Fri.Sep 13, 2024

article thumbnail

The Dark Nexus Between Harm Groups and ‘The Com’

Krebs on Security

A cyberattack that shut down two of the top casinos in Las Vegas last year quickly became one of the most riveting security stories of 2023: It was the first known case of native English-speaking hackers in the United States and Britain teaming up with ransomware gangs based in Russia. But that made-for-Hollywood narrative has eclipsed a far more hideous trend: Many of these young, Western cybercriminals are also members of fast-growing online groups that exist solely to bully, stalk, harass and

Passwords 248
article thumbnail

Strider Secures $55M to Fuel AI Growth and Global Expansion

Data Breach Today

Series C Funds to Fuel AI Research, Government Sector Investment and Global Growth Strider Technologies has raised $55 million in a Series C funding round to strengthen its AI capabilities and fuel global expansion efforts. The money will enhance the company’s AI-driven insights, support business with government agencies, and fuel international expansion in Europe and Asia.

Security 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vo1d malware infected 1.3 Million Android-based TV Boxes in 197 countries

Security Affairs

Researchers uncovered an Android malware, dubbed Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. Doctor Web researchers uncovered a malware, tracked as Vo1d , that infected nearly 1.3 million Android-based TV boxes belonging to users in 197 countries. The malicious code acts as a backdoor and allows attackers to download and install third-party software secretly.

article thumbnail

Eliminating the Need for Stored Credentials in Healthcare

Data Breach Today

Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

‘Terrorgram’ Charges Show US Has Had Tools to Crack Down on Far-Right Terrorism All Along

WIRED Threat Level

The federal indictment of two alleged members of the Terrorgram Collective, a far-right cell accused of inspiring “lone wolf” attacks, reveals the US is now using a “forgotten” legal strategy.

Security 115

More Trending

article thumbnail

New Linux malware called Hadooken targets Oracle WebLogic servers

Security Affairs

A new Linux malware called Hadooken targets Oracle WebLogic servers, it has been linked to several ransomware families. Aqua Security Nautilus researchers discovered a new Linux malware, called Hadooken, targeting Weblogic servers. The name comes from the attack “surge fist” in the Street Fighter series. Upon execution, the malware drops a Tsunami malware and deploys a cryptominer.

Honeypots 114
article thumbnail

ISMG Editors: Will Microsoft Rethink Windows Security?

Data Breach Today

Also: Mastercard's Big Acquisition and US Election Security Efforts In the latest weekly update, ISMG editors discussed the fallout from the CrowdStrike global IT outage on endpoint security tools, Mastercard's monumental acquisition of Recorded Future to bolster its cybersecurity portfolio, and the latest efforts by U.S. officials to secure the 2024 election.

Security 157
article thumbnail

My Apple Intelligence wishlist: 10 features it needs to compete with OpenAI and Google

Collaboration 2.0

I've tried many of Apple's AI features in the iOS 18 beta and found them incomplete or underwhelming. Here's what the company needs to offer if it wants to become a leader in the AI race.

IT 98
article thumbnail

Irish Data Protection Commission Probes Google's AI Model

Data Breach Today

Inquiry Launched to Determine the Company's Compliance With GDPR The Irish data regulator launched an investigation to determine Google's compliance with a European privacy law when it was developing its PaLM 2 artificial intelligence model. Google launched the multilingual generative AI model last year.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

GitLab fixed a critical flaw in GitLab CE and GitLab EE

Security Affairs

GitLab addressed multiple vulnerabilities impacting GitLab CE/EE, including a critical pipeline execution issue. GitLab released security patches for 17 vulnerabilities in GitLab CE (Community Edition) and EE (Enterprise Edition). One of these vulnerabilities is a critical pipeline execution flaw, tracked as CVE-2024-6678 (CVSS score of 9.9), that could allow an attacker to trigger a pipeline as an arbitrary user under certain circumstances. “An issue was discovered in GitLab CE/EE affecti

Access 105
article thumbnail

Remote Access Tool Sprawl Increases OT Risks

Data Breach Today

Over-Deployment of Tools Raises Security and Operational Concerns Excessive deployment of remote access tools in operational technology environments expands attack surfaces and creates operational challenges, warn security researchers from Claroty. Remote access tools are essential, but they introduce numerous potential vulnerabilities that threat actors exploit.

Access 157
article thumbnail

Proton VPN vs NordVPN: Which is best in 2024?

Collaboration 2.0

NordVPN and Proton VPN are two of the most popular VPN services available with strong protection features. Here are the key reasons you might pick one over the other.

