Thu.Jul 25, 2024

article thumbnail

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

Security Affairs

A critical flaw in some versions of Docker Engine can be exploited to bypass authorization plugins (AuthZ) under specific circumstances. A vulnerability, tracked as CVE-2024-41110 (CVSS score of 10.0), in certain versions of Docker Engine can allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. “An attacker could exploit a bypass using an API request with Content-Length set to 0, causing the Docker daemon to forward the request without the body to the Aut

Access 355
article thumbnail

LW ROUNDTABLE: CrowdStrike outage reveals long road ahead to achieve digital resiliency

The Last Watchdog

Last week, CrowdStrike, one of the cybersecurity industry’s most reputable solution providers, inadvertently caused more disruption across the Internet than all the threat actors active online at the time. Related: Microsoft blames outage on EU A flawed update to CrowdStrike’s Falcon security software caused millions of computers running Microsoft Windows to display the infamous blue screen of death.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers exploit Microsoft Defender SmartScreen bug CVE-2024-21412 to deliver ACR, Lumma, and Meduza Stealers

Security Affairs

The CVE-2024-21412 flaw in the Microsoft Defender SmartScreen has been exploited to deliver information stealers such as ACR Stealer, Lumma, and Meduza. Fortinet FortiGuard Labs researchers observed a malware campaign exploiting the vulnerability CVE-2024-21412 (CVSS score: 8.1) to spread information stealer, such as ACR Stealer, Lumma , and Meduza.

Education 348
article thumbnail

CrowdStrike Outage Losses Will Hit Healthcare, Banking Hard

Data Breach Today

$5.4 Billion in Losses Estimated for 500 Largest Public US Firms - Except Microsoft Expect the healthcare and banking sectors to record the greatest direct losses in the U.S. as a result of the global disruptions caused by a faulty CrowdStrike software update crashing Windows systems, an underwriting agency reported, forecasting Fortune 500 direct losses of $5.4 billion.

309
309
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Terrorist Activity is Accelerating in Cyberspace – Risk Precursor to Summer Olympics and Elections

Security Affairs

Terrorist groups are increasingly using cyberspace and digital communication channels to plan and execute attacks. Yesterday Federal Bureau of Investigation (FBI) Director Christopher Wray expressed growing concerns over the potential for a coordinated foreign terrorist attack in the United States. During his testimony to the House Oversight Committee, Mr.

Risk 347

More Trending

article thumbnail

Progress Software fixed critical RCE CVE-2024-6327 in the Telerik Report Server

Security Affairs

Progress Software addressed a critical remote code execution vulnerability, tracked as CVE-2024-6327, in the Telerik Report Server. Telerik Report Server is a web-based application designed for creating, managing, and delivering reports in various formats. It provides tools for report design, scheduling, and secure delivery, allowing organizations to centralize their reporting processes.

article thumbnail

Cybercrooks Continue to Capitalize on CrowdStrike Outage

Data Breach Today

Hackers Spread Malicious Recovery Files and Certificates Friday's global computer outage caused by an update gone wrong from cybersecurity firm CrowdStrike continues to bring out hucksters seeking to capitalize on the incident. Hackers began milking it almost immediately, and self-proclaimed hacktivist group USDoD appears to be the latest.

article thumbnail

How to turn on Private DNS Mode on Android - and what it can do for you

Collaboration 2.0

Enabling Private DNS Mode on Android means your searches and other DNS queries are encrypted and safe from prying eyes. Here's everything else you need to know.

article thumbnail

US Indicts Alleged North Korean Ransomware Attacker

Data Breach Today

United States Charges North Korean Hacker for Attacks on Hospitals and Healthcare The U.S. is offering a $10 million reward for information leading to the arrest of suspected North Korean hacker Rim Jong Hyok after authorities indicted him for involvement in the regime's Andariel hacking group. Hyok is charged with conspiracy to commit computer hacking and money laundering.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

5 Echo Show settings to change to make your smart display less annoying

Collaboration 2.0

I love my Amazon Echo Show, but I find some of its behaviors distracting, triggering, presumptuous, and just plain pushy. Fortunately, there are easy fixes.

IT 246
article thumbnail

UK Blood Stocks Drop After Ransomware Hack

Data Breach Today

NHS Blood and Transplant Urges Hospitals to Restrict the Use of O-Negative Blood The U.K. National Health Service is urging hospitals across the country to limit the use of rare O-negative type blood after a ransomware attack on a British laboratory service provider crippled blood donations across the country. National blood stocks are at "unprecedentedly low levels.

article thumbnail

This $45 mini screwdriver kit has a useful LED screen - and I highly recommend it

Collaboration 2.0

The Arrowmax SES ultra mini power screwdriver kit combines high-quality hardware with customizable settings, and its one of the first I've seen with its own display.

