Fri.Oct 04, 2024

article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. The malicious code was used to drop cryptocurrency miners and proxyjacking software.

article thumbnail

Meta Hit Again With Targeted Advertising Limits In Europe

Data Breach Today

European Court of Justice Says Meta May Not Indefinitely Retain User Data Targeted advertising may face additional restrictions following a ruling by the top European Union court that social media giant Meta cannot indefinitely retain user data. Nor can it use data for advertising "without distinction as to type of data," the European Court of Justice said Friday.

IT 312
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

Passwords 328
article thumbnail

Mass Retail Hacks Affect Adobe Commerce and Magento Stores

Data Breach Today

4,387 Online Merchants Compromised, Including Cisco and National Geographic Stores Thousands of online stores running Adobe Commerce and Magento software have been hacked since the summer and infected with digital payment skimmers by attackers targeting a vulnerability known as CosmicSting. While patched by Adobe in June, users also need to forcibly invalidate stolen credentials.

Retail 311
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

This Lenovo business laptop is seeing a nearly $1,000 discount on Amazon ahead of October Prime Day

Collaboration 2.0

The twelfth-generation Lenovo ThinkPad X1 Carbon is a solid pro-level laptop thanks to its Intel Ultra 7 CPU, lightweight design, and near bezel-less display. It's available on Amazon for 40% off its original price ahead of the Prime Big Deals Days sale.

Sales 246

More Trending

article thumbnail

I bought the Google Pixel 9 Pro, and its most impressive feature was not the software

Collaboration 2.0

Google's Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out for me.

IT 246
article thumbnail

Russia Arrests 100 in Cryptex Crypto Exchange Crackdown

Data Breach Today

US-Sanctioned Crypto Exchange Founder Sergey Ivanov Included in Sweeping Arrests Russia’s primary federal investigative agency announced a rare and sweeping investigation into the United States-sanctioned cryptocurrency exchange Cryptex and other platforms used to carry out illegal transactions and launder millions from ransomware groups.

article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Collaboration 2.0

Several new features are coming to Facebook, and they may help you explore your local community more.

243
243
article thumbnail

Ivanti Confirms Exploitation of an Old Critical Vuln

Data Breach Today

Remote Code Execution Bug Exploited in Limited Attacks Ivanti confirmed that hackers are exploiting an SQL injection vulnerability in its Ivanti Endpoint Manager enabling remote code execution, despite the company addressing the issue with a patch in May. The flaw allows unauthenticated attackers within the same network to execute arbitrary code.

IT 300
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

YouTube Shorts are changing in 5 unique ways, and I love the new creative freedom

Collaboration 2.0

YouTube is expanding the runtimes of its short-form content and giving users an easy way to remix their favorite clips.

IT 237
article thumbnail

Cloud Assumptions and Misconfigurations Threaten Healthcare Security

Data Breach Today

Common Cloud Assumptions and Takeaways for Healthcare Organizations As healthcare providers migrate their infrastructure and services to the cloud, they gain benefits such as increased flexibility, scalability and optimized patient data access and sharing. But misconceptions about cloud security are jeopardizing the security of electronic patient health information.

Cloud 299
article thumbnail

Buy a Microsoft Office license for Mac or Windows for $25 right now

Collaboration 2.0

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 89% off.

Access 190
article thumbnail

Security Needs to Be Simple and Secure By Default: Google

Data Breach Today

Google Pushes for Gen AI and Platformization to Counter Sophisticated Threats Google asserts that platformization and consolidation can help contain today's sophisticated threats. Embedding generative AI into security is also required as the industry moves from assisted AI to semi-autonomous and, eventually, to autonomous security, with the goal of security by default.

Security 298
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Best Prime Day impulse buys to shop in October 2024

Collaboration 2.0

The October Prime Day sale is coming. Discover the quirky side of Amazon deals for spontaneous joy and creative vibes.

