Wed.Jun 19, 2024

article thumbnail

Google Chrome 126 update addresses multiple high-severity flaws

Security Affairs

Google released Chrome 126 update that addresses a high-severity vulnerability demonstrated at the TyphoonPWN 2024 hacking competition. Google has issued a Chrome 126 security update, addressing six vulnerabilities, including a flaw, tracked as CVE-2024-6100 which was demonstrated during the SSD Secure Disclosure’s TyphoonPWN 2024. TyphoonPWN is a live hacking competition held annually at TyphoonCon, an Offensive Security Conference in Seoul, South Korea.

Security 352
article thumbnail

UK Pathology Lab Ransomware Attackers Demanded $50 Million

Data Breach Today

Russian-Speaking Gang Follows Typical Playbook; Critical Services Still Disrupted The ransomware attack that disrupted U.K. pathology services provider Synnovis, continuing to cause thousands of canceled and delayed operations and appointments across London, reportedly featured a $50 million ransom demand from attackers, backed by the typical threat to leak stolen data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chip maker giant AMD investigates a data breach

Security Affairs

AMD announced an investigation after a threat actor attempted to sell data allegedly stolen from its systems. AMD has launched an investigation after the threat actor IntelBroker announced they were selling sensitive data allegedly belonging to the company. “We are aware of a cybercriminal organization claiming to be in possession of stolen AMD data,” the chip maker told media outlets. “We are working closely with law enforcement officials and a third-party hosting partner to i

article thumbnail

Perplexity Is a B t Machine

WIRED Threat Level

A WIRED investigation shows that the AI search startup Perplexity is surreptitiously downloading your data.

Security 317
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Cryptojacking campaign targets exposed Docker APIs

Security Affairs

A malware campaign targets publicly exposed Docker API endpoints to deliver cryptocurrency miners and other payloads. Researchers at Datadog uncovered a new cryptojacking campaign linked to the attackers behind Spinning YARN campaign. The threat actors target publicly exposed and unsecured Docker API endpoints for initial access. The attack begins with the threat actor scanning the internet to find hosts with Docker’s default port 2375 open.

Access 333

More Trending

article thumbnail

Alleged researchers stole $3 million from Kraken exchange

Security Affairs

Alleged researchers have exploited a zero-day in Kraken crypto exchange to steal $3 million worth of cryptocurrency. Kraken Chief Security Officer Nick Percoco revealed that alleged security researchers exploited a zero-day flaw to steal $3 million worth of cryptocurrency. The researchers are refusing to return the stolen funds. Kraken Security Update: On June 9 2024, we received a Bug Bounty program alert from a security researcher.

Sales 325
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

The tectonic shift of network security is gaining momentum, yet this transformation continues to lag far behind the accelerating pace of change in the operating environment. Related: The advance of LLMs For at least the past decade, the cybersecurity industry has been bending away from rules-based defenses designed to defend on-premises data centers and leaning more into tightly integrated and highly adaptable cyber defenses directed at the cloud edge.

article thumbnail

This Is What Would Happen if China Invaded Taiwan

WIRED Threat Level

The new book World on the Brink: How America Can Beat China in the Race for the 21st Century lays out what might actually happen if China were to invade Taiwan in 2028.

Security 208
article thumbnail

Popular Chatbots Spout Russian Misinformation, Finds Study

Data Breach Today

OpenAI, Meta and 8 Other Chatbots Use Disinformation Network as Source Popular artificial intelligence chatbots are rife with Russian disinformation, warns NewsGuard, the rating system for news and information websites. The chatbots failed to recognize that sites such as "The Boston Times" or "The Houston Post" are Russian propaganda fronts.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Happy 1st Birthday to Our KnowBe4 Community!

KnowBe4

Happy 1st birthday to our KnowBe4 Community! We’re so excited to celebrate our community's first anniversary. It’s been filled with so many wholesome moments and learning opportunities.

122
122
article thumbnail

Making the Move From Tech Expert to Cybersecurity Leader

Data Breach Today

10 Practical Steps to Make Yourself Stand Out as 'Leadership Material' To obtain a leadership role, consistently show your commitment to the field, your willingness to help others and your ability to effectively communicate and solve problems. By doing so, you can build a reputation as a knowledgeable, proactive and reliable leader in cybersecurity.

article thumbnail

New Blog Moderation Policy

Schneier on Security

There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that I need to do something. My options are limited because I’m just one person, and this website is free, ad-free, and anonymous.

IT 121
article thumbnail

Chinese Hackers Used Open-Source Rootkits for Espionage

Data Breach Today

UNC3886 Targeted Edge Devices for Persistence, Mandiant Says A suspected Chinese hacking group used open-source rootkits to ensure persistence on compromised edge devices such as VMware ESXi servers for espionage campaigns, Google Mandiant said. The hacking group, which Mandiant tracks as UNC3886, is likely a Chinese threat group hacking for Beijing.

173
173
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

How I organize my Slack workspaces with custom themes (and you can too)

Collaboration 2.0

Are your multiple Slack workspaces getting confusing? Here's how to differentiate them with custom themes.

100
100
article thumbnail

Ever Tried to Report a Scam on Facebook? Good Luck!

Data Breach Today

It's Time for Big Tech to Be Held Accountable for Rampant Online Fraud From account takeover threats to fake investment schemes, it doesn't take much time on social media to stumble upon a scam. But if you try to report these bad actors to social platforms such as Facebook, you may have a hard time doing so. On Facebook, "scam" or "fraud" aren't reporting options.

IT 162
article thumbnail

Guarding the grid: How utilities harness data to boost safety and productivity

OpenText Information Management

Throughout my career in the utilities industry, I’ve helped organizations to embrace change. I specialize in geographic information systems (GIS) , which is software that helps utilities manage location data and other asset information on a digital map. In the field, we rely on a team of people to answer the call and fix what's broken. Technology can help those teams respond even faster, especially during critical situations.

ECM 64
article thumbnail

Pentagon Cybersecurity, Workforce Woes Threaten Tech Rollout

Data Breach Today

New Report Says DOD Is Lagging in Procuring New Tech Amid Cybersecurity Failures The U.S. Department of Defense is struggling to rapidly test and deploy emerging technologies due to a series of cybersecurity and workforce challenges that hinder the Pentagon's process of acquiring weapon systems, according to a new Government Accountability Office report.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Rise of Privacy-by-Design: APRA's Impact on Business Practices

Thales Cloud Protection & Licensing

The Rise of Privacy-by-Design: APRA's Impact on Business Practices josh.pearson@t… Thu, 06/20/2024 - 07:01 When it comes to privacy, the regulatory landscape in the US is a patchwork of laws, where individual states like California lead the way with regulations like its California Consumer Privacy Act (CCPA) and then followed it up with the expanded California Privacy Rights Act (CPRA).

Privacy 62
article thumbnail

Radiology Practice Hack Affects Sensitive Data of 512,000

Data Breach Today

Breach Is Latest Major Cyber Incident Reported by a Medical Imaging Provider A Minnesota-based radiology practice is notifying more than 500,000 individuals that their information was accessed and potentially acquired by hackers. The incident is one of several major health data breaches reported by radiologists in recent months as affecting hundreds of thousands of patients.