Tue.Nov 26, 2024

article thumbnail

The source code of Banshee Stealer leaked online

Security Affairs

Banshee Stealer, a MacOS Malware-as-a-Service, shut down after its source code leaked online. The code is now available on GitHub. In August 2024, Russian hackers promoted BANSHEE Stealer, a macOS malware targeting x86_64 and ARM64, capable of stealing browser data, crypto wallets, and more. BANSHEE Stealer supports basic evasion techniques, relies on the sysctl API to detect debugging and checks for virtualization by running a command to see if “Virtual” appears in the hardware model identifier

Archiving 358
article thumbnail

Victims Must Disclose Ransom Payments Under Australian Law

Data Breach Today

New Law Calls for Better Reporting, Securing Devices and Critical Infrastructure The Australian government's proposed cybersecurity legislation passed both houses of the Parliament on Monday, formalizing the government's strategy to boost ransomware payment reporting, mandate basic cybersecurity standards for connected devices and enhance critical infrastructure security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Software firm Blue Yonder providing services to US and UK stores, including Starbucks, hit by ransomware attack

Security Affairs

Blue Yonder, a supply chain software provider, suffered a ransomware attack, impacting operations for clients like Starbucks and grocery stores. A ransomware attack on Blue Yonder disrupted operations for several customers, including Starbucks and U.K. grocery chain Sainsbury. “A ransomware attack has disrupted a third-party software system that Starbucks uses to track and manage its baristas’ schedules, forcing the coffee chain to shift to manual mode to ensure its employees get paid pro

article thumbnail

UK NHS Hospital Reports 'Major' Cyberincident

Data Breach Today

Outpatient Appointments Cancelled at Wirral University Teaching Hospital A U.K. National Heath Service teaching hospital in northwest England reported a major cyberincident on Tuesday that forced the healthcare facility to cancel outpatient appointments for the day.

298
298
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

I tested 9 AI content detectors - and these 2 correctly identified AI text every time

Collaboration 2.0

Two of the seven AI detectors I tested correctly identified AI-generated content 100% of the time. This is up from zero during my early rounds, but down from my last round of tests.

271
271

More Trending

article thumbnail

Most companies will increase IT spending in 2025. But there's a twist in the tale

Collaboration 2.0

Nearly two-thirds of companies plan to boost their IT budgets next year. Yet cost-saving measures are also on the agenda.

IT 268
article thumbnail

Russian Hackers Target Mozilla, Windows in New Exploit Chain

Data Breach Today

ESET Discovers Two Major Vulnerabilities Exploited by Russian RomCom Hacking Group Two vulnerabilities in Mozilla products and Windows are actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code.

Security 288
article thumbnail

5 things successful managers do to earn respect and build trust

Collaboration 2.0

You can't manage your staff well if you're not respected, and the path to respect is paved with humble stones. Five business leaders explain how to lead with humility.

264
264
article thumbnail

New Sysdig CEO: Focus on Falco, AI and Fast Threat Response

Data Breach Today

New Sysdig CEO Bill Welch Aims to Expand Real-Time Response and GSI Partnerships New CEO Bill Welch discusses Sysdig's cloud security strategy, emphasizing AI, open-source leadership with Falco, and expansion plans to serve SMBs and midmarket businesses. He shares goals for real-time response and building a sustainable, profitable company.

Cloud 259
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

This 2TB Samsung 990 Pro M.2 SSD is on sale for $160 this Black Friday

Collaboration 2.0

Upgrade your PC with this super-fast 2 TB M.2 SSD for 36% off thanks to Amazon's Black Friday sale.

Sales 246
article thumbnail

QNAP Systems Fixes Bugs in QuRouter and Notes Station 3

Data Breach Today

Exploits Could Allow Remote Command Execution and Access The Taiwanese NAS maker QNAP Systems on Saturday patched multiple flaws in its operating system and applications that could allow attackers to compromise network storage devices. The patch also included multiple flaws in QNAP's router operating system QuRouter OS.

Access 239
article thumbnail

The $30 Blink Video Doorbell is one of the best smart home Black Friday deals

Collaboration 2.0

When can you buy a video doorbell for the price of a trip to a fast-food restaurant? The Blink Video Doorbell is 50% off at Amazon through Black Friday.

246
246
article thumbnail

How a 2-Hour Interview With an LLM Makes a Digital Twin

Data Breach Today

Scientists Devise Technique to Make AI Models Mimic Specific People Researchers have devised a technique to train artificial intelligence models to impersonate people's behavior based on just two hours of interviews, creating a virtual replica that can mimic an individual's values and preferences.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Want to direct a movie? Try this new AI video generator for free

Collaboration 2.0

Runway's Frames tool cooks up videos with different angles, lighting, and other cinematic effects through both text prompts and uploaded images. Here's how to get started.

