Wed.Jul 31, 2024

article thumbnail

BingoMod Android RAT steals money from victims’ bank accounts and wipes data

Security Affairs

BingoMod is a new Android malware that can wipe devices after stealing money from the victims’ bank accounts. Researchers at Cleafy discovered a new Android malware, called ‘BingoMod,’ that can wipe devices after successfully stealing money from the victims’ bank accounts. The Cleafy TIR team discovered the previously undetected malware at the end of May 2024.

article thumbnail

Don’t Let Your Domain Name Become a “Sitting Duck”

Krebs on Security

More than a million domain names — including many registered by Fortune 100 firms and brand protection companies — are vulnerable to takeover by cybercriminals thanks to authentication weaknesses at a number of large web hosting providers and domain registrars, new research finds. Image: Shutterstock. Your Web browser knows how to find a site like example.com thanks to the global Domain Name System (DNS), which serves as a kind of phone book for the Internet by translating human-frie

Phishing 308
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple fixed dozens of vulnerabilities in iOS and macOS

Security Affairs

Apple has issued security updates to address multiple vulnerabilities across iOS, macOS, tvOS, visionOS, watchOS, and Safari. Apple released security updates to address multiple vulnerabilities in iOS, macOS, tvOS, visionOS, watchOS, and Safari. The IT giant released iOS 17.6 and iPadOS 17.6 to address dozens of security vulnerabilities, including authentication and policy bypasses, information disclosure and denial-of-service (DoS) issues, and bugs that can lead to memory leaks and unexpected a

article thumbnail

Better than Ring? This video doorbell features all the benefits and no subscription fees

Collaboration 2.0

The Lorex 2K video doorbell is the company's flagship security system. I tested it to see if it was worth the money.

Security 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

A ransomware attack disrupted operations at OneBlood blood bank

Security Affairs

OneBlood, a non-profit blood bank serving over 300 U.S. hospitals, suffered a ransomware attack that disrupted its medical operations. OneBlood is a non-profit organization that provides blood and blood products to over 300 hospitals and medical facilities across the U.S. Southeast. The organization collects, tests, and distributes blood to ensure a steady supply for needy patients.

More Trending

article thumbnail

Phishing campaigns target SMBs in Poland, Romania, and Italy with multiple malware families

Security Affairs

Phishing campaigns target small and medium-sized businesses (SMBs) in Poland to deliver malware families such as Agent Tesla, Formbook, and Remcos RAT. ESET researchers observed multiple phishing campaigns targeting SMBs in Poland in May 2024, distributing various malware families like Agent Tesla , Formbook , and Remcos RAT. ESET researchers detected nine notable phishing campaigns during May 2024 in Poland, Romania, and Italy.

Phishing 331
article thumbnail

How to get a free Windows (or Linux) recovery image for your Dell, HP, Lenovo, or Microsoft Surface PC

Collaboration 2.0

What's better than a clean install? How about a clean installation that includes all required drivers and utility programs? Here's how to locate a recovery image that will help you reinstall Windows 10, Windows 11, or even Linux on your Dell, HP, Lenovo, or Microsoft Surface PC.

246
246
article thumbnail

UK ICO Reprimands Electoral Commission for 2021 Hack Attack

Data Breach Today

Hackers Exploited ProxyShell Vulnerability to Compromise Commission Systems The British data regulator reprimanded the U.K.'s Electoral Commission for its failure to prevent a 2021 hack attack that resulted in the exposure of millions of voter records. Hackers breached the Electoral Commission's networks after exploiting the ProxyShell vulnerability.

IT 223
article thumbnail

This robot lawn mower is so impressive my neighbors come to watch it mow

Collaboration 2.0

The Husqvarna Automower 430X gave us all the benefits of a freshly mowed lawn all summer for none of the work.

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Can ChatGPT-4o Be Trusted With Your Private Data?

WIRED Threat Level

OpenAI’s newest model is “a data hoover on steroids,” says one expert—but there are still ways to use it while minimizing risk to your private data.

Risk 188
article thumbnail

Google Maps and Waze have 5 new features. Here's how they can help you

Collaboration 2.0

Finding parking and avoiding traffic just got a lot easier, thanks to new features in Google's GPS apps.

189
189
article thumbnail

Artificial Intelligence Tops Agenda for Global Competition Authorities: EU, UK, and U.S. Issue Joint Statement

Data Matters

On July 23, 2024, the competition authorities of the EU, the UK, and the U.S. issued a joint statement on competition in generative artificial intelligence (AI) foundation models and AI products (Joint Statement). Since the emergence of generative AI, each of the authorities has been individually ramping up its work in order to understand better the potential risks to competition that AI may pose.

article thumbnail

If Intel can't come up with a Qualcomm-killer soon, it's game over for x86 PCs

Collaboration 2.0

Qualcomm's introduction of the Snapdragon X, which powers almost every new Copilot+ Windows PC, has created an existential crisis for Intel. Can the x86 architecture handle the competition?

