Tue.Oct 01, 2024

article thumbnail

News agency AFP hit by cyberattack, client services impacted

Security Affairs

AFP suffered a cyberattack affecting its IT systems and content delivery for partners, the incident impacted some client services. Agence France-Presse (AFP) reported a cyberattack on Friday that impacted its IT systems and content delivery for partners. The media agency confirmed that the global news coverage remains unaffected, however some client services were impacted.

Passwords 337
article thumbnail

Europe Begins Drafting AI Code of Practice

Data Breach Today

AI Act General Purpose AI Rules to be Enforced in 2025 The European Commission appointed a 13 member team to draft the general purpose artificial intelligence code of practice mandated by the AI Act. The commission on Monday announced four working groups that will oversee drafting of the rules.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked APT Kimsuky targeted German defense firm Diehl Defence

Security Affairs

North Korea-linked APT Kimsuky has been linked to a cyberattack on Diehl Defence, a German manufacturer of advanced military systems. North Korea-linked APT group Kimsuky has been linked to a cyberattack on Diehl Defence, a defense firm specializing in the production of advanced military systems. Diehl Defence GmbH & Co. KG is a German weapon manufacturer headquartered in Überlingen.

Military 333
article thumbnail

Sick of ads on Android? Change these 5 settings for more privacy - fast

Collaboration 2.0

If you care about your phone privacy, consider tweaking these settings to prevent Android from targeting you with ads. Here's how.

Privacy 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

UMC Health System diverted patients following a ransomware attack

Security Affairs

US healthcare provider UMC Health System had to divert patients due to a network outage caused by a ransomware attack. On September 27, 2024, US healthcare provider UMC Health System announced an investigation into an IT outage across its network. UMC diverted patients for several days after taking IT systems offline following a ransomware attack. “However, out of an abundance of caution, we will continue to temporarily divert incoming emergency and non-emergency patients via ambulance to

More Trending

article thumbnail

U.S. CISA adds D-Link DIR-820 Router, DrayTek Multiple Vigor Router, Motion Spell GPAC, SAP Commerce Cloud bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds D-Link DIR-820 Router, DrayTek Multiple Vigor Router, Motion Spell GPAC, SAP Commerce Cloud bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SonicWall SonicOS, ImageMagick and Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.

Cloud 314
article thumbnail

Above the storms: How satellite tech can be a lifesaver during natural disasters

Collaboration 2.0

Hurricane Helene's devastation highlights a need for more people to have easier access to satellite messaging. Here are your options right now.

Access 246
article thumbnail

Third Party Zero-Day Bug Exploited in Rackspace Systems

Data Breach Today

Rackspace Scrambles to Patch Zero Day Dashboard Bug Rackspace confirmed that criminals exploited a zero day vulnerability in a ScienceLogic third-party application, forcing the cloud-hosting provider to take monitoring dashboards offline. ScienceLogic confirmed it issued a patch for the zero-day remote code execution vulnerability.

Cloud 189
article thumbnail

My favorite bone conduction headphones have 3 invaluable safety features

Collaboration 2.0

The Suunto Wing headphones are my new go-to for maintaining awareness of my surroundings while enjoying hours of motivating music.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Jana Partners Increases Stake in Rapid7, Eyes Potential Sale

Data Breach Today

Activist Investor Pressures Cybersecurity Firm to Pursue Operational Changes, Sale Jana Partners has raised its stake in cybersecurity vendor Rapid7 to 13% and is pushing for the company to consider selling itself. The activist investor teamed up with Cannae Holdings and is engaged in discussions with Rapid7's management to explore operational improvements and board restructuring.

Sales 189
article thumbnail

AirPods 4 review: A safe and reliable option, but certainly better than its predecessors

Collaboration 2.0

The Airpods 4 lineup offers staple but commonplace features for a low-risk/high-reward product. And that's what makes them great.

IT 246
article thumbnail

Dragos Boosts OT Defense with Network Perception Acquisition

Data Breach Today

Network Configuration Startup Adds Visualization Expertise to Dragos’ OT Platform Dragos' acquisition of Network Perception will enrich its real-time network monitoring with robust visualization and configuration analysis tools. This transaction aims to bolster the security of operational technology networks and support customers in building more defensible architectures.

Security 189
article thumbnail

My favorite Garmin sports watch ever just got a new version, and it costs $200 less

Collaboration 2.0

The Enduro 2 was the battery champ a couple of years ago. The Enduro 3 now takes the title while launching for $200 less than its predecessor.

