Wed.Oct 02, 2024

article thumbnail

Telegram revealed it shared U.S. user data with law enforcement

Security Affairs

Telegram fulfilled over a dozen U.S. law enforcement data requests this year, potentially revealing the IP addresses or phone numbers of 100+ users. Independent website 404 Media first revealed that in 2024 Telegram has fulfilled more than a dozen law enforcement data requests from the U.S. authorities. The social media platform “potentially revealed” that it has shared the IP addresses or phone numbers of over 100 users with law enforcement.

IT 353
article thumbnail

Cybercrime is Still Evil Incorporated, But Disruptions Help

Data Breach Today

Naming and Sanctioning Cybercrime Syndicate Members Has Repercussions, Police Say Western law enforcement may not be able to bust every last Russian cybercrime suspect, but newly revealed efforts against Evil Corp and LockBit reveal suspects arrested while on vacation, as well as the psychological fallout criminal syndicates face when members get named, indicted and sanctioned.

298
298
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

14 New DrayTek routers’ flaws impacts over 700,000 devices in 168 countries

Security Affairs

Multiple flaws in DrayTek residential and enterprise routers can be exploited to fully compromise vulnerable devices. Forescout researchers discovered 14 new vulnerabilities in DrayTek routers, two of which have been rated as critical. Of the 14 security flaws nine are rated high, and three are rated medium in severity. The flaws impact residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices.

IoT 341
article thumbnail

Warnings Mount Over Fake North Korean IT Workers

Data Breach Today

German Domestic Intelligence Agency Says German Companies Have Fallen For Scam The German federal domestic intelligence agency is adding to warnings over North Korean IT workers obtaining remote work in Western tech companies. The world's most secretive and repressive regime looks for multiple ways to circumvent strict economic sanctions.

IT 288
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Rhadamanthys information stealer introduces AI-driven capabilities

Security Affairs

The Rhadamanthys information stealer has been upgraded with advanced features, including the use of artificial intelligence (AI) for optical character recognition (OCR). Researchers at the Recorded Future’s Insikt group have documented the evolution of the Rhadamanthys info stealer. The malware was first identified in 2022, and since then it has been upgraded with advanced features, the latest version 0.7.0 introduces AI-driven capabilities for extracting cryptocurrency seed phrases from i

More Trending

article thumbnail

Police arrested four new individuals linked to the LockBit ransomware operation

Security Affairs

An international police operation led to the arrest of four individuals linked to the LockBit ransomware group, including a developer. Europol, the UK, and the US law enforcement authorities announced a new operation against the LockBit ransomware gang. The police arrested an alleged LockBit developer at France’s request while vacationing outside Russia and two individuals in the UK for supporting a LockBit affiliate.

article thumbnail

Amazon CISO Amy Herzog on Embedding Security in Ring, Alexa

Data Breach Today

How Amazon Accelerates Product Development While Securing Customer Data Amy Herzog, chief information security officer for Ads and Devices at Amazon, shares how her cybersecurity team accelerates product development by integrating security from the start to secure customer data on popular consumer devices like Ring and Alexa.

Security 271
article thumbnail

Critical Zimbra Postjournal flaw CVE-2024-45519 actively exploited in the wild. Patch it now!

Security Affairs

Threat actors attempt to exploit recently disclosed vulnerability CVE-2024-45519 in Synacor’s Zimbra Collaboration. Proofpoint cybersecurity researchers reported that threat actors are attempting to exploit a recently disclosed vulnerability, tracked as CVE-2024-45519, in Synacor’s Zimbra Collaboration. Starting on September 28, 2024, threat actors have been attempting to exploit the issue to achieve remote code execution on vulnerable instances.

IT 304
article thumbnail

Ring finally adds 24/7 continuous recording to some subscription plans

Collaboration 2.0

The home security company introduces several more cool features to its Ring Protect Plan - now rebranded to Ring Home.

Security 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

U.S. CISA adds Ivanti Endpoint Manager (EPM) flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Endpoint Manager (EPM) vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Ivanti Virtual Traffic Manager authentication bypass vulnerability CVE-2024-29824 (CVSS score of 9.6) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 300
article thumbnail

Raspberry Pi gets AI vision superpowers

Collaboration 2.0

Raspberry Pi's new AI camera is specifically designed from the ground up for AI applications.

246
246
article thumbnail

UK ICO Fines Police Service Northern Ireland 750,000 Pounds

Data Breach Today

A 2023 Breach Exposed Personal Details of All PSNI Officers and Staff The U.K. data regulator the Police Service for Northern Ireland 750,000 pounds following a 2023 data breach that exposed personal details of the entire workforce. The U.K. Information Commissioner's Office determined the breach occurred when police attempted to respond to two open records requests.

article thumbnail

The budget Android tablet I recommend has a display that looks double the price

Collaboration 2.0

Blackview's Mega 1 is an 11.5-inch Android 13 tablet with a brilliant 120Hz display and 24GB of RAM at a surprisingly miniscule price point.

