Mon.Sep 16, 2024

article thumbnail

Recently patched Windows flaw CVE-2024-43461 was actively exploited as a zero-day before July 2024

Security Affairs

Microsoft warns that a recently patched Windows flaw, tracked as CVE-2024-43461, was actively exploited as a zero-day before July 2024. Microsoft warns that attackers actively exploited the Windows vulnerability CVE-2024-43461 as a zero-day before July 2024. The vulnerability CVE-2024-43461 is a Windows MSHTML platform spoofing issue. MSHTML is a platform used by Internet Explorer.

Archiving 340
article thumbnail

More US Sanctions Against Predator Spyware Maker Intellexa

Data Breach Today

Intellexa Poised for a Comeback, Warn Researchers The U.S. Department of the Treasury ramped up pressure on makers and sellers of Predator commercial spyware through sanctions on five individuals and a Caribbean company accused of enabling tens of millions of dollars of surveillance malware transactions.

276
276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker tricked ChatGPT into providing detailed instructions to make a homemade bomb

Security Affairs

A hacker tricked ChatGPT into providing instructions to make homemade bombs demonstrating how to bypass the chatbot safety guidelines. A hacker and artist, who goes online as Amadon, tricked ChatGPT into providing instructions to make homemade bombs bypassing the safety guidelines implemented by the chatbot. Initially, the expert asked for detailed instructions to create a fertilizer bomb similar to the one used in the 1995 Oklahoma City bombing, but the chatbot refused due to ethical responsibi

Mining 336
article thumbnail

Ivanti Vulnerability Again Forces Emergency Patches

Data Breach Today

Cloud Service Appliance Admin Panels Exposed a Pathway to the Internet for Hackers Customers of internet appliance maker Ivanti face yet another hackable vulnerability. The Utah company warned customers Friday about exploitation of a Cloud Service Appliance detected in the wild. Ivanti said the vulnerability doesn't affect version 5; it released a patch on Sept. 10.

Cloud 269
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

SolarWinds fixed critical RCE CVE-2024-28991 in Access Rights Manager

Security Affairs

SolarWinds addressed a critical remote code execution vulnerability, tracked as CVE-2024-28991, in Access Rights Manager. SolarWinds released security updates to address a critical-severity remote code execution vulnerability, tracked as CVE-2024-28991 (CVSS score of 9.0), in SolarWinds Access Rights Manager (ARM) The flaw is a deserialization of untrusted data remote code execution vulnerability that impacts ARM 2024.3 and prior versions. “SolarWinds Access Rights Manager (ARM) was found

Access 335

More Trending

article thumbnail

D-Link addressed three critical RCE in wireless router models

Security Affairs

D-Link fixed multiple critical flaws in its WiFi 6 routers that allow remote attackers to execute arbitrary code or gain hardcoded credentials. D-Link has addressed three critical vulnerabilities, tracked as CVE-2024-45694 , CVE-2024-45695 , CVE-2024-45697 , impacting three wireless router models. The flaws can allow attackers to remotely execute arbitrary code or access the devices using hardcoded credentials.

article thumbnail

Amazon Alexa can now be controlled by thought alone - thanks to this brain implant

Collaboration 2.0

With this new accessibility innovation from Synchron, the entire Amazon smart home ecosystem can be controlled hands-free and voice-free.

Access 246
article thumbnail

Apple dismisses lawsuit against surveillance firm NSO Group due to risk of threat intelligence exposure

Security Affairs

Apple drops its lawsuit against commercial spyware vendor NSO Group, due to the risk of “threat intelligence” information exposure. Apple is seeking to drop its lawsuit against Israeli spyware company NSO Group , citing the risk of “threat intelligence” information exposure. Apple wants to dismiss its lawsuit against NSO Group due to three key developments.

Risk 296
article thumbnail

The best iOS 18 features that will make updating your iPhone worthwhile

Collaboration 2.0

Here are the best new features coming with Apple's latest software version, available for the iPhone 16 and older models.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Apple’s New Passwords App May Solve Your Login Nightmares

WIRED Threat Level

Apple is launching its first stand-alone password manager app in iOS 18. Here’s what you need to know.

Passwords 183
article thumbnail

Is your Windows license legal? Should you even care?

Collaboration 2.0

Microsoft has made Windows licensing and activation ridiculously complex. Here's what you need to know.

246
246
article thumbnail

US Indicts Chinese National for Phishing for NASA Tech

Data Breach Today

At-Large Wu Song, 39, Faces 28-Count Criminal Indictment U.S. federal prosecutors indicted a Chinese national employed by a state-owned aerospace and defense conglomerate with a yearslong phishing campaign aimed at extracting software developed for NASA. Prosecutors said Song began sending out targeted emails in 2017.

Phishing 173
article thumbnail

The 5 best Linux distributions for students - from middle school to college

Collaboration 2.0

Linux distros are ideal operating systems for educational environments for multiple reasons. A big one is that they're 100% free to download.

