Fri.Aug 16, 2024

article thumbnail

Russian Sentenced to 3 Years for Selling Stolen Identities

Data Breach Today

FBI Sting Identified Georgy Kavzharadze as Vendor on Illicit Slilpp Markplace Russian national Georgy Kavzharadze, 27, has been sentenced to serve 40 months in U.S. prison after pleading guilty to earning over $200,000 by selling stolen U.S. bank account access credentials via the illicit Slilpp stolen-credential marketplace.

Access 162
article thumbnail

News alert: Implementing AI-powered ‘Cisco HyperShield’ requires proper cybersecurity training

The Last Watchdog

Cary, NC, Aug. 16, 2024, CyberNewsWire — The imminent release of Cisco HyperShield this month marks a pivotal evolution in the cybersecurity landscape. As an “AI-native” security architecture, HyperShield promises to redefine traditional security protocols through its automated proactive cybersecurity measures and AI-driven security solutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK Software Security Code of Practices Earns Mixed Reviews

Data Breach Today

Voluntary Code Could Be First Step to Regulation A draft set of recommendations published by the U.K. government promoting software resiliency received mixed reviews from British software executives who criticized a lack of specificity and overlap with existing best practices. The measures consist of a 21-step framework.

Security 147
article thumbnail

Microsoft urges customers to fix zero-click Windows RCE in the TCP/IP stack

Security Affairs

Microsoft addressed a critical zero-click Windows remote code execution (RCE) in the TCP/IP stack that impacts all systems with IPv6 enabled. Microsoft urges customers to fix a critical TCP/IP remote code execution (RCE) flaw, tracked as CVE-2024-38063 (CVSS score 9.8), in the TCP/IP stack. The vulnerability impacts all systems with IPv6 enabled (IPv6 is enabled by default).

IT 143
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cardiology Practice: Hack Affected 281,000 Patients, Docs

Data Breach Today

Breach Spotlights the Cyber Woes Faced by Other Medical Specialty Entities An Alabama cardiology practice is notifying 281,000 current and past patients, physicians and employees that their sensitive information was stolen in a recent hack. The breach is one of many incidents at specialty medical practices, spotlighting the heightened risks these entities face.

Risk 147

More Trending

article thumbnail

Unpatched Vulnerabilities Cause 60% of Cyber Compromises

Data Breach Today

Gutsy's John Morello on Ensuring Vulnerability Management Using Process Mining Organizations struggle with vulnerability management, with nearly 60% of cyber compromises caused by unpatched vulnerabilities, says John Morello, co-founder and CTO of Gutsy. He discusses how process mining can streamline remediation efforts and ensure accountability across teams.

Mining 147
article thumbnail

The Slow-Burn Nightmare of the National Public Data Breach

WIRED Threat Level

Social Security numbers, physical addresses, and more—all available online. After months of confusion, leaked information from a background-check firm underscores the long-term risks of data breaches.

article thumbnail

Asia-Pacific Regulations Keep Pace With Rapid Evolution of Artificial Intelligence Technology

Data Matters

Regulation of artificial intelligence (AI) technology in the Asia-Pacific region (APAC) is developing rapidly, with at least 16 jurisdictions having some form of AI guidance or regulation. Some countries are implementing AI-specific laws and regulation, while others take a more “soft” law approach in reliance on nonbinding principles and standards. While regulatory approaches in the region differ, policy drivers feature common principles including responsible use, data security, end-user protect

article thumbnail

New Windows IPv6 Zero-Click Vulnerability

Schneier on Security

The press is reporting a critical Windows vulnerability affecting IPv6. As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets. Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consis

IT 119
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

CISA adds SolarWinds Web Help Desk bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a SolarWinds Web Help Desk bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SolarWinds Web Help Desk deserialization of untrusted data vulnerability, tracked as CVE-2024-28986 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.

IT 130
article thumbnail

This $50 Meta Quest 3 accessory is a game-changer for people with glasses

Collaboration 2.0

There are lots of accessories for the Meta Quest 3, but these VR prescription lenses from Zenni solve the problem of wearing glasses with the headset once and for all.

98
article thumbnail

Russian national sentenced to 40 months for selling stolen data on the dark web

Security Affairs

A Russian national was sentenced to over three years in prison for selling stolen information and credentials on a dark web marketplace. The 27-year-old Russian national Georgy Kavzharadze (also known as “George,” “TeRorPP,” “Torqovec,” and “PlutuSS”) has been sentenced to over three years in prison for selling financial information, login credentials, and other personal data on the dark web marketplace, Slilpp.