IT 246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Experts Warn CISA’s Threat Sharing is in a 'Death Spiral'

Data Breach Today

US Cyber Defense Agency’s Flagship Threat Sharing Initiative Facing Major Hurdles Experts told Information Security Media Group the Cybersecurity and Infrastructure Security Agency’s flagship threat sharing initiative faces major logistical hurdles and may need to be replaced with a more mature approach to automated threat analysis following a damning Inspector General report.

article thumbnail

5 nearly hidden Android features you should already be using

Collaboration 2.0

Not all Android phone owners will use these lesser-known options every day. But when you do need them, you'll be grateful to have them at your fingertips.

190
190
article thumbnail

LockBit and Evil Corp Targeted In Anti-Ransomware Crackdown

Data Breach Today

UK Police Say Evil Corp 'Right-Hand Man' Was Also a LockBit Affiliate Law enforcement from the United States, United Kingdom, France and Spain made a coordinated announcement Tuesday of further arrests, indictments, sanctions and server takedowns targeting the Russian cybercriminal underground including strikes against the LockBit ransomware-as-a-service operation.

article thumbnail

Google's AI podcast tool transforms your text into stunningly lifelike audio - for free

Collaboration 2.0

I've been studying AI for years, and Google's new and oddly hidden AI podcast tool still astonishes me. Seriously, you have to hear this to believe it. But humans will beat the machines in the end. Here's why.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Will AI Middle Managers Be the Next Big Disruption?

Data Breach Today

Autonomous AI Is Transforming the Workforce. Here's What Managers Can Expect With its advanced - and evolving - capabilities, AI is integrated into most business processes and tasks, becoming nearly indispensable across industries. Its impact on the workforce is, thus, unsurprising and raises a familiar question: Can the technology take over jobs?

IT 182
article thumbnail

I changed these 6 TV settings to drastically speed up the performance

Collaboration 2.0

With a little investigation and effort, lag and juddering need not be part of your viewing experience.

190
190
article thumbnail

Logpoint Strengthens SIEM by Acquiring Muninn AI-Powered NDR

Data Breach Today

Purchase Adds Advanced AI Network Detection to Logpoint's Threat Response Toolbox Logpoint acquires Muninn to integrate its AI-based NDR technology, enhancing threat detection and response capabilities in its SIEM platform. This move supports Logpoint's mission to defend OT and ICS systems against ransomware attacks by combining visibility from networks and applications.

article thumbnail

I've weathered a lot of hurricanes - these are my must-have storm tracking tools

Collaboration 2.0

As a South Florida resident and technology pro, I closely monitor every model and update as a system develops and strengthens, starting 7-10 days ahead of landfall. Here are the apps and websites I depend on.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

White House Pledges Major Deliverables at Ransomware Summit

Data Breach Today

International Counter Ransomware Initiative to Unveil New Efforts to Combat Threats The International Counter Ransomware Initiative is kicking off a four-day summit Monday in Washington that aims to coordinate the group’s 68 member nations around a series of global efforts designed to enhance information sharing and develop strategies to deter ransomware attacks.

article thumbnail

Windows 11 users, beware: A recent update has been causing constant reboots

Collaboration 2.0

Patch KB5043145 can cause Windows 11 devices to restart over and over.

190
190
article thumbnail

Practical Steps to Securing Your OT Environment

Data Breach Today

Operational Technology (OT) security requires specialized strategies beyond traditional IT approaches.

Security 162
article thumbnail

What's new in Windows 11 24H2, and when will your PC get it?

Collaboration 2.0

Microsoft is about to release a new version of Windows 11. Should you rush to update or hold off?

IT 189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Evil Corp Protected by High-Ranking FSB Official, Police Say

Data Breach Today

UK National Crime Agency Details Kremlin-Cybercrime Connection Russian intelligence agencies tasked the notorious Russian-speaking cybercrime syndicate Evil Corp with conducting cyberattacks and cyberespionage operations on behalf of the Russian government, British police said Tuesday. Evil Corp has stolen at least $100 million from victims.

article thumbnail

Gemini Live is finally available for all Android phones - how to access it for free

Collaboration 2.0

Want a voice assistant you can have natural conversations with? You may not need to pay for ChatGPT's Voice Mode.

Access 189
article thumbnail

Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence

WIRED Threat Level

UK law enforcement and international partners have released new details about the cybercriminal gang Evil Corp, including its use of the Lockbit ransomware platform and ties to Russian intelligence.