246
246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Global Governments Release New Ransomware Response Guidance

Data Breach Today

Counter Ransomware Group Focuses on Timely Reporting, Avoiding Paying the Ransom New voluntary ransomware guidance released during the International Counter Ransomware Initiative meeting this week calls for victims to report attacks to law enforcement on a more timely basis - and involve more advisors in deciding whether to pay a ransom.

article thumbnail

How to add AI superpowers to your Raspberry Pi

Collaboration 2.0

The Raspberry Pi AI kit is affordable and straightforward to install - if you can find one.

231
231
article thumbnail

OpenAI Valuation Nearly Doubles to $157B After $6.6B Funding

Data Breach Today

Thrive Capital, Microsoft, SoftBank, Nvidia Reportedly Lead OpenAI's Latest Funding OpenAI’s new $6.6 billion round of funding has nearly doubled its valuation to $157 billion. With investments from Thrive Capital, Microsoft, SoftBank and Nvidia, OpenAI plans to expand its AI research while facing pressures around executive turnover and its transition away from a nonprofit model.

IT 173
article thumbnail

Microsoft Office 2024 now available without a subscription for PC and Mac

Collaboration 2.0

For the first time since 2021, the Office suite is available as a standalone, one-time purchase. Here's everything new in Office 2024.

190
190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US DOJ Unveils New Strategic Approach to Counter Cybercrime

Data Breach Today

Justice Department Releases Cybercrime Plan, Focusing on Global Partnerships The United States Justice Department is coordinating its cybercrime defense mission under a new strategic approach released Wednesday that aims to enhance the collection of electronic evidence, bolster international collaboration and focus on disrupting significant cybercrime actors.

IT 173
article thumbnail

I've tested dozens of power banks. This one is in a class of its own

Collaboration 2.0

The Cuktech P-series power bank may look like something from a sci-fi movie, but its efficiency and premium build are very real.

IT 189
article thumbnail

Hawaii Clinic Notifies 124,000 of Hack Credited to Lockbit

Data Breach Today

Data Leak Preceded Law Enforcement Crackdown on Group That Targets Health Sector A clinic in Hawaii is notifying 124,000 patients that their health data was potentially compromised in a May hack. Lockbit 3.0 claims to have published the stolen records on its data leak site in June - months before global authorities this week disclosed a crackdown on the cybercrime gang.

IT 173
article thumbnail

Meta's new 512GB Quest 3 deal may be the best October Prime Day VR deal right now

Collaboration 2.0

Meta announced that it will discontinue the 128GB version of the Quest 3 VR headset, and drop the price of the the 512GB by $150. Just in time for Amazon's Big Deal Days on October 8-9.

IT 189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

OpenAI's New Model is Berry Good at Deception

Data Breach Today

Strawberry Can Also Assist with Making Weapons that Wipe Out Humans OpenAI claims its new artificial intelligence model, designed to "think" and "reason," can solve linguistic and logical problems that stump existing models. Officially called o1, the model nicknamed Strawberry can deceiving users and help make weapons that can obliterate the human race.

article thumbnail

This is one of the best value power banks I've ever tested, and it's 30% off

Collaboration 2.0

Fast charging, lots of capacity, and a built-in cable -- this power bank has it all!

IT 189
article thumbnail

How Large Language Models Are Reshaping the Cybersecurity Landscape

Elie

This talk examine current real-world examples of AI-driven attacks and explore which defensive AI capabilities are available today.

article thumbnail

Businesses can reach decision dominance using AI. Here's how

Collaboration 2.0

How can a company assess faster and more effectively than its competitors? The answer is spelled SUDA - the ability to Sense, Understand, Decide, Act. Here's how it works in an AI powered economy.

IT 189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Dick’s Sporting Goods Cyber Attack Underscores Importance of Email Security and Internal Controls

KnowBe4

The recent cyber attack on Dick's Sporting Goods makes it clear that email played a critical role and emphasizes the need for better security controls.

Security 131
article thumbnail

One of the best lightweight laptops I've tested is a remote worker's dream machine

Collaboration 2.0

Lenovo's Yoga Slim 7x has the latest in processor technology, allowing for a thin and lightweight form factor. But what sets it apart is its value.

IT 189
article thumbnail

News alert: Aembit appoints former Snowflake security director Mario Duarte as its new CISO

The Last Watchdog

Silver Spring, MD, Oct. 2, 2024, CyberNewswire — Aembit , the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly head of security at Snowflake, joins Aembit with a deep commitment to address pressing gaps in non-human identity security. Duarte’s journey in cybersecurity began with a passion for penetration testing, sparked by the 1980s cult classic film WarGames.

Security 130