98
article thumbnail

Lehigh Valley Health Network hospital network has agreed to a $65 million settlement after data breach

Security Affairs

Lehigh Valley Health Network ’s (LVHN) hospital network has agreed to a $65 million settlement in a class action lawsuit related to a data breach. Lehigh Valley Health Network (LVHN) is a large hospital and healthcare system based in Pennsylvania, USA. It operates numerous hospitals, health centers, and outpatient facilities across the region, including the Lehigh Valley area.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

I love everything about this Android tablet (especially the price)

Collaboration 2.0

Blackview's Mega 1 is an 11.5-inch Android 13 tablet with a 120Hz display, 256GB of storage, and 24GB of RAM. What's more, it comes at a great discount.

IT 98
article thumbnail

Cyber Security in Banking: Threats, Solutions & Best Practices

eSecurity Planet

Cyber security in banking has become the frontline defense against an ever-growing wave of digital threats. With billions of dollars and sensitive data at risk, banks are under constant pressure to stay one step ahead of cybercriminals. So, what are the biggest threats facing the banking sector, and how are institutions safeguarding your financial future?

article thumbnail

10 features Apple Intelligence needs to actually compete with OpenAI and Google

Collaboration 2.0

I've tried many of Apple's AI features in the iOS 18 beta and found them incomplete or underwhelming. Here's what the company needs to offer if it wants to become a leader in the AI race.

IT 85
article thumbnail

Meta to push on with plan to use UK Facebook and Instagram posts to train AI

The Guardian Data Protection

Move to use shared posts follows information commissioner concerns and sets collision course with EU over privacy Mark Zuckberg’s Meta is to go ahead with controversial plans to use millions of UK Facebook and Instagram posts to train its artificial intelligence (AI) technology, in a practice that is effectively outlawed under EU privacy laws. Meta said it had “engaged positively” with the Information Commissioner’s Office (ICO) over the plan, after it paused similar proposals in June in the UK

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Attackers Using HTTP Response Headers to Redirect Victims to Phishing Pages

KnowBe4

Researchers at Palo Alto Networks’ Unit 42 warn that attackers are using refresh entries in HTTP response headers to automatically redirect users to phishing pages without user interaction.

Phishing 108
article thumbnail

The best wireless chargers of 2024: Expert tested

Collaboration 2.0

Did you just preorder the new iPhone 16? Now, break up with your charging cables. We went hands-on with chargers from Anker, ESR, Courant, and more to find the best wireless chargers to make powering your devices easier than ever.

76
article thumbnail

My TedXBillings Talk

Schneier on Security

Over the summer, I gave a talk about AI and democracy at TedXBillings. The recording is [link]. Please share.

article thumbnail

How ChatGPT scanned 170k lines of code in seconds and saved me hours of work

Collaboration 2.0

If you have a question that requires a lot of text or numerical analysis, consider running it by ChatGPT or one of the other AIs. You might just get a useful answer as fast as I did.

IT 98
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

DevSecOps: It’s Time to Level Up (with a Little Help from AI) 

OpenText Information Management

Ever feel like the software world is spinning faster than a fidget spinner in overdrive? Security threats are evolving at warp speed, and keeping up feels like trying to catch a greased piglet. But hey, don't stress. DevSecOps is already your secret weapon, baking security into every line of code. Now, imagine adding AI to the mix. It's like upgrading your skateboard to a hoverboard.

article thumbnail

6 KDE widgets to level up your Plasma desktop - and how to add them

Collaboration 2.0

If you're looking for a user-friendly desktop environment, the Plasma desktop is hard to beat. With the help of a few widgets, you can make the desktop even more efficient and effective.

98
article thumbnail

The Ultimate Guide to Contract Management

Docuware

From service agreements to vendor contracts and everything in between, keeping track of contracts can quickly become overwhelming. This is where contract management comes in. It’s essential for any business that wants to protect its assets, prevent lost revenue, mitigate risk and comply with regulatory requirements.

Risk 26
article thumbnail

Preorder the iPhone 16 now (and even get one for free) - here's how

Collaboration 2.0

The iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max (the Pros in a new desert titanium color) are now available to preorder, with tons of deals from carriers.

75
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Chinese-Speaking Hackers Manipulate SEO Rankings Globally

Data Breach Today

Threat Actor Advertises SEO Services in Chinese and English A Chinese search engine optimization operation hacked more than 35 web servers and stole credentials in a campaign to boost the online rankings of malicious porn sites. Researchers from Cisco Talos dubbed the threat cluster DragonRank.

157
157
article thumbnail

Buy a Microsoft Office for Windows license for $35 - the lowest price of the year

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 84% off right now (there's a deal for a Mac version, too).

98
article thumbnail

US Sanctions Russian Media for Secretly Funding Ukraine War

Data Breach Today

Biden Administration Hits Russian Media With More Sanctions for Covert Operations The U.S. Department of State announced additional sanctions Friday against the Kremlin news outlet RT after officials received new information from employees of the organization that revealed how it has become a key component in the Russian military machine.

Military 167