Thu.Aug 22, 2024

article thumbnail

A cyberattack disrupted operations of US chipmaker Microchip Technology

Security Affairs

Semiconductor manufacturer Microchip Technology announced that its operations were disrupted by a cyberattack. U.S. chipmaker Microchip Technology suffered a cyberattack that disrupted operations at several of its manufacturing plants. The company detected potentially suspicious activity involving its IT infrastructure on August 17, 2024. The attack severely impacted the production capacity of the company that shut down or isolate some systems to contain the incident.

article thumbnail

Global Cyber Agencies Unveil New Logging Standards

Data Breach Today

Logging Best Practices Guidance Aims to Enhance Global Detection and Response The Australian Signals Directorate's Australian Cyber Security Center released joint guidance with a cohort of international cyber agencies that aims to provide baseline standards for event logging and threat detection, amid a wave of high-profile attacks employing "living off the land" techniques.

Security 309
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2021-33044 Dahua IP Camera Authentication Bypass Vulnerability CVE-2021-33045 Dahua IP Camera Authentication Bypass Vulnerability CVE-2022-0185 Linux Kernel

article thumbnail

US Authorities Warn Health Sector of Everest Gang Threats

Data Breach Today

Group Claims a NY Surgical Center and a Nevada Medical Center Among Recent Victims U.S. authorities are warning healthcare sector entities of incidents involving Everest, a Russian-speaking ransomware group and initial access broker, which claims to have stolen sensitive patient information in recent attacks, including on two medical care providers in New York and Nevada.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

A cyberattack hit US oil giant Halliburton

Security Affairs

US oil giant Halliburton announced that it was hit by a cyberattack that is affecting operations at its Houston, Texas offices. Halliburton, a major U.S. oil company, announced that a cyberattack hit its IT infrastructure, particularly impacting operations at its Houston offices. Halliburton Company is an American multinational corporation and the world’s second largest oil service company which is responsible for most of the world’s largest fracking operations.

More Trending

article thumbnail

GitHub fixed a new critical flaw in the GitHub Enterprise Server 

Security Affairs

GitHub addressed three vulnerabilities in its GitHub Enterprise Server product, including a critical authentication flaw. GitHub addressed three security vulnerabilities impacting the GitHub Enterprise Server (GHES), including a critical flaw tracked as CVE-2024-6800 (CVSS score of 9.5). An attacker can trigger the vulnerability to gain site administrator privileges.

article thumbnail

North Korean Hackers Pivot Away From Public Cloud

Data Breach Today

Kimsuky, or a Related Group, Deploys XenoRAT Variant A North Korean hacking team hastily pivoted from using publicly available cloud computing storage to its own infrastructure after security researchers unmasked a malware campaign. The group shifted from using cloud service including Google Drive, OneDrive, and Dropbox to systems under its control.

Cloud 287
article thumbnail

SolarWinds fixed a hardcoded credential issue in Web Help Desk

Security Affairs

SolarWinds fixed a hardcoded credential flaw in its Web Help Desk (WHD) software that could allow attackers to gain unauthorized access to vulnerable instances. SolarWinds has addressed a new security flaw, tracked as CVE-2024-28987 (CVSS score of 9.1) in its Web Help Desk (WHD) software that could allow remote unauthenticated attackers to gain unauthorized access to vulnerable instances.

Access 297
article thumbnail

Cryptohack Roundup: Investors Sue Binance

Data Breach Today

Also: Malicious Chrome Extension; Mango Markets-SEC Settlement This week, Binance, ASX and Google sued; Solana users targeted; McDonalds' X account hacked; Mango Markets and SEC settled; China updated AML law; sentencing in the HTSB case; arrest in the BitConnect case; Australia shuttered 615 scams; Malaysia adopted Worldcoin, arrested crypto thieves.

Marketing 286
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2021-33044 Dahua IP Camera Authentication Bypass Vulnerability CVE-2021-33045 Dahua IP Camera Authentication Bypass Vulnerability CVE-2022-0185 Linux Kernel

article thumbnail

Oil Services Giant Halliburton Disrupted by Hack Attack

Data Breach Today

Company Reportedly Instructs Staff to Not Connect to Internal IT Systems Oil services giant Halliburton is reportedly dealing with a disruption tied to a Wednesday hack attack, after which the Houston-based firm advised employees to not connect to any internal IT resources - a sign that the incident could be a ransomware attack.

article thumbnail

This great Amazon Fire TV Omni Series QLED is $170 off right now

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming, and you can save $170 on the 55-inch version.

