Tue.Sep 24, 2024

article thumbnail

Did Israel infiltrate Lebanese telecoms networks?

Security Affairs

Israel has been sending text messages, recordings, and hacking radio networks to warn Lebanese citizens to evacuate certain areas. Israel has been sending text messages, recordings, and hacking radio networks to warn Lebanese citizens to evacuate certain areas in the country, likely due to an imminent full-scale strike. Following these warnings, massive bombings in southern and eastern Lebanon killed over 270 people.

Access 329
article thumbnail

Redefining the Supply Chain in the Post-AI Era

Data Breach Today

How to Navigate the New Challenges and Opportunities AI has enabled supply chains to become more proactive and predictive. Through machine learning algorithms, natural language processing and advanced analytics, organizations can now forecast demand with greater accuracy, anticipate potential disruptions and optimize inventory management in real time.

Analytics 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A generative artificial intelligence malware used in phishing attacks

Security Affairs

HP researchers detected a dropper that was generated by generative artificial intelligence services and used to deliver AsyncRAT malware. While investigating a malicious email, HP researchers discovered a malware generated by generative artificial intelligence services and used to deliver the AsyncRAT malware. The AI-generated malware was discovered in June 2024, the phishing message used an invoice-themed lure and an encrypted HTML attachment, utilizing HTML smuggling to avoid detection.

article thumbnail

FBI, US Homeland Security Investigate Water Facility Cyberattack

Data Breach Today

No Disruption to Service; Manual Operations Implemented FBI and U.S. Department of Homeland Security officials are in Arkansas City, Kansas, to investigate a cyberattack at the city's water treatment facility. "There has been no disruption to service. Out of caution, the Water Treatment Facility has switched to manual operations," said the city manager.

Security 305
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

A cyberattack on MoneyGram caused its service outage

Security Affairs

American peer-to-peer payments and money transfer company MoneyGram confirmed that a cyberattack caused its service outage. American interstate and international peer-to-peer payments and money transfer company MoneyGram confirmed that its services are currently unavailable due to a cyberattack. On September 22, the company informed its customers that it was experiencing a network outage impacting connectivity to a number of our systems.

IT 314

More Trending

article thumbnail

New Android banking trojan Octo2 targets European banks

Security Affairs

A new version of the Android banking trojan Octo, called Octo2, supports improved features that allow to takeover infected devices. ThreatFabric researchers discovered a new version of the Android banking trojan Octo, called Octo2, that supports more advanced remote action capabilities needed for Device Takeover attacks. The new malware has already targeted users in European countries, including Italy, Poland, Moldova, and Hungary.

article thumbnail

Startup Torq Secures $70M to Advance Hyperautomation with AI

Data Breach Today

Series C Funding to Fuel Generative AI Integration and AI-Powered Threat Detection The funding will enhance generative AI technologies that streamline security operations and provide autonomous threat investigation, alongside plans for broader U.S. and European market penetration.

Security 285
article thumbnail

iOS 18 bug complaints abound online - here are the top glitches reported

Collaboration 2.0

Show-stopping iOS 18 bugs, so far, have been thankfully rare. Here's what to do if you encounter one of these minor annoyances.

246
246
article thumbnail

GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator

The Last Watchdog

Ever since the massive National Public Data (NPD) breach was disclosed a few weeks ago, news sources have reported an increased interest in online credit bureaus, and there has been an apparent upswing in onboarding of new subscribers. Related: Class-action lawsuits pile up in wake of NPD hack So what’s the connection? NPD reported the exposure of over 2.7 billion records.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Google Workspace users just got a big AI freebie - Gemini

Collaboration 2.0

Business, Enterprise, and Frontline users will get access to Gemini for work with security protections at no extra cost. Here's how.

Access 246
article thumbnail

Russia-Backed Media Outlets Are Under Fire in the US—but Still Trusted Worldwide

WIRED Threat Level

The US government says outlets like RT work closely with Russian intelligence, and platforms have removed or banned their content. But they’re still influential all around the world.

article thumbnail

Google Photos adds one-tap video editing for faster clip sharing, thanks to AI

Collaboration 2.0

Along with making tools easier to access, Google is introducing new editing tools to save you time and effort while you create 'stunning' clips.

Access 246
article thumbnail

China Accuses Taiwan of Waging Cyberwarfare

Data Breach Today

Spy Agency Says Taiwanese Defense Ministry Is Trying to Disrupt Chinese Politics China's Ministry of State Security has accused a Taiwanese government agency of waging cyberattacks on the mainland's digital assets across multiple organizations and running disinformation campaigns on social media to disrupt the political system and sow social discord.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

I replaced my Bose with the Nothing Open - now I only want to run with them on

Collaboration 2.0

The $149 Nothing Open earbuds have quickly become my favorite for exercise, thanks to their lightweight fit and great sound.

