Thu.Aug 29, 2024

article thumbnail

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa

Security Affairs

Russia-linked APT29 group was spotted reusing iOS and Chrome exploits previously developed by surveillance firms NSO Group and Intellexa. Google TAG (Threat Analysis Group) researchers observed the Russia-linked group APT29 (aka SVR group , BlueBravo , Cozy Bear , Nobelium , Midnight Blizzard , and The Dukes ). using exploits previously used by surveillance software vendors NSO Group and Intellexa.

article thumbnail

Breach Roundup: Ex-Verizon Worker Cops to Spying for China

Data Breach Today

Also: Turn in Volodymyr Kadariya, Get $2.5 Million from Uncle Sam This week, an ex-Verizon employee pleaded guilty, SonicWall fixed critical flaws,South Korean hackers exploited a zero-day, U.S. retailer Dick's Sporting Goods was breached, the U.S. government offered a big reward, Grok AI will send election queries to Vote.gov, and HIPAA is 28 years old.

Retail 314
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco addressed a high-severity flaw in NX-OS software

Security Affairs

Cisco addressed multiple vulnerabilities impacting NX-OS software, including a high-severity flaw in the DHCPv6 relay agent. Cisco released security updates for NX-OS software that address multiple vulnerabilities. The most severe of the vulnerabilities fixed by the IT giant is a high-severity issue tracked as CVE-2024-20446. The vulnerability impacts the DHCPv6 relay agent of NX-OS, an attacker can trigger the flaw to cause a denial-of-service (DoS) condition. “This vulnerability is due t

Risk 308
article thumbnail

Windows 11 update adds easier Android file sharing, faster voice dictation, and more

Collaboration 2.0

The new update is optional, so you must head to Windows Update on your PC to install it. Here's how and why you might want to.

IT 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Corona Mirai botnet spreads via AVTECH CCTV zero-day 

Security Affairs

An instance of the Corona Mirai botnet spreads via AVTECH CCTV zero-day and multiple previously known vulnerabilities. Akamai’s Security Intelligence and Response Team (SIRT) has detected a botnet campaign exploiting multiple previously known vulnerabilities and a newly discovered zero-day, tracked as CVE-2024-7029 (CVSS score: 8.7), in AVTECH CCTV cameras.

More Trending

article thumbnail

Google, Apple, and Discord Let Harmful AI 'Undress' Websites Use Their Sign-On Systems

WIRED Threat Level

Single sign-on systems from several Big Tech companies are being incorporated into deepfake generators, WIRED found. Discord and Apple have started to terminate some developers’ accounts.

Privacy 197
article thumbnail

My favorite robot vacuum for pet hair is under $450 for Labor Day

Collaboration 2.0

If you're hunting for a robot vacuum to combat pet hair in your home, the Roomba j7+ has dropped well below $500 with this Labor Day deal.

245
245
article thumbnail

Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks

WIRED Threat Level

Suspected Russian hackers have compromised a series of websites to utilize sophisticated spyware exploits that are eerily similar to those created by NSO Group and Intellexa.

Security 176
article thumbnail

The 75+ best Labor Day 2024 deals: Shop Amazon, Walmart, Best Buy, and more

Collaboration 2.0

Labor Day weekend is nearly here, and major retailers like Amazon and Walmart are already offering great deals on top headphones, TVs, laptops, and more.

Retail 245
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Florida Department of Health Informs RansomHub Hack Victims

Data Breach Today

Cybercriminal Group Claims to Have Published 100 Gigabytes of Agency's Stolen Data Two months after RansomHub claimed to have published 100GBs of its stolen data on the dark web, the Florida Department of Health is notifying citizens that their sensitive information has been compromised. The attack affected the vital statistics system used to issue birth and death certificates.

IT 173
article thumbnail

How to create a bootable Linux USB drive

Collaboration 2.0

If you want to install Linux on a desktop, you'll first have to create a bootable USB drive with your distribution of choice. Don't worry. It's easy.

IT 190
article thumbnail

Cryptohack Roundup: SEC Sends Wells Notice to OpenSea

Data Breach Today

Also: WazirX Seeks Moratorium to Restructure Debt After Hack This week, the SEC sent OpenSea a Wells notice, WazirX sought protection from creditors, Ryan Salame reconsidered his guilty plea, objections to the FTX bankruptcy reorganization plan were filed, U.S. police recovered pig-butchering scam funds, and Colombia accused Worldcoin of privacy violations.

Privacy 173
article thumbnail

The best GPS trackers for kids in 2024: Expert recommended

Collaboration 2.0

Parents and parenting experts recommend the top GPS trackers for kids that offer real-time tracking and alerts to give you peace of mind.

