Tue.Oct 22, 2024

article thumbnail

VMware failed to fully address vCenter Server RCE flaw CVE-2024-38812

Security Affairs

VMware addressed a remote code execution flaw, demonstrated in a Chinese hacking contest, for the second time in two months. VMware failed to fully address a remote code execution flaw, tracked as CVE-2024-38812 (CVSS score: 9.8), in its vCenter Server platform. In September, Broadcom released security updates to the vulnerability CVE-2024-38812. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

article thumbnail

The Shitposting Cartoon Dogs Sending Trucks, Drones, and Weapons to Ukraine’s Front Lines

WIRED Threat Level

The North Atlantic Fella Organization, which started as a way to fight Kremlin propaganda, has raised millions of dollars to send vital equipment directly to soldiers fighting Russia.

Security 333
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the ScienceLogic SL1 flaw CVE-2024-9537 (CVSS v4 score: 9.3) to its Known Exploited Vulnerabilities (KEV) catalog. ScienceLogic SL1 contains a vulnerability related to a third-party component.

IT 304
article thumbnail

Will the Real Satoshi Nakamoto Please Stand Up?

Data Breach Today

Why Peter Todd May Be Another Conspiracy Theory on the Bitcoin Creator Is Peter Todd truly Satoshi Nakamoto, or just the next name in a long list of conspiracy theories that are eventually debunked? The HBO documentary's claim is far from conclusive, despite an eyebrow-raising moment in the film, where Todd admits to being Nakamoto on camera, seemingly tongue in cheek.

297
297
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Experts warn of a new wave of Bumblebee malware attacks

Security Affairs

Experts warn of a new wave of attacks involving the Bumblebee malware, months after Europol’s ‘ Operation Endgame ‘ that disrupted its operations in May. The Bumblebee malware loader has resurfaced in new attacks, four months after Europol disrupted it during “ Operation Endgame ” in May. Bumblebee has been active since March 2022 when it was spotted by Google’s Threat Analysis Group (TAG), experts noticed that cybercriminal groups that were previously using the

More Trending

article thumbnail

Critical OPA Vulnerability Exposes Windows Credentials

Data Breach Today

Attackers Could Exploit Flaw to Relay Credentials, Compromise Systems A critical vulnerability in Open Policy Agent could expose NTLM credentials from Windows systems, potentially affecting millions of users. Researchers at Tenable warn that attackers could exploit the flaw through social engineering. Users must update to version v0.68.0 immediately to mitigate risks.

Risk 290
article thumbnail

IBM doubles down on open source AI with new Granite 3.0 models

Collaboration 2.0

Big Blue's Granite LLMs are built for business and now they're available under the good old Apache 2.0 license.

246
246
article thumbnail

Socket Accelerates Open-Source Security With $40M Series B

Data Breach Today

Socket Plans to Triple Headcount After Big Growth, Deliver Open-Source Tools Faster A $40 million Series B investment will support Socket in rapidly scaling its team and product development. Following a 400% revenue increase, the company plans to build on its success by expanding its application security offerings and enterprise support for more programming languages.

Security 290
article thumbnail

Finally, an iPhone MagSafe car mount that charges fast while keeping things cool

Collaboration 2.0

ESR's latest Qi2 car mount can wirelessly charge your iPhone at 15W while keeping temperatures stabilized, thanks to its CryoBoost feature.

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Regulator Urges UK Banks to 'Help Foot the Bill' for Fraud

Data Breach Today

PSR's Kate Fitzgerald on Steps for Reducing APP Fraud, Complying With New Mandates While the U.K. Payment Systems Regulator is taking steps to ensure customers receive consistent treatment from banks, fraud protection still has inconsistencies. Several policies have been introduced to protect fraud victims, but consumers can't always count on them, said PSR’s Kate Fitzgerald.

288
288
article thumbnail

I actually want to put these $300 sleep earbuds in my ears every night

Collaboration 2.0

The Ozlo Sleep earbuds, developed by three ex-Bose engineers, are the best sleep earbuds I've tested.

246
246
article thumbnail

CEOs Levy, Thomas on Perks of $859M Sophos-Secureworks Deal

Data Breach Today

$859M Purchase Targets Secureworks’ XDR Platform to Enhance Sophos' MDR Offerings Sophos aims to strengthen its cybersecurity portfolio by acquiring Secureworks for $859 million, said CEOs Joe Levy and Wendy Thomas. The deal focuses on bringing together Secureworks' Taegis XDR platform and Sophos' existing MDR services to provide better cyber defense for businesses of all sizes.

article thumbnail

4 ways Android cameras are about to get better, thanks to Qualcomm - even for dogs

Collaboration 2.0

Photobombers and videobombers, goodbye. Tell your dogs we said hi, though.