246
246
article thumbnail

23andMe to Pay $30M for Credential Stuffing Hack Settlement

Data Breach Today

Millions of Customers Will Also Be Offered Monitoring of Genetic Data on Dark Web Genetics testing firm 23andMe will offer cash payments to millions of individuals whose sensitive data was compromised in a 2023 credential stuffing incident. Under the proposed $30 million lawsuit settlement, affected customers will also be offered dark web monitoring of their genetic data.

182
182
article thumbnail

I tested the iPhone 16 and iPhone 16 Plus - and they left me with no Pro-model envy at all

Collaboration 2.0

Adding more utility, better cameras, and color may just be enough to cover the standard iPhone 16's shortcomings.

246
246
article thumbnail

Robert Herjavec Passes Cyderes CEO Role to Chris Schueler

Data Breach Today

Herjavec of 'Shark Tank' Steps Down After 21 Years in Charge, Remains Board Member "Shark Tank" TV star and company founder Robert Herjavec is stepping down as CEO of Cyderes, making way for Simeio CEO Chris Schueler to assume the role Oct. 1. Schueler has a strong background in identity management, and Herjavec will remain involved as an investor and board member.

173
173
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The 2-in-1 laptop I recommend for the office is not a Dell or a Lenovo ThinkPad

Collaboration 2.0

HP's EliteBook x360 1040 is a professional laptop/tablet combo with a feature set that enables one of the best video call environments for a work laptop.

246
246
article thumbnail

CrowdStrike Blames 'Confluence of Factors' for Global Outage

Data Breach Today

CrowdStrike Executive Testifies on Faulty Update That Caused Historic July Outage Adam Meyers, senior vice president for counter adversary operations at CrowdStrike, told lawmakers Tuesday the company suffered a global outage in July after its decade-old validation and testing processes failed to identify an "unexpected discrepancy" in the updated threat detection configurations.

IT 173
article thumbnail

This Linux distro poses its own challenges, but power-users will love it

Collaboration 2.0

NixOS is a rock-solid OS with a unique approach and an array of functionalities -- despite a bit of a learning curve.

IT 246
article thumbnail

Octo2 Malware Masquerades as Popular Apps

Data Breach Today

Android Poses as NordVPN, Google Chrome in Europe A new version of the Octo Android malware is spreading across Europe, posing as legitimate apps such as NordVPN and Google Chrome. The latest iteration includes advanced anti-detection mechanisms and a domain generation algorithm for command-and-control communication.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

I replaced my Bose with the Nothing Ear Open - now I only want to run with them on

Collaboration 2.0

The $149 Nothing Ear Open earbuds have quickly become my favorite for exercise, thanks to their lightweight fit and great sound.

246
246
article thumbnail

McAfee Discovers New Phishing Campaign Targeting GitHub Users

KnowBe4

A phishing campaign is targeting GitHub users with phony CAPTCHA pages, according to researchers at McAfee. The phishing emails ask users to address a security vulnerability in a GitHub repository that they recently contributed to, and contain a link to find more information about the alleged vulnerability. This link leads to a fake CAPTCHA page that attempts to trick them into installing malware.

Phishing 119
article thumbnail

88% of US parents see AI as essential to their children's education - survey

Collaboration 2.0

However, nearly as many parents say they don't know whether or not AI is even part of their children's curriculum.

Education 190
article thumbnail

CyberheistNews Vol 14 #39 [EYE OPENER] Beyond Analysts: The Undeniable Leadership We Have in HRM

KnowBe4

CyberheistNews Vol 14 #39 [EYE OPENER] Beyond Analysts: The Undeniable Leadership We Have in HRM

116
116
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US Kaspersky customers startled by forced switch to 'rando' AV software

Collaboration 2.0

Though Kaspersky said it emailed people about the automated change to a new product, some customers say they were surprised by the move.

IT 190
article thumbnail

What Is EDR in Cyber Security: Overview & Capabilities

eSecurity Planet

Endpoint detection and response (EDR) is an advanced safety system for detecting, investigating, and resolving cyber attacks on endpoints. It examines incidents, inspects behavior, and restores systems to their pre-attack state. EDR uses artificial intelligence, machine learning, and threat intelligence to dodge recurrences, allowing IT teams to neutralize attacks through threat hunting, behavioral analytics, and containment.

Security 111
article thumbnail

The fall of Intel: How gen AI helped dethrone a giant and transform computing as we know it

Collaboration 2.0

The once venerable x86 chip has been pushed aside by scalable, energy-efficient, AI-optimized architectures from Arm, Nvidia, and Qualcomm. Here's what happens next.

IT 190