Wed.Oct 09, 2024

article thumbnail

U.S. CISA adds Windows and Qualcomm bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Windows and Qualcomm bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-43047 Qualcomm Multiple Chipsets Use-After-Free Vulnerability CVE-2024-43572 Microsoft Windows Management Console Remote Code Execution Vulnerability CVE-2024-43573 Microsoft Windows MSHTML Platf

IT 337
article thumbnail

US DOJ Developing Guidelines for AI Use in Law Enforcement

Data Breach Today

Justice Department Aiming to Emphasize Privacy and Security in AI Deployment The U.S. Department of Justice is drafting new guidelines for law enforcement on the use of artificial intelligence and facial recognition tools to enhance public safety while safeguarding civil rights and ensuring ethical deployment, a senior official said Wednesday.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Palo Alto fixed critical flaws in PAN-OS firewalls that allow for full compromise of the devices

Security Affairs

Palo Alto fixed critical flaws in PAN-OS firewalls, warning that attackers could chain these vulnerabilities to hijack the devices. Palo Alto Networks addressed multiple vulnerabilities that an attacker can chain to hijack PAN-OS firewalls. The vulnerabilities reside in the Palo Alto Networks’ Expedition solution, which is a migration tool designed to help organizations move configurations from other firewall platforms (like Check Point, Cisco, and others) to Palo Alto’s PAN-OS. R

Passwords 314
article thumbnail

Australia May Require Businesses to Report Ransom Payments

Data Breach Today

Cyber Bill Says the Government Can't Use Information to Prosecute Victims Ransom payments are typically tightly held secrets between cybercriminals and their victims, but the Australian government has introduced a cybersecurity bill in Parliament that would require require larger businesses to report ransom payments to the government.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Cybercriminals Are Targeting AI Conversational Platforms

Security Affairs

Resecurity reports a rise in attacks on AI Conversational platforms, targeting chatbots that use NLP and ML to enable automated, human-like interactions with consumers. Resecurity has observed a spike in malicious campaigns targeting AI agents and Conversational AI platforms that leverage chatbots to provide automated, human-like interactions for consumers.

More Trending

article thumbnail

Awaken Likho APT group targets Russian government with a new implant

Security Affairs

A threat actor tracked as Awaken Likho is targeting Russian government agencies and industrial entities, reported cybersecurity firm Kaspersky. A recent investigation by Kaspersky researchers into the APT group Awaken Likho (aka Core Werewolf and PseudoGamaredon) uncovered a new campaign from June to August 2024, showing a shift from UltraVNC to the MeshCentral platform for remote access.

article thumbnail

Human Security Raises $50M+ to Take on Click-Fraud Defense

Data Breach Today

WestCap-Led Funding to Drive Click-Fraud Protection, Ad Integrity Expansion Human Security's recent $50 million growth funding, led by WestCap, will drive the development of click-fraud defense and enhance advertising integrity solutions. CEO Stu Solomon aims to leverage the funding for scaling the engineering and data science teams, addressing emerging fraud threats.

article thumbnail

Lamborghini Carjackers Lured by $243M Cyberheist

Krebs on Security

The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later — while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.

Paper 286
article thumbnail

County 911 Service Notifying 180,000 About Breach in July

Data Breach Today

Compromised Patient Info Dates Back to 2011 at Muskogee City County 911 Service An Oklahoma county provider of medical, fire, police and other 911 emergency services is notifying 180,000 individuals that their health information may have been compromised in a recent ransomware attack. The incident affects patients receiving emergency medical care as far back as 2011.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Internet Archive Breach Exposes 31 Million Users

WIRED Threat Level

The hack exposed the data of 31 million users as the embattled Wayback Machine maker scrambles to stay online and contain the fallout of digital—and legal—attacks.

Archiving 226
article thumbnail

UK to Continue Disruptive Actions Targeting Cybercrime

Data Breach Today

Stephen Doughty Says Cybersecurity Vital to National And Economic Security The British government will continue disruptive actions against ransomware and malware operators, a top U.K. government official vowed Wednesday. Stephen Doughty, Minister of State, said the recently elected U.K. government views security as a core pillar of economic and strategic growth.

article thumbnail

69,000 Bitcoins Are Headed for the US Treasury—While the Agent Who Seized Them Is in Jail

WIRED Threat Level

The $4.4 billion in crypto is set to be the largest pile of criminal proceeds ever sold off by the US. The former IRS agent who seized the recording-breaking sum, meanwhile, languishes in a Nigerian jail cell.

article thumbnail

Career Spotlight: The Growing Demand for OT Security Experts

Data Breach Today

Critical Infrastructure Firms Are Hiring - and Paying Well As digital transformation continues to reshape industries, the convergence of operational technology and cybersecurity has emerged as a critical area of focus. But there's a noticeable gap in the workforce. Professionals who truly understand both OT and cybersecurity are in short supply.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Nearly half off a Samsung 75-inch QLED TV? October Prime Day offers just that

Collaboration 2.0

Samsung's Neo QLED 4K TV is 44% off during Amazon Prime Day 2. But hurry, because this deal will likely expire tonight.