IT 245
article thumbnail

Cryptohack Roundup: Tornado Cash Sees Uptick in Use

Data Breach Today

Also: WazirX Updates; Fractal ID Breach Every week, ISMG rounds up cybersecurity incidents in digital assets. This week, Tornado Cash saw an uptick in use, updates on the WazirX exploit were released, Fractal ID and LI.FI published breach postmortems, and the U.S. moved to recover pig-butchering losses.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

At The 2024 Summer Olympics, AI Is Watching You

WIRED Threat Level

A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch.

Security 223
article thumbnail

Mandiant: North Korean Hackers Targeting Healthcare, Energy

Data Breach Today

State-Sponsored Hacking Group Andariel Tied to Active and Sophisticated Campaigns A North Korean hacking group notorious for carrying out large-scale cyberattacks against government institutions and critical infrastructure, and developing ransomware, is expanding operations to target the healthcare, energy and financial sectors, warn threat intelligence researchers at Mandiant.

article thumbnail

Google's DeepMind AI takes home silver medal in complex math competition

Collaboration 2.0

The achievement is noteworthy because AI systems don't usually fare well with complex math challenges.

190
190
article thumbnail

Senator: Top Banks Only Reimburse 38% of Unauthorized Claims

Data Breach Today

Bank Execs at Senate Hearing Defend Zelle Reimbursements, Payment Fraud Programs During a hearing Tuesday, U.S. Sen. Richard Blumenthal, D-Conn., revealed that Bank of America, JPMorgan Chase and Wells Fargo only reimbursed 38% of unauthorized Zelle transactions - leaving consumers on the hook for $100 million in fraud losses. The banks disputed the committee's findings.

281
281
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to install Windows 11 the way you want (and sneak by Microsoft's restrictions)

Collaboration 2.0

With the free Rufus utility, you can upgrade your existing Windows 10 PC or install Windows 11 on a clean computer - and do it your way.

IT 190
article thumbnail

How to secure data and integrate applications in a hybrid cloud environment

Data Breach Today

Simplifying your transition to a hybrid cloud environment while ensuring data security and app integration When you move to a hybrid cloud environment consideration must be given to how data is secured and synchronized during and after the transfer.

Cloud 275
article thumbnail

OpenAI launches SearchGPT - here's what it can do and how to access it

Collaboration 2.0

Google, it looks like you've got some competition.

IT 190
article thumbnail

Chainguard Raises $140M to Drive AI Support, Global Growth

Data Breach Today

Company Seeks to Expand Globally and Grow Its US Public Sector Presence A supply chain security firm led by an ex-Google Cloud engineer closed a Series C round to assist AI workloads and expand its open-source software catalog. Chainguard raised $140 million just eight months after completing a $61 million Series B funding round, tripling its valuation to $1.12 billion.

Cloud 272
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

The best MP3 players of 2024

Collaboration 2.0

We rounded up the best MP3 players from Sony, Fiio, and more that can sync with services like Spotify to let you listen to your music without a phone.

190
190
article thumbnail

Proof of Concept: How Can We Outpace Deepfake Threats?

Data Breach Today

Sam Curry and Heather West on Authentication, AI Labelling and Adaptive Security As deepfakes evolve, they pose significant cybersecurity risks and require adaptable security measures. In this episode of "Proof of Concept," Sam Curry of Zscaler and Heather West of Venable discuss strategies for using advanced security tactics to outpace deepfake threats.

article thumbnail

The best iPads of 2024: Expert tested and reviewed

Collaboration 2.0

Looking for an iPad? We've broken down the best iPad models to choose from based on our hands-on testing.

190
190
article thumbnail

Software Maker MCG Health Settles Data Breach Suit for $8.8M

Data Breach Today

Litigation Alleges Vendor Took 2 Years to Discover Data Theft After Hack Software vendor MCG Health has agreed to pay $8.8 million to settle a consolidated proposed federal class action lawsuit involving a 2020 hacking incident. The suit claims the company took two years to identify and report a data theft that affected about 1.1 million people.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The best noise-canceling earbuds of 2024: Expert tested and reviewed

Collaboration 2.0

We tested out the best noise-canceling earbuds that make silence possible on runs, in the office, and at home for distraction-free listening.

190
190
article thumbnail

The CrowdStrike Outage and Market-Driven Brittleness

Schneier on Security

Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were canceled. It took down 911 systems and factories, courthouses, and television stations. Tallying the total cost will take time. The outage affected more than 8.5 million Windows computers, and the cost will surely be in the billions of dollars ­easily matching the most costly previous cyberattacks, such as NotPetya.

Marketing 139
article thumbnail

The best foldable phones of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best foldable phones on the market from Samsung, Google, OnePlus, and more. These ones are worth your money.

Marketing 190