IT 190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Western Sydney University Reveals Major Data Breach

Data Breach Today

Hackers Accessed the University’s Storage Platform for Over 9 Months Australia's Western Sydney University said hackers exploited its Microsoft Office 365 environment to steal up to 580 terabytes of data. Breached data includes names, birthdates, health information, government identification documents, bank account information and superannuation details.

article thumbnail

The best smartwatches of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best smartwatches from Apple, Samsung, Google, and more. Here's how to choose the right one for you.

190
190
article thumbnail

Mandiant Uncovers Threat Group Behind Basta Ransomware

Data Breach Today

UNC4393 Is a Financially Motivated Threat Group Active Since 2022 A newly identified financially motivated hacking group is deploying Basta ransomware as part of an ongoing campaign. Since Basta is not publically marketed and is available on invitation-only basis, Mandiant researchers believe the group is likely the "primary user of Basta ransomware.

article thumbnail

The best Android smartwatches in 2024: Expert tested and reviewed

Collaboration 2.0

From the Galaxy Watch Ultra to the Tag Heuer luxury smartwatch, we tested the best smartwatches for Android users to help you choose the right one.

190
190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ransomware Hit on Florida Blood Center Affects Supplies

Data Breach Today

OneBlood Is Urging Hundreds of Hospitals to Activate Shortage Protocols A Florida-based blood donation center is urging hundreds of hospitals in the southeastern U.S. to activate critical blood shortage protocols as the nonprofit organization deals with a ransomware attack that's disrupting its blood collection, inventory and related processes.

article thumbnail

The best Garmin watches of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best Garmin watches to help you decide which smartwatch is the right option for you, no matter your budget.

190
190
article thumbnail

Microsoft Azure Cloud Service Fails to Withstand DDoS Attack

Data Breach Today

Tech Giant Blames DDoS Defense Implementation Error for Failing to Mitigate Attack Microsoft blamed a widespread Azure cloud computing platform service outage, including Microsoft 365 problems, on its failure to stop a distributed denial-of-service attack after "an error in the implementation of our defenses amplified the impact of the attack rather than mitigating it.

Cloud 147
article thumbnail

Microsoft 365 subscriptions now include a free VPN - here's how to use it

Collaboration 2.0

It's not bad for a free product but there are a few downsides.

IT 189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Begging for Bounties and More Info Stealer Logs

Troy Hunt

TL;DR — Tens of millions of credentials obtained from info stealer logs populated by malware were posted to Telegram channels last month and used to shake down companies for bug bounties under the misrepresentation the data originated from their service. How many attempted scams do you get each day? I woke up to yet another "redeem your points" SMS this morning, I'll probably receive a phone call from "my bank" today (edit: I was close, it was "Amazon Prime" &

Passwords 137
article thumbnail

California digitizes car titles, putting 42 million vehicles on the blockchain

Collaboration 2.0

Residents will be able to access or transfer their car titles in minutes, cutting down on trips to the DMV and post office.

article thumbnail

Nearly 7% of Internet Traffic Is Malicious

Schneier on Security

Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes after proof-of-concepts are published. News articles.

Security 131
article thumbnail

Why Snap and Flatpak make Linux a better OS and how they're different

Collaboration 2.0

These package managers make it easy to turn Linux into a productivity powerhouse.

IT 190
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New Securonix CEO Calls for Product Expansion, Global Growth

Data Breach Today

Kash Shaikh Seeks International Expansion, Opportunistic M&A Amid Tectonic Shifts Securonix tapped the ex-leader of Virtana as its next chief executive to capitalize on upheaval in the SIEM market with international expansion and opportunistic M&A. The company tasked Kash Shaikh with expanding in Europe and Asia-Pacific by prioritizing countries or regions where demand is high.

Marketing 130
article thumbnail

5 reasons why Linux will overtake Windows and MacOS on the desktop - eventually

Collaboration 2.0

Although Linux still only commands single digits in market share, I expect that to rise exponentially over the coming years. Here's why.

Marketing 190
article thumbnail

Bad Certificate Revocation: DigiCert Offers Temporary Pause

Data Breach Today

Citing 'Critical Infrastructure' Problems, Certificate Authority Offers 3-Day Delay DigiCert said it will temporarily pause - on request - for up to three days the forced revocation of some digital certificates it issued that failed to comply with strict validation rules. The CA/Browser Forum requires any certificate with validation problems to be revoked within 24 hours.

IT 130