Sales 125
article thumbnail

I love everything about this Android tablet (especially the $219 price)

Collaboration 2.0

Blackview's Mega 1 is an 11.5-inch Android 13 tablet with a 120Hz display, 256GB of storage, and 24GB of RAM. What's more, it comes at a great price.

IT 98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Banshee Stealer, a new macOS malware with a monthly subscription price of $3,000

Security Affairs

Russian cybercriminals are advertising a new macOS malware called Banshee Stealer with a monthly subscription price of $3,000. In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures. The malware authors claim it can steal a broad range of data from compromised systems, including browser data, cryptocurrency wallets, and around 100 browser extensions.

article thumbnail

This $20 Anker power bank solved my biggest problem with portable chargers

Collaboration 2.0

Thanks to its clever form factor, Anker's Nano Power Bank made charging my iPhone or Android effortless. It's available now on Amazon for under $20.

IT 98
article thumbnail

Cybersecurity protection with Jamf Safe Internet

Jamf

Schools are common targets of cyber attacks, resulting in lost money, student data and learning time. Learn how web threat prevention in Jamf Safe Internet can keep schools secure.

article thumbnail

[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing

KnowBe4

Heads-up: I just proved that unsuspecting call recipients are super vulnerable to AI vishing

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Buy a Costco membership and get a free $20 gift card. Here's how

Collaboration 2.0

Costco is cracking down on sharing memberships. Don't miss this deal to buy your own with a free $20 gift card, effectively cutting the price to $40. (I bought one and highly recommend it.

IT 75
article thumbnail

How to Use 1Password: Guide to Getting Started

eSecurity Planet

With cybersecurity becoming increasingly complex, it is necessary to have a good way to handle your passwords to keep all your private stuff safe. Amidst all the many tools available on the market, 1Password stands out as a great pick. It’s got the best security features and is relatively easy to use. Whether you’re a business or just someone trying to keep track of your online accounts, 1Password is like the Swiss Army knife for password management.

article thumbnail

Microsoft is making it easier to share files between Windows and Android - here's how

Collaboration 2.0

The new option, coming soon to Windows 10 and 11, lets you exchange files between your Windows PC and Android device with just a few clicks. You can try it out now.

IT 75
article thumbnail

Green Libraries Campaign welcomes RLUK, CONUL, and the National Library of Scotland

CILIP

Green Libraries Campaign welcomes RLUK, CONUL, and the National Library of Scotland Three new partners join The Green Libraries Campaign to explore and create new opportunities for environmental and sustainable action in Libraries across all sectors. RLUK, CONUL and the National Library of Scotland join the Green Libraries Campaign to support the campaign's growth and evolution for new green initiatives and activities and ensure cross-sector and across the UK collaboration.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

So long, point-and-click: How generative AI will redefine the user interface

Collaboration 2.0

Will 'GenAI-first UX' help transition enterprise applications from rigid, linear user flows to flexible, intuitive experiences? Here's why excitement is brewing.

98
article thumbnail

Friday Squid Blog: The Market for Squid Oil Is Growing

Schneier on Security

How did I not know before now that there was a market for squid oil ? The squid oil market has experienced robust growth in recent years, expanding from $4.56 billion in 2023 to $4.94 billion in 2024 at a compound annual growth rate (CAGR) of 8.5%. The growth in the historic period can be attributed to global market growth, alternative to fish oil, cosmetics and skincare industry, sustainability practices, regulatory influence.

article thumbnail

I revisited the System76 Thelio, and it remains my all-time favorite desktop

Collaboration 2.0

I recently retired my old Thelio desktop and opted for the latest iteration of the same thing instead of getting something new. Boy, did I make the right call.

IT 98
article thumbnail

6 reasons why a Chromebook is the best laptop for most anyone

Collaboration 2.0

It remains the tech world's worst-kept secret: Skip the Windows and MacOS bling. If you want a fast, reliable, affordable laptop, get a Chromebook.

IT 98
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Turn your Meta Quest into a massive display for any HDMI device - here's how

Collaboration 2.0

Now, you can connect your game console, laptop, or phone to any Quest headset. We show you how to set it up. (And explain one small caveat.

IT 75
article thumbnail

How to use the Passwords app on your iPhone with iOS 18

Collaboration 2.0

Apple's Passwords app will help you create, manage, save, and sync passwords on your iPhone and other devices. Here's how to get started.

article thumbnail

10 Linux keyboard shortcuts I depend on for maximum efficiency

Collaboration 2.0

Though not every keyboard shortcut is universal in Linux, several work across desktop environments. Here are the ones I use every day.

98