Fri.Oct 11, 2024

article thumbnail

Iran and China-linked actors used ChatGPT for preparing attacks

Security Affairs

OpenAI disrupted 20 cyber and influence operations in 2023, revealing Iran and China-linked actors used ChatGPT for planning ICS attacks. OpenAI announced the disruption of over 20 cyber and influence operations this year, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks.

Phishing 338
article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

Passwordless Authentication without Secrets! divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel frustrated with frequent password resets. This highlights an increasing demand for advanced authentication methods like passkeys and multi-factor authentication (MFA), which provide robust security for most use cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Internet Archive data breach impacted 31M users

Security Affairs

The Internet Archive disclosed a data breach, the security incident impacted more than 31 million users of its “The Wayback Machine.” The Internet Archive is an American nonprofit digital library website that provides free access to collections of digitized materials including websites, software applications, music, audiovisual, and print materials.

Archiving 300
article thumbnail

DOD Unveils Final CMMC Rule for Defense Contractors

Data Breach Today

New Cybersecurity Maturity Model Certification Rule Paves Way for Implementation The Department of Defense is set to implement significant changes to the Cybersecurity Maturity Model Certification program, effective October 15, streamlining compliance for contractors by introducing a tiered system while enhancing security standards.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks

Security Affairs

Sophos reports ransomware operators are exploiting a critical code execution flaw in Veeam Backup & Replication. Sophos researchers warn that ransomware operators are exploiting the critical vulnerability CVE-2024-40711 in Veeam Backup & Replication to create rogue accounts and deploy malware. In early September 2024, Veeam released security updates to address multiple vulnerabilities impacting its products, the company fixed 18 high and critical severity flaws in Veeam Backup & Repl

More Trending

article thumbnail

More on My AI and Democracy Book

Schneier on Security

In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are hard at work writing. At this point, we would like feedback on titles. Here are four possibilities: Rewiring Democracy: How AI Will Transform our Politics, Government, and Citizenship The Thinking State: How AI Can Improve Democracy Better Run: How AI Can Make our Politics, Government, Citizenship More Efficient, Effective and Fair AI a

article thumbnail

Regulating AI Catastophic Risk Isn't Easy

Data Breach Today

AI, Security Experts Discuss Who Defines the Risks, Mitigation Efforts An attempt by the California statehouse to tame the potential of artificial intelligence catastrophic risks hit a roadblock when Governor Gavin Newsom vetoed the measure late last month. One obstacle is lack of a widely-accepted definition for "catastrophic" AI risks.

Risk 297
article thumbnail

Tesla heralds 'unsupervised' self-driving AI by 2027, but skeptics abound

Collaboration 2.0

During a robotic taxi demonstration, Elon Musk says the fully autonomous car will drive while you sleep.

190
190
article thumbnail

Beyond Proof of Concepts: Will Gen AI Live Up to the Hype?

Data Breach Today

How Gen AI Is Evolving From Experimentation to Driving Major Business Impact As gen AI moves from hype to reality, 30% of projects are predicted to be abandoned after the proof-of-concept phase. Despite gen AI's enormous potential to boost revenue and productivity and reduce costs, organizations must perform a thorough assessment before committing to large-scale investments.

297
297
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Microsoft blocked your Windows 11 upgrade? This just-released tool can get the job done

Collaboration 2.0

A new version of the popular Rufus utility once again bypasses Microsoft's strict hardware compatibility requirements for Windows 11 upgrades. But the way it's implemented might make some people nervous.

IT 190
article thumbnail

Rhysida Leaks Nursing Home Data, Demands $1.5M From Axis

Data Breach Today

Ransomware Gang Could Have Axis Health's Mental Health, Drug Abuse Records Ransomware gang Rhysida is threatening to dump data on the dark web that belongs to a Colorado provider of mental health, substance abuse and other healthcare services unless it pays nearly $1.5 million. The group is leaking records it claims to have stolen from a Mississippi nursing home.

article thumbnail

The Samsung tablet I most recommend is not a flagship - and it's still available for sale for October Prime Day

Collaboration 2.0

The Galaxy Tab S9 FE and S9 FE+ are excellent large-screen tablets for work and play. During Amazon's post-Big Deal Days sales event, you can buy the Galaxy Tab S9 FE+ for over $80 off.