246
246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Retaining EU Adequacy Crucial to UK Economy: Lawmaker

Data Breach Today

Europe Will Renew or Deny Data Sharing Agreement in June The U.K. government should work ahead of a June deadline to retain its status as a trusted host of European commercial and law enforcement data, urged the head of a parliamentary committee. The economic value of an EU "adequacy agreement" is "substantial," wrote Peter Ricketts.

article thumbnail

Navigating a Successful Career: Insights and Lessons Learned from a Woman in Information Management

AIIM

Today I’m sharing insights and experiences I've gained throughout my career. From taking on new challenges to dealing with workplace discrimination, these are tips for anyone looking to thrive in their professional life.

243
243
article thumbnail

Check Point, Mimecast Settle SEC Case From SolarWinds Hack

Data Breach Today

SEC: Check Point, Mimecast Disclosures Didn't Capture Severity of SolarWinds Hack Check Point and Mimecast will each pay regulators nearly $1 million to settle charges of making materially misleading disclosures related to the SolarWinds Orion hack. The SEC alleged public disclosures from Check Point and Mimecast didn't capture the severity of the compromise.

271
271
article thumbnail

Ecobee is partnering with Yale and August to expand its home security system

Collaboration 2.0

Ecobee is adding extra security measures to its system to create smarter integrations in a single-user experience.

IT 239
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Exploring the Latest Security Innovations at Hardwear.io

Data Breach Today

Annual Conference and Hackathon Showcases Solutions for Protecting IoT Devices Showcasing the latest innovations in hardware security, experts from more than 100 companies worldwide have gathered this week at Hardwear.io in Amsterdam. The annual event and hardware hackathon examines current and future challenges and solutions in hardware security.

Security 268
article thumbnail

AT&T and T-Mobile argue unlocked phones are bad for their customers - here's why

Collaboration 2.0

The FCC wants all phones to be unlocked after 60 days. Two major mobile carriers do not, but Verizon isn't one of them. Here are their arguments.

190
190
article thumbnail

ICS Detection Improves, Response Still Lacking

Data Breach Today

SANS Survey Finds Incident Detection Improving More incidents, vulnerability remediation timelines that can stretch into a year and mismatched budget priorities - such is the state of operational technology cybersecurity in 2024, according to participants in an annual SANS survey. Incident response remains a weak point.

article thumbnail

Microsoft blocks Windows 11 24H2 update for some PCs following bug onslaught

Collaboration 2.0

The latest Windows update glitch affects certain Asus PCs. Here's why you should avoid the update even if you don't have an affected model - and how to roll it back if you need to.

IT 190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Exposed United Nations Database Left Sensitive Information Accessible Online

WIRED Threat Level

More than 115,000 files related to UN Women included detailed financial disclosures from organizations around the world—and personal details and testimonials from vulnerable individuals.

Access 177
article thumbnail

The best Motorola phones of 2024: Expert tested and reviewed

Collaboration 2.0

We tested all the best Motorola phones on the market, from the Razr to the Moto G power. These are our top picks.

Marketing 190
article thumbnail

The power of observability: ensuring service availability and operational excellence

Reltio

System observability has emerged as a crucial practice in the modern digital landscape, where enterprises rely heavily on complex systems and distributed architectures. It goes beyond traditional monitoring to provide deeper insights into system performance, health, and behavior. This blog explores the importance of observability, best practices, and what large enterprises can do to ensure the availability and reliability of their services.

article thumbnail

Asana launches a no-code tool for designing AI agents - aka your new 'teammates'

Collaboration 2.0

Another AI agent builder joins the workforce. Here's how Asana's AI Studio works.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

OpenText unveils enhanced secure cloud platform for Managed Security Providers (MSPs) 

OpenText Information Management

OpenText™ has announced the new and improved Secure Cloud platform, designed specifically for Managed Security Providers (MSPs). Aiming to streamline operations, improve customer retention, and empower MSPs to focus on business growth while providing comprehensive security solutions. Addressing the demand for comprehensive security MSPs are experiencing more competition and increased client demand for a breadth of cybersecurity services.

Cloud 72
article thumbnail

The secret to successful digital initiatives is pretty simple, according to Gartner

Collaboration 2.0

Only 48% of digital initiatives meet or exceed their business outcome targets, but the successful ones seem to have one big thing in common.

189
189
article thumbnail

Data ready from day one

CILIP

Data ready from day one. Emma Thwaites, Director of Global Policy and Corporate Affairs at the Open Data Institute (ODI) will be appearing at this year’s Rewired conference. Here she looks at the how a National Data Library could work and what is needed for it to be a success. The idea of a National Data Library (NDL) emerged in the Labour Party Manifesto ahead of this year’s ­General Election.