235
235
article thumbnail

What Graykey Can and Can’t Unlock

Schneier on Security

This is from 404 Media : The Graykey, a phone unlocking and forensics tool that is used by law enforcement around the world, is only able to retrieve partial data from all modern iPhones that run iOS 18 or iOS 18.0.1, which are two recently released versions of Apple’s mobile operating system, according to documents describing the tool’s capabilities in granular detail obtained by 404 Media.

article thumbnail

AI Startup Execs Say It Should Be Easier to Tap UK Funding

Data Breach Today

'You Wonder, Should I Just Spend It on a Place to Stay in America For a Week' Revisions to U.K. government research funding guidelines and their complex application pose a challenge to early-stage tech companies, experts on Tuesday told a parliamentary committee inquiry. "We have definitely had issues," said Peadar Coyle, founder of AudioStack.

IT 230
article thumbnail

How to use Bluesky starter packs to find greener social media pastures

Collaboration 2.0

Starting over on a new social media site can be a hassle. For that, Bluesky has starter packs. Here's how to use them.

230
230
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Emergency Vehicle Lights Can Screw Up a Car's Automated Driving System

WIRED Threat Level

Newly published research finds that the flashing lights on police cruisers and ambulances can cause “digital epileptic seizures” in image-based automated driving systems, potentially risking wrecks.

Risk 226
article thumbnail

Instagram just added a location sharing feature. Here's how to use it

Collaboration 2.0

Finding your friends in a crowd is about to get a lot easier thanks to this new feature.

IT 228
article thumbnail

From Art History to Information Management: An Unexpected Journey

AIIM

When I was a child, I didn't dream of becoming an information management professional. In fact, my ambition was to be a restorer of paintings - something really different from information management. But looking back, there are more similarities than you might expect.

article thumbnail

How to use ChatGPT's Advanced Data Analysis to create quality charts and tables

Collaboration 2.0

ChatGPT has some great chart-making tools. From histograms and heatmaps to word clouds and network diagrams, here's how to take full advantage of this powerful capability.

Cloud 214
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday

Thales Cloud Protection & Licensing

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday josh.pearson@t… Tue, 11/26/2024 - 08:01 As Black Friday and Cyber Monday loom, the stakes for retailers extend far beyond enticing deals and record sales. With retail sales during 2024 set to grow to between $5.23 trillion and $5.28 trillion, the risk of a data breach extends beyond immediate financial losses.

Retail 71
article thumbnail

I gave away my Kindle and iPad within hours of testing this tablet - and it's up to $180 off

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G is my new favorite e-reader. Trading in virtually any tablet to Verizon discounts it by $180.

IT 214
article thumbnail

The fading flame: Why data governance under BCBS 239 needs your attention now

Collibra

In the last decade, nine new regulations have been added for financial services, yet the old ones remain firmly in place. Banks continue to struggle with compliance, as evidenced by the fact that only 6.5% of banks are fully compliant with BCBS 239, according to the latest BCBS report published in November 2023. So, how can banks tick all the boxes and achieve compliance with these longstanding regulations to move forward efficiently and effectively?

article thumbnail

Level up your PS5 with this PlayStation VR2 bundle for $250 off before Black Friday

Collaboration 2.0

The PS VR2 headset allows players to experience games in a new way. This bundle includes Horizon Call of the Mountain for just $350 on Amazon ahead of Cyber Week.

214
214
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Chinese Threat Actor Targets Black Friday Shoppers With Phishing Campaign

KnowBe4

Researchers at EclecticIQ warn that the financially motivated Chinese threat actor “SilkSpecter” has launched a phishing campaign targeting Black Friday shoppers across Europe and the US.

Phishing 119
article thumbnail

Google's iPhone app will now insert search links on webpages - here's how it works

Collaboration 2.0

This new feature allows users to quickly search for additional context about a term or phrase. But some website owners may not be happy. Here's why.

IT 214
article thumbnail

What’s new in OpenText Aviator IoT 24.4

OpenText Information Management

As the amount of connected IoT devices continues to grow, organizations across industries are gaining deeper visibility into their operations and tapping into new revenue opportunities. Despite some headwinds in the macroeconomic environment, one report forecasts the number of connected IoT devices to grow by 13% by end of 2024. That equates to a total of 18.8 billion devices.

IoT 52