Mon.Jul 22, 2024

article thumbnail

SocGholish malware used to spread AsyncRAT malware

Security Affairs

The JavaScript downloader SocGholish (aka FakeUpdates) is being used to deliver the AsyncRAT and the legitimate open-source project BOINC. Huntress researchers observed the JavaScript downloader malware SocGholish (aka FakeUpdates ) that is being used to deliver remote access trojan AsyncRAT and the legitimate open-source project BOINC (Berkeley Open Infrastructure Network Computing Client).

article thumbnail

CrowdStrike Disruption Restoration Is Taking Time

Data Breach Today

Microsoft's Tool Requires Physical Access, a 'Time-Consuming and Laborious Task' Microsoft's statement that a faulty CrowdStrike update affected less than 1% of active Windows systems doesn't tell the full story, since large organizations in critical sectors make up a disproportionate part of the user base, as the outages in healthcare, transportation and banking demonstrate.

Access 313
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EvilVideo, a Telegram Android zero-day allowed sending malicious APKs disguised as videos

Security Affairs

EvilVideo is a zero-day in the Telegram App for Android that allowed attackers to send malicious APK payloads disguised as videos. ESET researchers discovered a zero-day exploit named EvilVideo that targets the Telegram app for Android. The exploit was for sale on an underground forum from June 6, 2024, it allows attackers to share malicious Android payloads via Telegram, disguising them as multimedia files.

Sales 335
article thumbnail

Fake Websites, Phishing Appear in Wake of CrowdStrike Outage

Data Breach Today

Authorities Warn About Domains Targeting Victims Seeking to Restore Windows Devices Cybercriminals are exploiting the chaos created by the CrowdStrike outage by launching fake websites and phishing campaigns to trick victims into downloading malware or divulging sensitive information, according to the U.S. Cybersecurity and Infrastructure Security Agency and others experts.

Phishing 297
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

UK police arrested a 17-year-old linked to the Scattered Spider gang

Security Affairs

Law enforcement arrested a 17-year-old boy from Walsall, U.K., for suspected involvement in the Scattered Spider cybercrime syndicate. Law enforcement in the U.K. arrested a 17-year-old teenager from Walsall who is suspected to be a member of the Scattered Spider cybercrime group (also known as UNC3944 , 0ktapus ). The arrest is the result of a joint international law enforcement operation carried out by the U.K.

More Trending

article thumbnail

How to stop spam texts on your iPhone in 3 easy steps

Collaboration 2.0

It only takes one minute to remove one of the iPhone's most annoying traits: spam text messages. Here's how to stop them once and for all.

IT 246
article thumbnail

E-Prescription Vendor Breach Affects 12.9 Million Aussies

Data Breach Today

MediSecure Data Theft Has an Impact on Nearly Half of Australia's Population Hackers stole sensitive information belonging to roughly half of Australia's population during an April ransomware attack against e-prescription firm MediSecure, which says it can't afford the incident's "significant" response costs. The company has announced its liquidation.

article thumbnail

The best GaN chargers of 2024: Expert tested

Collaboration 2.0

Need a new charger? We tested the best gallium nitride (GaN) chargers for your smartphone from brands like Ugreen, Anker, Satechi, and more.

190
190
article thumbnail

CrowdStrike's Response to Outage Will Minimize Lost Business

Data Breach Today

Technical Analysts Emphasize Need for Enhanced Security Testing, Quality Assurance CrowdStrike must enhance testing and validation procedures and address deficiencies in its current quality assurance processes to minimize attrition. CrowdStrike should conduct a technical retrospective to understand the root cause of the faulty software content update and make necessary changes.

Security 277
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The best satellite phones of 2024: Expert tested and reviewed

Collaboration 2.0

I tested the best satellite phones and communicators from brands like Garmin and Motorola, which offer features like messaging, live tracking, and SOS capabilities.

article thumbnail

Response and Remediation: How CIOs Reacted to IT Outage

Data Breach Today

CIOs Recommend Resilience Strategies in the Wake of Global CrowdStrike Outage Global CIOs said the fallout from the CrowdStrike outage could have been mitigated by investing in comprehensive data resilience that can help restore corrupted data through orchestrated recovery. It can help recover from disasters such as ransomware, data corruption and catastrophic events.

IT 263
article thumbnail

The best microSD cards of 2024: Expert tested

Collaboration 2.0

I went hands-on with the best microSD cards from SanDisk, Lexar, ProGrade, and more to help you choose the right storage option based on your needs.

190
190
article thumbnail

Phishing Attacks Will Likely Follow Last Week’s Global IT Outage

KnowBe4

Organizations should expect to see phishing attacks exploiting the global IT outage that occurred last Friday, the Business Post reports.