221
221
article thumbnail

Malicious Pixels: Criminals Revamp QR Code Phishing Attacks

Data Breach Today

Attackers Use ASCII Characters to Create Tough-to-Spot QR Codes, Barracuda Warns Attackers are moving beyond using QR code images added to phishing emails to trick victims into visiting malicious sites, and using ASCII "full block" characters to build working QR codes designed to evade optical character recognition defenses, warns cybersecurity firm Barracuda Networks.

Phishing 285
article thumbnail

If you're a Marriott customer, FTC says the breach-plagued hotel chain owes you

Collaboration 2.0

Following a settlement with the FTC, the hotel chain must implement a host of security changes and provide help to customers affected by the string of data breaches.

article thumbnail

Ivanti CSA Customers Targeted in New Zero Day Attacks

Data Breach Today

Attackers Chain Three Security Flaws with Patched Admin Bypass Vulnerability Internet appliance maker Ivanti warned customers Tuesday that attackers are actively exploiting new vulnerabilities in Cloud Services Appliance instances by chaining three security flaws with a zero-day patched in September. The company advised customers to update to version 5.0.

Cloud 271
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Starlink's Hurricane relief offer is not quite as free as advertised

Collaboration 2.0

It sounded good, but a closer look revealed that SpaceX's Starlink free offer isn't much more than clever marketing.

Marketing 190
article thumbnail

Hurricane Deepfakes Flood Social Media

KnowBe4

As the recent hurricane Helene caused major damage and as hurricane Milton is expected to make landfall in Florida soon, deepfakes are spreading misinformation on social media.

119
119
article thumbnail

How to set up and and use your phone's lifesaving emergency features

Collaboration 2.0

Satellite messaging and emergency contact details are lifesaving features found in modern smartphones.

190
190
article thumbnail

Top Trends in the European Digital Health/AI Market

Data Matters

Digital health AI technologies are transforming the advancement of drug development and healthcare delivery at an unprecedented speed, backed by governments facilitating the momentum to improve healthcare for their growing populations. Sidley’s European life sciences lawyers Josefine Sommer, Eva von Mühlenen, and Francesca Blythe share a timely take on the top 5 life sciences industry trends being shaped by pioneering digital technologies.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

How to use your iPhone's emergency satellite features if you lose cell coverage

Collaboration 2.0

On the iPhone 14 and up, Apple offers three features that can help you communicate with emergency services - and loved ones - via satellite if you're caught without cell or Wi-Fi coverage.

article thumbnail

Auto-Identification Smart Glasses

Schneier on Security

Two students have created a demo of a smart-glasses app that performs automatic facial recognition and then information lookups. Kind of obvious, but the sort of creepy demo that gets attention. News article.

84
article thumbnail

How to use Android's emergency satellite texting if you lose cell signal

Collaboration 2.0

Some Android devices have a new feature that lets you send a text message without a cell signal or Wi-Fi. Here's how to use it.

IT 190
article thumbnail

Best Secure Remote Access Software of 2025

eSecurity Planet

Remote access software can help you securely connect to your devices from wherever you may be. This can be helpful for both employees on the go and IT professionals trying to fix a coworker’s computer struggles while several hundred miles apart. This can be great for companies that employ many remote workers and want to secure their IT environment better.

Access 64
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

My 5 favorite Android apps for staying organized - and they're all free

Collaboration 2.0

Life gets busy - you might need an app or two to help keep you on top of everything. Here are the five Android apps I depend on, and why.

189
189
article thumbnail

Top Security Configuration Management Tools: Features & Comparisons

eSecurity Planet

According to research house Statista, DevOps and DevSecOps were the most prevalent software development environments used worldwide, combining for 47 percent of implementations in a 2022 survey. Configuration management tools are key to delivering the DevOps promise of shortened development windows and a pipeline of continuous integration and continuous deployment (CI/CD).

article thumbnail

Open-source AI definition finally gets its first release candidate - and a compromise

Collaboration 2.0

The OSI and allies are a step closer to an open-source artificial intelligence definition, and purists aren't the only ones unhappy.