Sales 190
article thumbnail

ISMG Editors: Russian Cybercrime Syndicates Under Siege

Data Breach Today

Also: U.S. Healthcare Cyber Bill, Insights from ISMG's Canada Summit In the latest weekly update, ISMG editors discussed recent international law enforcement efforts against Russian cybercrime organizations, the latest U.S. cybersecurity bill aimed at protecting the healthcare sector and key takeaways from ISMG's Canada Summit.

article thumbnail

These discounted Meta Ray-Ban smart glasses are my favorite Prime Day deal so far

Collaboration 2.0

They may be refurbished, but ongoing feature updates and any form of discount make the Ray-Ban smart glasses worthy of your consideration.

189
189
article thumbnail

Illumio, ColorTokens, Cisco Lead Microsegmentation Rankings

Data Breach Today

Illumio, Akamai Stay Atop Forrester Wave, While ColorTokens, Cisco Join Leaderboard Illumio and Akamai remained atop Forrester's microsegmentation rankings, while ColorTokens and Cisco climbed into the leader space.The microsegmentation market has expanded beyond traditional on-premises networks to address modern public cloud workloads.

Marketing 295
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

World Wide Web Foundation to close, as Berners-Lee shifts focus to Solid Protocol

Collaboration 2.0

The web's founder isn't stopping advocating for a safer, better web. He's just redirecting his energy.

190
190
article thumbnail

Medical Group Pays $240K Fine for 3 Ransomware Attacks

Data Breach Today

Nonprofit Group Hit 3 Times in 3 Weeks in 2018, Affecting PHI of 85,000 Patients Federal regulators have hit a California physician services organization with a $240,000 HIPAA civil penalty following an investigation into three ransomware attacks that occurred within a three-week span in early 2018, compromising the sensitive information of 85,000 patients.

article thumbnail

The 4 biggest challenges of AI-generated code that Gartner left out of its latest report

Collaboration 2.0

Gartner says AI will require 80% of developers to upskill, but that's not the whole story. From buggy AI code to endless revisions, here's what wasn't mentioned in the report.

IT 189
article thumbnail

Ex-CEO Adam Geller Returns to Product Leadership at Zscaler

Data Breach Today

Former Exabeam CEO Aims to Strengthen Data-Driven Strategy for Security Operations Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.

Security 284
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

One of the best entry-level portable batteries I've tested is $100 off for October Prime Day

Collaboration 2.0

If you're looking for a lightweight, portable battery that'll get you out of a pinch without breaking the bank, check out the EcoFlow River 3, especially at only $159 ahead of October Prime Day.

189
189
article thumbnail

Financial Services Industry Experiences a Massive Increase in Brand Abuse

KnowBe4

Industry analysis of the domains used behind phishing and brand impersonation attacks show financial institutions are being leveraged at an alarming rate.

article thumbnail

5 reasons to update your iPhone to iOS 18.0.1 right now

Collaboration 2.0

The first update to iOS 18 - iOS 18.0.1 - is out, and you shouldn't wait to install it. Here's why.

IT 189
article thumbnail

Infostealer Threat Group “Marko Polo” Evolving Into an “Empire”

KnowBe4

Detailed research by Recorded Future's threat research division, Insikt Group on the threat group Marko Polo demonstrates just how advanced the group’s.

115
115
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

My favorite laptop power bank has a unique charging feature, and it's currently available as a cool bundle deal

Collaboration 2.0

The Ugreen 145W power bank will charge all of your gadgets -- laptops included. But its best feature puts it at the top for me.

IT 189
article thumbnail

Advisor to the CJEU Confirms GDPR Fines For Subsidiary Infringements Should Reflect Group Turnover

Data Matters

On 12 September 2024, Advocate General Medina issued their Opinion in Case C-383/23 in which they confirmed that supervisory data protection authorities must, when calculating the fine for a GDPR infringement committed by a subsidiary, take into account the total annual turnover of the entire group—a concept known as parental liability. The post Advisor to the CJEU Confirms GDPR Fines For Subsidiary Infringements Should Reflect Group Turnover appeared first on Data Matters Privacy Blog.

GDPR 88
article thumbnail

OpenAI launches ChatGPT Canvas assistant for coders and writers. Here's how to access

Collaboration 2.0

OpenAI just made its ChatGPT Plus subscription more enticing.

Access 189