Tue.Aug 13, 2024

article thumbnail

Six 0-Days Lead Microsoft’s August 2024 Patch Push

Krebs on Security

Microsoft today released updates to fix at least 90 security vulnerabilities in Windows and related software, including a whopping six zero-day flaws that are already being actively exploited by attackers. Image: Shutterstock. This month’s bundle of update joy from Redmond includes patches for security holes in Office ,NET , Visual Studio , Azure , Co-Pilot , Microsoft Dynamics , Teams , Secure Boot, and of course Windows itself.

Security 289
article thumbnail

FBI Seizes Servers Powering Dispossessor Ransomware Group

Data Breach Today

Feds Also File Criminal Complaint Against 'Brain,' Alleged Leader of the Operation The FBI said it led the disruption of a ransomware group called Dispossessor, aka Radar, that amassed victims in dozens of countries. An international dismantling of the group's alleged infrastructure seized servers in the U.S., the U.K. and Germany, as well as multiple domain names.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Started with Gen AI for Information Management

AIIM

AIIM research shows that many organizations feel ready for AI, but encounter obstacles to implementation, especially a lack of available use cases. Where do organization start with Generative AI (Gen AI)?

article thumbnail

CERT-UA warns of a phishing campaign targeting government entities

Security Affairs

CERT-UA warned that Russia-linked actor is impersonating the Security Service of Ukraine (SSU) in a new phishing campaign to distribute malware. The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign targeting organizations in the country, including government entities. The campaign, tracked as UAC-0198, has been active since July.

Phishing 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Black Hat Fireside Chat: Here’s how ‘Active ASPM’ is helping to triage and remediate coding flaws

The Last Watchdog

Application Security Posture Management ( ASPM ) arose a few years ago as a strategy to help software developers and security teams continually improve the security of business applications. Related: Addressing rising cyber compliance pressures At Black Hat USA 2024, an iteration called Active ASPM is in the spotlight. I had the chance to visit with Neatsun Ziv , CEO and co-founder of Tel Aviv-based OX Security , a leading Active ASPM solutions provider.

Cloud 130

More Trending

article thumbnail

Reflecting on KnowBe4's 5th Consecutive TrustRadius Tech Cares Award

KnowBe4

For the fifth year in a row, we've been honored with the TrustRadius Tech Cares Award ! This recognition is a testament to our unwavering commitment to corporate social responsibility (CSR) and the incredible efforts of our team.

122
122
article thumbnail

The Post-Quantum Cryptography Algorithms are finalized! Now what?

Thales Cloud Protection & Licensing

The Post-Quantum Cryptography Algorithms are finalized! Now what? josh.pearson@t… Tue, 08/13/2024 - 16:11 With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium), SLH-DSA (formerly SPHINCS+) and with it the imminent end-of-life of the encryption foundations we have relied upon for decades, many organizations are left wondering exactly what they should do next.

article thumbnail

Summer Lovin' or Summer Scammin'?

KnowBe4

Summer. The season of sun, sand, and romance scams. As the weather heats up, so does the activity of romance scammers, who prey on the vulnerabilities of those seeking love and companionship.

article thumbnail

Vulnerability Recap 8/12/24 – Old Vulnerabilities Unexpectedly Emerge

eSecurity Planet

It’s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn’t look like they’ve been exploited yet, threat actors may make a move now that the flaws have been publicized. The other major news — which could affect both businesses and individuals — is a zero-day vulnerability found in most major web browsers on both Mac and Linux machines.

Security 109
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Attackers Abuse Google Drawings to Host Phishing Pages

KnowBe4

Researchers at Menlo Security warn that a phishing campaign is exploiting Google Drawings to evade security filters.

Phishing 114
article thumbnail

On the Voynich Manuscript

Schneier on Security

Really interesting article on the ancient-manuscript scholars who are applying their techniques to the Voynich Manuscript. No one has been able to understand the writing yet, but there are some new understandings: Davis presented her findings at the medieval-studies conference and published them in 2020 in the journal Manuscript Studies. She had hardly solved the Voynich, but she’d opened it to new kinds of investigation.

IT 109
article thumbnail

ChatGPT vs. Microsoft Copilot vs. Gemini: Which is the best AI chatbot?

Collaboration 2.0

AI chatbots are more popular than ever, but with new updates coming out every few months, how do you determine which one is the best?

98
article thumbnail

[FREE RESOURCE KIT] 2024 Cybersecurity Awareness Month Kit Now Available

KnowBe4

Cyber risks abound, inside and out. Threats to your organization can come in many forms; from a suspicious email with a dodgy attachment to improperly stored sensitive information.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Google Pixel 9 Pro Fold vs Samsung Galaxy Z Fold 6 - which foldable is best?