190
190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

CrowdStrike Debuts Safeguards, Seeks to Blunt Outage Impact

Data Breach Today

CEO George Kurtz on New Recovery Techniques and Controls Implemented Post-Incident CEO George Kurtz said CrowdStrike has blunted the business impact from the massive July 19 outage and is implementing changes to prevent a repeat occurrence. CrowdStrike is boosting the resilience of its Falcon platform through improved content visibility and control and enhanced quality assurance.

IT 173
article thumbnail

The best free VPNs of 2024: Expert tested

Collaboration 2.0

We tested the best free VPNs from reputable companies that offer solid limited services. Here's what to know, and how to avoid security risks.

Risk 190
article thumbnail

NIS2 Directive: Focusing on Critical Infrastructure Security

Data Breach Today

Compliance Expert on Readiness, Compliance and Rapid Incident Reporting The NIS2 Directive focuses on addressing gaps and strengthening the security of network and information systems across the European Union. NIS2 mandates rapid incident reporting and holds senior management accountable for cybersecurity, shifting responsibilities to the board level.

Security 162
article thumbnail

This Samsung phone is the one I recommend to most people (and it's not a flagship)

Collaboration 2.0

The Samsung Galaxy A35 5G has its flaws, but with a two-day battery life and a gorgeous display, it's hard to ignore how good it is for the price.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US Moves Toward Expanding Reg E to Address Payment Fraud

Data Breach Today

Fraud Expert Ken Palla on Recent Legislative Efforts and Regulatory Scrutiny Recent developments suggest the U.S. is taking a more serious approach to holding faster payments platforms accountable for scams. It's unlikely any changes will occur before the November U.S. election, but the move toward more regulation is a good start, said Ken Palla, retired MUFB Bank director.

IT 162
article thumbnail

One of the best Bluetooth speakers I've tested is not made by Bose or JBL (and it gets loud)

Collaboration 2.0

You can't beat the Fender Rockstar Cross if you need sheer power from your Bluetooth speaker to fill large spaces with amazing sound.

IT 190
article thumbnail

Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published

Schneier on Security

The “ long lost lecture ” by Adm. Grace Hopper has been published by the NSA. (Note that there are two parts.) It’s a wonderful talk: funny, engaging, wise, prescient. Remember that talk was given in 1982, less than a year before the ARPANET switched to TCP/IP and the internet went operational. She was a remarkable person. Listening to it, and thinking about the audience of NSA engineers, I wonder how much of what she’s talking about as the future of computing—minia

IT 135
article thumbnail

This privacy-first AI assistant lets you write emails in languages you don't speak

Collaboration 2.0

Proton Scribe, the company's AI writing assistant, now works for eight additional languages. Here's how you can access it.

Privacy 189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Fewer, High-Profile Ransomware Attacks Are Yielding Higher Ransoms

KnowBe4

Analysis of cryptocurrency payments made on the blockchain highlights shifts in the size and frequency of ransomware attacks and may paint a bleak picture for the remainder of the year.

article thumbnail

I've tried many smart locks, but the one I keep on my door is $150 this Labor Day

Collaboration 2.0

The Aqara U100 is ideal for Apple fans but also great for everyone at $150 this Labor Day. It combines Apple Home Key, keypad, fingerprint, NFC tags, and a physical key for unlocking.

IT 189
article thumbnail

Iran’s APT42 Targets WhatsApp Users With Spear-Phishing Attacks

KnowBe4

Researchers at Meta have published details on Iranian spear-phishing attacks targeting WhatsApp accounts. The activity is attributed to APT42, a threat actor tied to Iran’s Islamic Revolutionary Guard Corps (IRGC).

Phishing 122
article thumbnail

This stereo amp made me feel like I was hearing my favorite band for the first time

Collaboration 2.0

Outlaw Audio's RR 2160 Mk 11 retro stereo receiver delivers high-quality sound without breaking the bank.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The North American Have I Been Pwned Tour

Troy Hunt

It was 2019 that I was last in North America, spending time in San Francisco, Los Angeles, Vegas, Denver, Minnesota, New York and Seattle. The year before, it was Montreal and Vancouver and since then, well, things got a bit weird for a while. It's a shame it's been this long because North America is such an important part of the world for so many of the things we (including Charlotte in this too) do; it's the lion's share of the audience for my content, the companies whose s

article thumbnail

Grab this 4TB Samsung portable SSD for more than 50% off at Amazon this Labor Day

Collaboration 2.0

Take advantage of this monster Labor Day discount on a 4TB Samsung T5 Evo portable SSD at Amazon. At $225 off, you'll save more than half on storage for gaming, content creation, and more.

189
189
article thumbnail

Building trust in AI: Key strategies for data protection and ethical use 

OpenText Information Management

Artificial intelligence (AI) has become an everyday buzzword, and for good reason: it's significantly changing the way businesses operate and thrive. AI tools are proving to be highly actionable and effective, driving significant improvements in productivity and efficiency. In a recent assessment, Forbes found that 64% of businesses are boosting their productivity with AI while 53% use AI to improve production processes.

ROT 110