Sales 189
article thumbnail

ISMG Editors: Chinese Hackers Raise Stakes in Cyberespionage

Data Breach Today

Also: AI Safety Bill Vetoed, Global Ransomware Response Guide Gets Some Revisions In the latest weekly update, ISMG editors discussed the implications of the U.S. investigation into Chinese hackers targeting telecom wiretap systems, the catastrophic risks of AI and the recent veto of an AI safety bill in the U.S., and the latest global ransomware response guidance.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Fidelity breach exposed the personal data of 77,000 customers - what to do if you're affected

Collaboration 2.0

The investment giant is offering those impacted 24 months of free credit monitoring to help them check for any unusual activity.

article thumbnail

Trinity Ransomware Targets the Healthcare Sector

KnowBe4

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities.

article thumbnail

I changed 11 settings on my Android phone to dramatically improve battery life

Collaboration 2.0

There are numerous ways to improve your Android's battery life, and I've sifted through them all to highlight the most effective options - plus an obvious bonus.

190
190
article thumbnail

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

KnowBe4

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions.

Phishing 126
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ham radio is alive and well - and still a lifeline in disasters

Collaboration 2.0

When disaster strikes, and conventional communication systems fail, amateur ham radio operators step in to bridge the gap, providing a crucial link between those in affected areas and the outside world.

article thumbnail

Indian Fishermen Are Catching Less Squid

Schneier on Security

Fishermen in Tamil Nadu are reporting smaller catches of squid. Blog moderation policy.

97
article thumbnail

Where AI avatars are at your service 24/7

Collaboration 2.0

In South Korea, DeepBrain AI's hyper-realistic avatars are playing a variety of roles - store clerk, bank teller, tutor, even financial analyst. Exactly how is that working out so far?

190
190
article thumbnail

Celebrating the human touch: how Autoscore impacts customer service quality

OpenText Information Management

With artificial intelligence (AI) handling an increasing number of customer interactions, the role of human agents is more crucial than ever as we celebrate Customer Service Week 2024. Today, we're exploring how the OpenText ™ Contact Center Analytics solution, specifically its AutoScore module, is helping organizations identify and celebrate exceptional human-driven customer service in the age of AI.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

ChatGPT's productivity upgrade and your new AI coworkers

Collaboration 2.0

The exponential growth of AI assistants -- from ChatGPT to full-blown agentic systems -- rule the Innovation Index this week. Here's what they're up to.

189
189
article thumbnail

Self Service+: Empowering Productivity and Security through a Unified App Experience

Jamf

Truly delighting end users with genuinely helpful apps tailored to their needs is the focus of Sam Allcock, Director of Product Management and Kyle Hammond, Principal Software Engineer at Jamf at JNUC 2024.

article thumbnail

One of the best portable vinyl players I've tested just got a major audio upgrade

Collaboration 2.0

The Sound Burger is back from the '80s to bring portability and a new listening experience to vinyl records.

189
189
article thumbnail

Managed software updates make Apple patch management easier

Jamf

Apple patch management and macOS and iOS upgrades just got much easier to manage. Learn how to deliver a seamless end-user experience during updates.

40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The best no-log VPNs of 2024: Expert tested and reviewed

Collaboration 2.0

No-log VPNs claim to not keep records of their customers' online activities. These are the best no-log VPNs to protect your privacy.

Privacy 189
article thumbnail

How and When to Responsibly Dispose of Healthcare Documents

Record Nations

Today, effective management and disposal of healthcare documents are vital. They ensure efficiency, compliance, and data security in healthcare. Healthcare facilities manage vast amounts of sensitive data, including patient records and billing documents. As facilities grow, so do their document archives. That’s why it’s essential to regularly review, organize, and dispose of outdated or unnecessary.

article thumbnail

Do you talk to Alexa in your sleep? Here's how to check

Collaboration 2.0

Learn how Alexa's voice activity history reveals whether you are oversleeping your alarms and find the hidden data Alexa keeps on your morning habits.

189
189