246
246
article thumbnail

ISMG Editors: Social Engineering, Election Defense in AI Era

Data Breach Today

Also: Dangers of Malicious Code Embedded in ML Models; Is Ransomware in Decline? AI's influence on social engineering and election security has become a focal point at Black Hat. ISMG editors discuss how advanced technologies are making it easier to manipulate people and compromise security systems and offer key insights on machine learning vulnerabilities.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The Samsung Galaxy Ring incorporates Natural Cycles, but not like Oura

Collaboration 2.0

Natural Cycles' fertility tracking is a huge reason why women buy and use the Oura Ring. Samsung should take note for its Galaxy Ring.

IT 246
article thumbnail

How to Mitigate Downgrade Attacks Against Windows Systems

Data Breach Today

SafeBreach's Alon Leviev on How Organizations Can Reduce the Likelihood of Exploits SafeBreach security researcher Alon Leviev discusses how downgrade attacks expose vulnerabilities in Windows systems. He shares insights into how attackers manipulate Windows Update processes and stresses the importance of monitoring and securing critical system components to prevent exploitation.

Security 255
article thumbnail

Forget the Pro - The $799 Google Pixel 9 is one of my favorite smartphones of 2024

Collaboration 2.0

The Pro and Pro XL might get all the attention, but Google's Pixel 9 features an updated design, gorgeous camera, and compelling AI features.

246
246
article thumbnail

Overcoming Obstacles to Gen AI for Content Services

AIIM

While humans are critical to the success of AI initiatives, they may also present obstacles. In this blog post, we will walk through some of the challenges organizations face when implementing AI for content services.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

You can get the Amazon Fire HD 8 Plus for over 50% off with this trade-in deal

Collaboration 2.0

Amazon is offering a 46% discount on their Fire HD 8 Plus tablet, but with a qualified trade-in, you can save an additional 20%, bringing the price down to just $52

246
246
article thumbnail

News alert: INE Security launches initiatives in support of aspiring cybersecurity professionals

The Last Watchdog

Cary, NC, Aug. 22, 2024, CyberNewsWire — INE Security , a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing campaign to invest in the education of aspiring cybersecurity professionals. Warn “There is a critical skills gap in the industry, which has enormous implications for businesses and individuals alike,” said Dara Warn, INE Security’s CEO.

article thumbnail

As Microsoft breaks awkward silence around its controversial Recall feature, privacy questions remain

Collaboration 2.0

Recall was supposed to be the signature feature of Microsoft's next-generation Copilot+ PCs - until security researchers labeled it a 'privacy nightmare'.

Privacy 190
article thumbnail

Surveillance Watch

Schneier on Security

This is a fantastic project mapping the global surveillance industry.

Privacy 121
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Midjourney's AI-image generator website is now officially open to everyone - for free

Collaboration 2.0

The user-friendly website lets anyone create up to 25 AI-generated images for free. Here's how to try it.

IT 190
article thumbnail

Cookie Theft: What Is It & How to Prevent It

eSecurity Planet

Cookie theft is a type of cyberattack involving malicious actors exploiting cookies on a user’s device. These cookies save session data, including login credentials, which allows attackers to obtain unauthorized access to accounts. Although cookies are intended for secure session management, they require protection methods to avoid the risk of misuse and illegal access to personal information or online accounts.

IT 86
article thumbnail

The best cheap web hosting services of 2024: Expert tested

Collaboration 2.0

We tested the best cheap web hosting services that will help you set up your new website, online service, or e-commerce store.

190
190
article thumbnail

What are OpenText Business Clouds?

OpenText Information Management

As predicted, AI is changing everything. And while AI in the consumer world gets a lot of attention, AI in business has introduced a new mindset, a new way to think, a new appreciation for trust and data, and a new outlook on how to unleash human potential. But in order to truly get the most out of artificial intelligence (AI), organizations must first advance how they manage, govern, and orchestrate their data to create a solid information foundation.

Cloud 69
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

iFixit: The Samsung Galaxy Ring is $400 of 'disposable tech'

Collaboration 2.0

Each ring will be contributing to the growing e-waste problem after a couple of years or so.

190
190
article thumbnail

Ensuring Resilience: The Vital Role of Enterprise Key Management in Disaster Recovery

Thales Cloud Protection & Licensing

Ensuring Resilience: The Vital Role of Enterprise Key Management in Disaster Recovery madhav Fri, 08/23/2024 - 05:44 In the fast-paced era where every second counts, robust key management practices are central to successful high availability (HA) and disaster recovery (DR) strategies. Enterprise key management (EKM) is a vital safeguard that ensures encrypted data remains accessible and secure during unplanned disruptions.

article thumbnail

The best free antivirus software of 2024: Expert tested

Collaboration 2.0

We tested the best free antivirus software to give you extra protection at no additional cost.

190
190