linux has benefitted the open-source OS for years, but it was only this week that Linus Torvalds admitted its last piece into the mainline kernel. Exactly what took so long?

IT 190
article thumbnail

Did a Chinese University Hacking Competition Target a Real Victim?

WIRED Threat Level

Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there.

Military 193
article thumbnail

How to turn your old Android phone into a security or pet camera

Collaboration 2.0

Need to keep an eye on something in your house or business, but can't be in two places at once? This free app makes it easy to set up a simple remote camera using any old Android phone.

Security 190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

News alert: INE Security’s cybersecurity training service earns 2024 SC Excellence Award

The Last Watchdog

Cary, NC, Sept.18, 2024, CyberNewsWire — INE Security is proud to announce that it has been named a winner in the prestigious 2024 SC Awards, named Best IT Security-Related Training Program. This designation underscores INE Security’s commitment to excellence and leadership in the cybersecurity industry. The SC Awards , now in its 27th year, recognize the solutions, organizations, and individuals that have demonstrated outstanding achievement in advancing the security of information system

article thumbnail

My biggest regret with upgrading my iPhone to iOS 18 (and I'm not alone)

Collaboration 2.0

I've been using the iOS 18 beta for a couple of months, and the redesigned Photos app has become my biggest gripe with the new software update.

190
190
article thumbnail

SANS Releases Guide to Address Rise in Attacks on Manufacturing and Industrial Control Systems

KnowBe4

Increased ransomware attacks on industrial control systems (ICS), mixed with general ICS insecurity found across the manufacturing sector, has given rise to a guide specifically addressing this risk.

article thumbnail

NordVPN review: Consistent speed and performance from one of our favorite VPNs

Collaboration 2.0

We extensively tested NordVPN to see how it performs in terms of speed, security, and features.

Security 190
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

U.S. Government Indicts Chinese National For Alleged Spear Phishing Attacks

KnowBe4

The U.S. Justice Department has indicted a Chinese national, Song Wu, for allegedly sending spear phishing emails to employees at various U.S. military and government entities, research institutions and private companies.

Phishing 122
article thumbnail

20 Years in the making: Real-Time Linux finally makes it to the kernel

Collaboration 2.0

The work done on real-time Linux has benefitted the OS almost since the start, but it was only the other day that Torvalds finally admitted its last piece into the mainline kernel.

IT 189
article thumbnail

North Korean Hackers Target Software Developers With Phony Coding Tests

KnowBe4

Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews.

Security 122