Thu.Sep 05, 2024

article thumbnail

Quishing, an insidious threat to electric car owners

Security Affairs

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent years, the spread of electric cars has led to an increase in public charging stations. However, new cyber threats have emerged with this growth, including “quishing.” This term, a combination of “QR Code” and “phishing,” describes a scam in which fraudsters use counterfeit QR Codes to steal sensitive information

Phishing 328
article thumbnail

FEMA Has Begun Deploying Cyber Advisers to Disaster Zones

Data Breach Today

FEMA CIO: Cyber Advisers Provide Critical Security Guidance Amid Recovery Efforts Charles Armstrong, chief information officer of the Federal Emergency Management Agency, told the Billington Cybersecurity Summit his agency has begun deploying cyber advisors to disaster recovery zones to "rapidly and securely" build information technology and operational technology infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Earth Lusca adds multiplatform malware KTLVdoor to its arsenal

Security Affairs

The Chinese-speaking threat actor Earth Lusca used the new backdoor KTLVdoor in an attack against a trading company in China. Trend Micro Researchers spotted the Chinese-speaking threat actor Earth Lusca using a new multiplatform backdoor called KTLVdoor. The Earth Lusca group has been active since at least the first half of 2023, it primarily targeted organizations in Southeast Asia, Central Asia, and the Balkans.

IT 297
article thumbnail

Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team

WIRED Threat Level

Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world.

Military 296
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

I changed these 5 TV settings to instantly improve the picture quality - and you can too

Collaboration 2.0

With a bit of patience and experimentation, you can tweak your TV's basic settings for a better viewing experience.

246
246

More Trending

article thumbnail

New AirPods are arriving next week. Here are the top 4 features I want to see

Collaboration 2.0

Industry insiders are confident Apple will announce new AirPods next week during the iPhone 16 launch. Although that's exciting to hear, there are a few things I'd like to see first.

246
246
article thumbnail

Kaspersky US Customers Migrate to Pango's UltraAV After Ban

Data Breach Today

Kaspersky Hands Off 1 Million US Customers to UltraAV Amid Government Software Ban Kaspersky is transferring 1 million U.S. antivirus customers to Pango Group's UltraAV product following the Department of Commerce's ban on Kaspersky software sales or updates. The transition ensures users will continue to receive critical cybersecurity updates and services.

Sales 189
article thumbnail

I found the AirTags that Android users have been waiting for

Collaboration 2.0

Chipolo's latest One and Card trackers are perfect for keys and wallets that have a habit of going astray.

246
246
article thumbnail

Banks Brace for DORA Cybersecurity Deadline on Jan. 17

Data Breach Today

New EU Rules Focus on Operational Resilience, Breach Reporting and Third-Party Risk The Digital Operational Resilience Act aims to reshape the financial services industry by introducing strict cybersecurity standards. Financial institutions must comply with the new rules by Jan. 17, 2025, or face severe penalties, said Richard Breavington, head of cyber and tech insurance at RPC.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The new Soundcore Space One Pro are smaller and mightier in all the right ways

Collaboration 2.0

Soundcore's new Space One Pro headphones boast eight hours of runtime after only a quick five-minute charge. When folded up, they are about the size of a donut.

245
245
article thumbnail

US Broadens Indictments Against Russian Intelligence Hackers

Data Breach Today

Justice Department Adds Russian Intelligence Officers to Ukraine Hacking Indictment The United States announced a superseding indictment Thursday that adds five Russian military intelligence officers as defendants while warning that Kremlin cyberthreat actors continue to target U.S. and global critical infrastructure.

Military 182
article thumbnail

Qualcomm's secret project with Samsung and Google is mixed reality smart glasses, and I'm glad

Collaboration 2.0

Qualcomm CEO Cristiano Amon confirmed with CNBC that the joint venture is now for a pair of glasses powered by your smartphone.