Education 246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Why Thoma Bravo Is Considering Taking SailPoint Public Again

Data Breach Today

Repeat IPOs Have Been Very Rare in Security. Don't Expect SailPoint to Change That. Thoma Bravo has begun interviewing underwriters as it explores an initial public offering for SailPoint, Bloomberg reported last week. The private equity firm hasn't finalized details, including the timing of a potential listing for the identity governance and administration vendor.

article thumbnail

Apple Watch gets FDA approval for new sleep apnea detection

Collaboration 2.0

This new WatchOS 11 feature will detect if you have abnormal breathing patterns while you sleep. Here's why this metric matters and which models will have it.

IT 246
article thumbnail

China Using Powerful Hacking Firms to Run Its Espionage War

Data Breach Today

5 Cybersecurity Firms Provide Large Pool of Government-Funded Espionage Resources China's cyberespionage campaigns, viewed as an extension of the communist regime's wider geopolitical moves, rely on civilian hackers from domestic security firms for much of their success. Researchers say these groups face off in intense rivalries for lucrative government contracts.

IT 162
article thumbnail

Linus Torvalds muses about maintainer gray hairs and the next 'King of Linux'

Collaboration 2.0

Live from Vienna, it's the Linus Torvalds and Dirk Hohndel show! This time, they're talking RTLinux, Rust, maintainer burnout, and succession planning.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Breach-Weary Snowflake Moves to MFA, 14-Character Passwords

Data Breach Today

New Security Measures Follow High-Profile Hacks of Snowflake Customers Data warehousing platform Snowflake rolled out default MFA - as well as a 14-character password minimum - to shore up security in the wake of a series of cyberattacks in June that hit high-profile customers including Santander Bank, Advance Auto Parts, LA Unified School District and Neiman Marcus.

Passwords 162
article thumbnail

Linux kernel 6.11 is out - with its own BSOD

Collaboration 2.0

The latest Linux kernel release spotlights many improvements for Arch Linux users and AMD hardware. Here's what you can expect.

IT 190
article thumbnail

CloudImposer RCE Vulnerability Targets Google Cloud Platform

Data Breach Today

Attackers Could Exploit Flaw to Run Malicious Code on Google' s, Customers' Servers Google patched a critical remote execution vulnerability in its cloud platform Cloud Composer service, "CloudImposer," which could have allowed attackers to compromise millions of servers, say researchers from Tenable. The CloudImposer vulnerability could lead to the Jenga Tower effect.

Cloud 162
article thumbnail

The Linux file system structure explained

Collaboration 2.0

If you're new to Linux, knowing how the file system is laid out will alleviate some confusion.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

AI and Cyber Security: Innovations & Challenges

eSecurity Planet

As cyber threats become increasingly sophisticated, integrating artificial intelligence (AI) into cybersecurity is more than a passing trend — it’s a groundbreaking shift in protecting our digital assets. As cyber-attacks grow increasingly complex, leveraging AI becomes crucial for staying ahead of emerging threats. Let’s dive into how AI and cybersecurity are transforming in today’s highly modern and complex times, explore their benefits and challenges, and see how they shape the fu

Security 135
article thumbnail

Is Microsoft really going to cut off security updates for your 'unsupported' Windows 11 PC?

Collaboration 2.0

Microsoft's stern warnings are designed to scare you into thinking you'll be punished for installing Windows 11 on a PC that doesn't meet its strict compatibility standards. Here's why that's unlikely to happen.

Security 190
article thumbnail

News alert: Entro Security Labs report reveals pervasive exposures in ‘Non-Human Identities’

The Last Watchdog

Boston, MA, Sept. 16, 2024, CyberNewsWire — Entro Security , pioneer of the award-winning Non-Human Identity (NHI) and Secrets Management platform, today released its research report, “ 2025 State of Non-Human Identities and Secrets in Cybersecurity.” The Entro Security Lab found that 97% of NHIs have excessive privileges increasing unauthorized access and broadening the attack surface, and 92% of organizations are exposing NHIs to third parties, also resulting in unauthorized access if th

Security 130
article thumbnail

Microsoft Copilot's Wave 2 is here. Everything you need to know

Collaboration 2.0

Microsoft has released several Copilot upgrades to compete with OpenAI's models.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Authorized Push Payment Fraud Responsible for Over Half of U.K. Frauds and Scams

KnowBe4

Research from The Financial Ombudsman Service, a U.K. based organization dedicated to helping citizens with free financial advice, has found an increase in Authorized Pushed Payment (APP) scams. These attacks are rising both in number and sophistication.

Security 122
article thumbnail

iOS 17.7 rolls out this week - here's why it might be a safer bet than iOS 18

Collaboration 2.0

iOS 17.7 will introduce multiple fixes and patches to iPhones, allowing users to stick with the older generation just a little while longer.

IT 189
article thumbnail

New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them

KnowBe4

The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data.