Phishing 124
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The best M.2 SSDs of 2024: Expert tested and reviewed

Collaboration 2.0

We went hands-on with tons of the best M.2 SSDs, subjecting them to rigorous stress tests and performance evaluations. These are our favorites.

189
189
article thumbnail

Vulnerability Recap 7/22/24 – CrowdStrike Issue Is One of Many

eSecurity Planet

The failed CrowdStrike sensor update that affected Windows systems may have put those computers at risk, but this is just one potential vulnerability during an interesting week. SolarWinds recently patched 13 vulnerabilities, and Ivanti has fixed yet another flaw in its Endpoint Manager product. The CISA requires federal agencies to patch their instances of GeoServer by August 5, and Wiz recently reported on a major AI model training vulnerability.

article thumbnail

The best laptops of 2024 under $1,000: Expert tested and reviewed

Collaboration 2.0

We tested the best laptops from Apple, Dell, HP, and more that deliver top-tier power, speed, and performance without breaking the bank.

190
190
article thumbnail

[Security Masterminds Podcast] Securing Software Over 50 Years: Reflections from an Industry Veteran

KnowBe4

Does the challenge of keeping up with cybersecurity trends sound familiar? You may have been told to update your antivirus software and hope for the best, only to find that your digital assets are still at risk.

Security 115
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Why don't more people use desktop Linux? I have a theory you might not like

Collaboration 2.0

There might be a very simple explanation for why the masses have yet to adopt Linux as their desktop operating system, which the open-source community won't like.

190
190
article thumbnail

Snake Mimics a Spider

Schneier on Security

This is a fantastic video. It’s an Iranian spider-tailed horned viper ( Pseudocerastes urarachnoides ). Its tail looks like a spider, which the snake uses to fool passing birds looking for a meal.

IT 106
article thumbnail

I improved my iPhone's battery life by changing these 10 settings

Collaboration 2.0

If you're barely making it through the day with your iPhone on a single charge, tweak these settings for a boost in battery life.

IT 190
article thumbnail

CrowdStrike’s Faulty Update Triggers Global Microsoft Outage

eSecurity Planet

A major tech disruption swept across the globe on July 19, as a widespread Microsoft outage crippled crucial services for businesses and individual users alike. The outage, which lasted for several hours, sent shockwaves through various sectors, causing significant delays, cancellations, and frustration. Airlines grounded flights as crucial check-in and flight management software malfunctioned, stranding passengers and throwing travel plans into disarray.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Forget Windows 11: Nobara Linux is the OS for everyone

Collaboration 2.0

If you've soured on Windows 11 and are looking for something that's more secure, reliable, customizable, and can serve as your gaming console, Nobara Linux might be it.

Security 190
article thumbnail

New from Collibra AI Governacne: Introducing the public beta of ML Platform integrations

Collibra

If you’re reading this, you’re likely one of the multitudes of people that are eagerly building and deploying AI models to help streamline operations, reduce costs, and offer customers and employees new and personalized experiences. You’re also probably wondering how best to govern all of the AI use cases you and your organization are deploying. Easy answer?

article thumbnail

What caused the great CrowdStrike-Windows meltdown of 2024? History has the answer

Collaboration 2.0

When a trusted software provider delivers an update that causes PCs to immediately stop working across the world, chaos ensues. Last week's incident wasn't the first such event. Here's how to make sure it doesn't happen again.

IT 190
article thumbnail

AI and the Digital Humanities at CILIP Conference 2024

CILIP

AI and the Digital Humanities at CILIP Conference 2024 Photo of Mia Ridge, Digital Curator at the British Library Digital Curator at the British Library, Mia Ridge reflects on the ‘AI and the digital humanities’ session at CILIP Conference 2024. This article is featured on the CILIP AI Hub I was invited to chair a session on 'AI and the digital humanities' at CILIP's 2024 conference with Ciaran Talbot (Associate Director AI & Ideas Adoption, University of Manchester Library) and Glen Robson

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Can't hear TV dialogue? 3 fixes to dramatically improve your television's audio - and 2 are free

Collaboration 2.0

A few simple adjustments can significantly impact how those important talk scenes sound.

189
189
article thumbnail

Shielding Your Network: Preparing for a Quantum-Safe Future Now

Thales Cloud Protection & Licensing

Shielding Your Network: Preparing for a Quantum-Safe Future Now josh.pearson@t… Tue, 07/23/2024 - 07:00 Imagine a world where your most sensitive data and your most secure communications are suddenly vulnerable. That's the future risk with the rise of quantum computers. These powerful machines threaten to break the encryption algorithms that safeguard our data in transit.

article thumbnail

How 'bubbling' Android messages can simplify your text life

Collaboration 2.0

This hidden Google Messages feature is a game-changer for staying on top of important text message conversations. Here's how to enable it and why you should.

IT 189