Sun.Aug 18, 2024

article thumbnail

The Mad Liberator ransomware group uses social-engineering techniques

Security Affairs

New cybercrime group Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to conceal data exfiltrating. The Sophos X-Ops Incident Response team warned that a new ransomware group called Mad Liberator is exploiting the remote-access application Anydesk for their attacks. The group was also spotted running a fake Microsoft Windows update screen to conceal data exfiltrating.

article thumbnail

Weekly Update 413

Troy Hunt

Whilst there definitely weren't 2.x billion people in the National Public Data breach, it is bad. It really is fascinating how much data can be collected and monetised in this fashion and as we've seen many times before, data breaches do often follow. The NPD incident has received a huge amount of exposure this week and as is often the case, there are some interesting turns; partial data sets, an actor turned data broker, a disclosure notice (almost) nobody can load and bad actors pedd

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Large-scale extortion campaign targets publicly accessible environment variable files (.env)

Security Affairs

A large-scale extortion campaign compromised multiple organizations by exploiting publicly accessible environment variable files (.env). Palo Alto Unit 42 researchers uncovered a large-scale extortion campaign that successfully compromised and extorted multiple victim organizations by leveraging exposed environment variable files (.env files). The exposed files contained sensitive variables such as credentials belonging to various applications.

Access 144
article thumbnail

This Bluetooth speaker produces booming sound and fits in the palm of your hand

Collaboration 2.0

When it comes to Bluetooth speakers, small size usually means small sound. Unless you're talking about the JBL Clip 5.

IT 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

From 2018: DeepMasterPrints: deceive fingerprint recognition systems with MasterPrints generated with GANs

Security Affairs

Boffins demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks using ‘MasterPrints, ‘which are fingerprints that can match multiple other prints. A team of researchers from US universities demonstrated how to deceive fingerprint recognition systems through dictionary attacks using ‘MasterPrints,’ which are fingerprints that can match multiple other prints.

Risk 143

More Trending

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 7

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Deciphering the Brain Cipher Ransomware Ideal typosquat ‘solana-py’ steals your crypto wallet keys Ransomware attackers introduce new EDR killer to their arsenal Beyond the wail: deconstructing the BANSHEE infostealer A Deep Dive into a New ValleyRAT Campaign Targeting Chinese Speakers Tusk: unraveling a complex infostealer campaign Zero Day Ransomwar

Security 136
article thumbnail

The new COSMIC Linux desktop from System76 is out of this world

Collaboration 2.0

One of the most popular sellers of Linux desktops and laptops has finally released the alpha version of its new COSMIC desktop and it's something special.

IT 76
article thumbnail

‘Share government data to boost economy’, says UK statistics watchdog chief

The Guardian Data Protection

The UK Statistics Authority’s chair says linking data sets from departments could aid growth and improve services • We need to make data sharing across government the rule Ministers could find ways to boost the economy and improve public services by combining data from separate government departments, according to the head of the UK’s statistics watchdog.

article thumbnail

How to install Windows 11 the way you want (and bypass Microsoft's restrictions)

Collaboration 2.0

With the free Rufus utility, you can avoid Microsoft's stringent and annoying requirements to upgrade your existing Windows 10 PC or install Windows 11 on a clean computer - your way. Here's how to do it.

IT 76
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

We need to make data sharing across UK government the rule, not the exception

The Guardian Data Protection

By linking, analysing and communicating statistics, state departments can unlock their power for the public good • ‘Share government data to boost economy’, says UK statistics watchdog chief The incoming government faces many challenges in seeking to boost economic growth, improve public services and enhance families’ wellbeing. But it has opportunities too – some of them sitting right beneath its nose.

article thumbnail

How to freeze your credit - and how it can help protect you after data breaches

Collaboration 2.0

Concerned about a recent massive data breach involving Social Security numbers? Here's one way to protect yourself.

article thumbnail

A Digital Lock Maker Tried To Squash A DEF CON Talk. It Happened Anyway. Here’s Why.

The Security Ledger

Keyless lock maker Digilock withdrew a cease and desist order and allowed a DEF CON talk on security flaws in its devices to move forward. Other device makers should take note! The post A Digital Lock Maker Tried To Squash A DEF CON Talk. It Happened Anyway. Here’s Why. appeared first on The Security Ledger with Paul F. Roberts.

IT 52
article thumbnail

Get a Windows 11 Pro license for $20 - the lowest price we've seen

Collaboration 2.0

Upgrade to Windows 11 Pro for more productivity features to help you get things done, and save 89% with this deal.

75
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Security Affairs newsletter Round 485 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Large-scale extortion campaign targets publicly accessible environment variable files (.env) OpenAI dismantled an Iranian influence operation targeting the U.S. presidential election National Public Data confirms a data breach Banshee Stealer, a new macOS

article thumbnail

You can access Google's Gemini Live for free right now. Here's how (and why you'll want to)

Collaboration 2.0

With the latest AI model, you can have free-flowing conversations like you would with a human friend. Here's how to try it for yourself.

Access 75
article thumbnail

I went hands-on with Google's $1,800 Pixel 9 Pro Fold, and I'm ready to leave Samsung

Collaboration 2.0

The successor to one of last year's top foldable phones is lighter, brighter, still expensive, and full of potential.

75
article thumbnail

5 ways to climb the career ladder and become a successful CIO

Collaboration 2.0

The experts suggest there's never been a better time to be a digital leader. Here's how you can reach the top.

75
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

5 reasons why Pixel 9 stopped me from ditching Google phones for Nothing

Collaboration 2.0

After years of loyalty, I was ready to give up on Pixel phones for Nothing Phone 3. But Google changed my mind with the Pixel 9. Here's why.

74