Thu.Aug 15, 2024

article thumbnail

NationalPublicData.com Hack Exposes a Nation’s Data

Krebs on Security

A great many readers this month reported receiving alerts that their Social Security Number, name, address and other personal information were exposed in a breach at a little-known but aptly-named consumer data broker called NationalPublicData.com. This post examines what we know about a breach that has exposed hundreds of millions of consumer records.

article thumbnail

A group linked to RansomHub operation employs EDR-killing tool EDRKillShifter

Security Affairs

A cybercrime group linked to the RansomHub ransomware was spotted using a new tool designed to kill EDR software. Sophos reports that a cybercrime group, likely linked to the RansomHub ransomware operation, has been observed using a new EDR-killing utility that can terminate endpoint detection and response software on compromised systems. The researchers called the new tool EDRKillShifter.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App

WIRED Threat Level

A fix is coming, but data analytics giant Palantir says it’s ditching Android devices altogether because Google’s response to the vulnerability has been troubling.

Analytics 296
article thumbnail

Tweaking BIOS settings of patched Raptor Lake motherboards could trash your CPU anyway

Collaboration 2.0

The microcode update may only protect CPUs when Intel's own default power settings are selected.

246
246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Revoked DigiCert Digital Certificates: 27% Not Yet Replaced

Data Breach Today

Many Customers Apparently Still Struggling to Reissue Certificates, Researchers Say Thousands of organizations appear to still be struggling to comply with a forced, mass revocation of thousands of digital certificates issued by DigiCert using a buggy verification mechanism. Researchers recently said 27% of the 83,267 revoked certificates have yet to be reissued by customers.

200
200

More Trending

article thumbnail

Breach Roundup: Microsoft's August Patch Contains 90 Fixes

Data Breach Today

Also: Azure Health Bot Vulnerabilities Expose Risks in Cloud-Based Chatbots This week, Microsoft released its August patch of 90 fixes, flaws were discovered in Azure Health Bot, Orion lost $60 million in a BEC scam, Schlatter Industries was hit by malware, Microsoft said it will discontinue Paint 3D in November and Russia restricted access to Signal.

Cloud 182
article thumbnail

This $240 Android tablet is far more impressive than I expected

Collaboration 2.0

The Oukitel OT5 is a solid but cost-effective Android tablet that won't break the bank.

246
246
article thumbnail

Deep Dive: Why Can't We Solve API Security?

Data Breach Today

CISOs, Analysts Explore Solutions to Visibility, Governance and Incident Response APIs are the connections that make digital business happen. Companies on average rely on more than 15,000 APIs, but these interfaces pose security risks. In this "Deep Dive" special report, ISMG's Anna Delaney explores how security leaders are tackling API security.

Security 162
article thumbnail

Grammarly to roll out a new AI content detector tool. Here's how it works

Collaboration 2.0

Grammarly Authorship will attempt to detect whether AI, a human, or a combination of the two created content. Though it will be available to any user, the new tool is targeted to the education market in particular.

Education 190
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Officials Warn of Risks as McLaren Recovers From Attack

Data Breach Today

Michigan AG and Lawmaker Want Michigan to Bolster Cyber Protections As McLaren Health Care continues to restore its IT systems in the wake of a ransomware attack last week, some Michigan government officials are warning consumers about potential cybercrimes and other concerns stemming from that and similar cyber incidents involving healthcare groups in the state.

Risk 147
article thumbnail

The best antivirus software of 2024

Collaboration 2.0

Malware is a constant threat to your safety and privacy, which means you need to protect your devices. We found the best antivirus software and apps that will help keep you safe and secure.

Privacy 190
article thumbnail

Russian FSB Hackers Behind Espionage Campaign Targeting NGOs

Data Breach Today

Security Researchers Also Uncovered a New Suspected Russian Threat Group A Russian hacking group notorious for hack-and-leak operations is behind a recent campaign targeting Russian dissidents and rights groups across the United States and Europe. Researchers also uncovered what they say is a previously unidentified threat actor targeting similar communities.

Security 147
article thumbnail

The best cheap VPNs of 2024: Expert tested

Collaboration 2.0

VPN deals aren't always what they seem, with permanent countdown timers only displaying standard prices. So, we found the best deals online for cheap VPN services that provide speed and safety without breaking the bank.