190
190
article thumbnail

Cryptohack Roundup: Focus on Pig Butchering

Data Breach Today

Also: Hacker Launders Stolen WazirX Funds; Galois, Uniswap Settlements This week, pig-butchering scams and bitcoin ATM scams increased, an update in the FTX case, stolen WazirX funds were laundered, settlements in the SEC-Galois and CFTC-Uniswap cases, Scotland seized crypto in a robbery, North Korea targeted Web3 staff, and the Mt. Gox CEO launched a new crypto firm.

182
182
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

I went hands-on with Lenovo's auto-swiveling laptop at IFA 2024, and it's quite the spectacle

Collaboration 2.0

Lenovo's latest Intel ThinkBooks can rotate 270 degrees and open and close on their own, raising some interesting questions -- good and bad.

IT 190
article thumbnail

Former OpenAI Scientist's Startup Raises $1B Seed Funding

Data Breach Today

Ilya Sutskever Aims to Build Safe, Super-Intelligent AI A three-month-old startup promising safe artificial intelligence raised $1 billion in an all-cash deal in a seed funding round. Co-founded by former OpenAI Chief Scientist Ilya Sutskever, Safe Superintelligence will reportedly use the funds to acquire computing power.

article thumbnail

I changed 10 settings on my Android phone to dramatically improve battery life

Collaboration 2.0

There are numerous ways to improve the battery life on your Android, but I've sifted through them all to highlight the most effective - plus an obvious bonus.

190
190
article thumbnail

YubiKeys Are a Security Gold Standard—but They Can Be Cloned

WIRED Threat Level

Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack.

Security 170
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The rise and fall in programming languages' popularity since 2016 - and what it tells us

Collaboration 2.0

Our latest deep dive crunches the numbers from 2016 to 2024, revealing fascinating insights into the popularity of programming languages and how emerging trends and industry shifts have influenced developer preferences.

IT 190
article thumbnail

Why It's So Hard to Fully Block X in Brazil

WIRED Threat Level

With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks.

IT 161
article thumbnail

11 hidden Windows touchpad tricks power users need to know

Collaboration 2.0

Touchpad or trackpad? Whatever you call it, these 11 tricks can help you work smarter on a Windows laptop.

IT 189
article thumbnail

Phishing is Still the Top Initial Access Vector

KnowBe4

Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly.

Phishing 126
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Firefox now lets you access your favorite AI chatbot without switching tabs - here's how

Collaboration 2.0

With Firefox version 130, you can access ChatGPT, Google Gemini, or another AI directly from the sidebar.

Access 189
article thumbnail

Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks

KnowBe4

A new attack runs slow and steady, focused on compromising large manufacturing companies using contextual social engineering to trick victims into giving up credentials.

article thumbnail

I demoed Lenovo's auto-swiveling ThinkBook at IFA 2024, and it's as bizarre as it sounds

Collaboration 2.0

Lenovo's new Intel ThinkBooks can rotate 270 degrees and open and close on their own, raising some interesting questions -- good and bad.

IT 189
article thumbnail

Tracelo Data Breach: 1.4 Million Records Exposed

eSecurity Planet

Data is the new gold, and breaches have become an unfortunate reality. A recent incident involving Tracelo, a popular smartphone geolocation tracking service, has exposed the personal information of over 1.4 million users. This breach, orchestrated by a hacker known as “Satanic,” highlights the vulnerability of even seemingly secure online platforms.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

6 ways to write better ChatGPT prompts - and get the results you want faster

Collaboration 2.0

There's an art to making the most of AI. Optimizing your inputs can improve ChatGPT's outputs. Here's how.

189
189
article thumbnail

Long Analysis of the M-209

Schneier on Security

Really interesting analysis of the American M-209 encryption device and its security.

article thumbnail

Former TV powerhouse Panasonic is back in the US with three new 4K TVs

Collaboration 2.0

Can Panasonic recapture its former American glory? The company says it's 'back and better than ever'.

IT 189