Collaboration 2.0

Google's new flagship foldable, the Pixel 9 Pro Fold, just dropped, and it's packed with new features. But how does it compare to Samsung's Z Fold 6? Let's break down the major differences.

IT 98
article thumbnail

Vulnerability Recap 8/13/24 – Old Vulnerabilities Unexpectedly Emerge

eSecurity Planet

It’s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn’t look like they’ve been exploited yet, threat actors may make a move now that the flaws have been publicized. The other major news — which could affect both businesses and individuals — is a zero-day vulnerability found in most major web browsers on both Mac and Linux machines.

article thumbnail

The best AI chatbots for programming, and a bunch that failed miserably

Collaboration 2.0

I've been subjecting AI chatbots to a set of real-world programming tests. Which chatbots handled the challenge and which crawled home in shame? Read on.

98
article thumbnail

New York Attorney General Publishes Guide to Avoid “Key Mistakes” Regarding Online Tracking Technologies

Data Matters

On July 30, 2024, New York Attorney General Letitia James announced website privacy guides for New York consumers and businesses. The guides, a business-focused Business Guide to Website Privacy Controls and a consumer-focused Consumer Guide to Tracking on the Web , are available on the Office of the New York State Attorney General’s (the “OAG’s”) website.

Privacy 97
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to preorder the Pixel Buds Pro 2

Collaboration 2.0

On Tuesday at the Made by Google event, Google unveiled the new Google Pixel Buds Pro 2 earbuds, along with new Pixel phones and watches. We've found the best places to preorder the latest earbuds.

98
article thumbnail

CyberheistNews Vol 14 #33 Your Users Still Fall For Phishing Attacks Because of URL Shorteners

KnowBe4

CyberheistNews Vol 14 #33 Your Users Still Fall For Phishing Attacks Because of URL Shorteners

article thumbnail

Google Pixel Watch 3 vs. Samsung Galaxy Watch 7: Which Android smartwatch is best for you?

Collaboration 2.0

Both of these new Google Wear OS smartwatches offer a similar software experience, but Google's and Samsung's optimizations set them apart.

97
article thumbnail

Webinar: Move or Manage: Determining When Manage-in-Place Makes Sense

IG Guru

Move or Manage: Determining When Manage-in-Place Makes Sense When: Thursday, Aug. 22 at 12 p.m. (noon) MT. Where: Register via Zoom HERE. The Manage in Place concept is gaining in popularity, but many questions remain about when it makes sense to use it, and when it doesn’t. This presentation will look at multiple record-keeping scenarios to come […] The post Webinar: Move or Manage: Determining When Manage-in-Place Makes Sense first appeared on IG GURU.

IT 66
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Google Pixel Watch 3: Key specs, features, price, and everything else you need to know

Collaboration 2.0

Google just unveiled the Pixel Watch 3, its latest smartwatch with a host of hardware updates and a 45mm watch size (finally). Here are some answers to the most commonly asked questions.

IT 92
article thumbnail

AI-Powered Contract Management Firm Reports Strong Growth Amid Expanding Global Demand

Information Matters

Summize, a provider of AI-powered Contract Lifecycle Management (CLM) solutions, has reported record performance figures for its fiscal year ending June 30, 2024. The company achieved over 100% growth in Read more The post AI-Powered Contract Management Firm Reports Strong Growth Amid Expanding Global Demand appeared first on Information Matters - AI in the UK.

IT 52
article thumbnail

Report: DoJ may want to break up Google

Collaboration 2.0

In an unexpected move, Bloomberg reports, the Justice Department may be considering busting Google up.

75
article thumbnail

5 tendances émergentes du marché du contrôle d'accès physique en 2024

HID Global

Face à l'évolution rapide des technologies et des menaces de sécurité, comprendre les tendances émergentes dans les solutions de contrôle d’accès physique est essentiel pour prendre les bonnes décisions stratégiques. Clara Bardou, Directrice de marché, HID France, nous éclaire sur les perspectives issues de l’étude réalisée par IFSEC Global en partenariat avec HID.

52
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Google Pixel 9 Pro Fold vs. Pixel Fold: Which model should you buy?

Collaboration 2.0

How does Google's latest $1,799 foldable fare against the original Pixel Fold? Here's our take.

76
article thumbnail

Are You Meeting Your Occupational Health & Safety Requirements?

IT Governance

6 OH&S areas you must make staff aware of Although you might associate health and safety risks with specific industries, such as manufacturing or construction, all organisations face challenges. They may not be life-threatening, but accidents can lead to delays or chronic problems that manifest over time: The most common accidents involve trip hazards and the unsafe use of machinery.

Risk 52
article thumbnail

Google Pixel 9 Pro Fold vs. Pixel Fold: Which one should you buy?

Collaboration 2.0

How does Google's latest $1,799 foldable fare against the original Pixel Fold? Here's our take.

76