190
190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Infosecurity Europe 2024: Latest Insights on Cybersecurity

Data Breach Today

Compendium Features Dozens of In-Depth Interviews With CEOs, CISOs and Researchers Welcome to Information Security Media Group's Infosecurity Europe 2024 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs, government leaders and more. Inside this 30-page guide, you'll find links to dozens of videos created by ISMG.Studio.

article thumbnail

Sonos is failing and millions of devices could go with it - why open-source audio is our only hope

Collaboration 2.0

Sonos' upheaval highlights the risks of closed systems in home audio. Here's how an open-source platform and universal speaker connectivity standard could benefit everyone.

Risk 190
article thumbnail

Cryptohack Roundup: Judge Approves FTX-CFTC Settlement

Data Breach Today

Also: WazirX's Post-Hack Plan, Mango Markets Hacker's Plea for Dismissal This week, FTX settled with the CFTC, the Mango Markets hacker sought dismissal of charges, WazirX said it will reverse trades, Solana fixed a vulnerability, the SEC sued NovaTech and settled with Ideanomics, and researchers discovered a new way to steal crypto private keys.

Marketing 147
article thumbnail

Grammarly's new tool aims to detect AI-generated text. Here's how it works

Collaboration 2.0

Grammarly Authorship will attempt to detect whether AI, a human, or a combination of the two created content. Though it will be available to any user, the new tool is targeted to the education market in particular.

Education 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

NIST Releases First Post-Quantum Encryption Algorithms

Schneier on Security

From the Federal Register : After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was CRYSTALS-KYBER, along with three digital signature schemes: CRYSTALS-Dilithium, FALCON, and SPHINCS+. These algorithms are part of three NIST standards that have been finalized: FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard FIPS 204: Module-Lattice-Base

article thumbnail

Was your Social Security number leaked to the dark web? Here's how to know and what to do

Collaboration 2.0

A recent breach involving nearly 3 billion personal records included many SSNs. Was yours one of them? Here's how to find out and what to do next.

Security 190
article thumbnail

DigiCert to Buy Vercara to Boost DNS Security, Digital Trust

Data Breach Today

Deal to Unite DNS and SSL for Big Enterprises, Streamline Digital Trust Management The Vercara acquisition by DigiCert will combine DNS and SSL management into a single platform, driving automation and improving security for enterprises. The deal is expected to create a unified solution for certificate and domain validation while enhancing protection against cyberthreats.

Security 130
article thumbnail

California residents can add their driver's license to Apple & Google Wallet. Here's how

Collaboration 2.0

The mobile version of your license can be used at certain airports and convenience stores and should mean quicker age verification.

189
189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Navigating Security Threats With Return-Oriented Programming

Data Breach Today

Assistant Professor Bramwell Brizendine on Process Injection, Advanced Mitigation Return-oriented programming continues to pose significant security challenges. Assistant Professor Bramwell Brizendine discusses how ROP exploits binary vulnerabilities for process injection and the advancements in tools designed to automate ROP chain generation.

Security 130
article thumbnail

My 3 favorite AI chatbot apps for iOS - and what you can do with them

Collaboration 2.0

Generative AI offers incredible possibilities. These apps let you tap into that potential by chatting with your iPhone. Here's how.

189
189
article thumbnail

File-Sharing Phishing Attacks Increased by 350% Over the Past Year

KnowBe4

File-sharing phishing attacks have skyrocketed over the past year, according to a new report from Abnormal Security.

Phishing 124
article thumbnail

Wiping a Windows laptop? Here's the safest free way to erase your personal data

Collaboration 2.0

Before you sell, give away, or otherwise dispose of an old laptop, make sure your personal files are thoroughly deleted and unrecoverable. Here's how.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Latest Phishing Scam Uses Cross-Site Scripting Attack to Harvest Personal Details

KnowBe4

Cross-Site Scripting (XSS) is alive and well, and used in attacks to obfuscate malicious links in phishing emails to redirect users to threat-actor controlled websites.

Phishing 122
article thumbnail

10 things I always do after installing Linux - and why you should too

Collaboration 2.0

Before you dive too deep into your new distro, follow my to-do list of post-installation steps. It's 10 minutes well spent!

IT 189
article thumbnail

Ransomware Payments Decline While Data Exfiltration Payments Are On The Rise

KnowBe4

The latest data from Coveware shows a slowing of attack efficacy, a decrease in ransom payments being made, and a shift in initial access tactics.