Mon.Dec 30, 2024

article thumbnail

Palo Alto Firewalls Backdoored by Suspected Chinese Hackers

Data Breach Today

Hackers Targeted a PAN-OS Flaw Days After Its Disclosure A suspected Chinese hacking campaign that began in November is exploiting a vulnerability in Palo Alto firewalls to install a custom malware backdoor for espionage. UNC5325 activity aligns with the Chinese hacking strategy of targeting edge devices.

IT 200
article thumbnail

AI agents might be the new workforce, but they still need a manager

Collaboration 2.0

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

139
139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Launch Supply Chain Attack Against Chrome Extensions

Data Breach Today

Users of Cyberhaven's Data-Loss Prevention Chrome Extension Among Those Targeted Multiple Chrome browser extensions have been hacked, allowing attackers to steal the data they handle, security experts have warned. Subverted extensions include a data-loss tool built by cybersecurity startup Cyberhaven, which said attackers appeared to be targeting Facebook Ads accounts.

article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Collaboration 2.0

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

130
130
article thumbnail

How to Create Sales Email Sequences That Convert

Modern go-to-market teams know it takes more than one email to break through the noise. Multiple touchpoints means more ways to get your pitch right — and, potentially, more ways to be wrong. The good news? Once you know how to write compelling, one-off emails to entice prospective customers, you can easily do the same across a short sequence of emails.

article thumbnail

Chinese Hackers Breach US Treasury in 'Major Incident'

Data Breach Today

Treasury Tells Lawmakers Chinese Threat Actor Remotely Breached Agency Workstations The U.S. Treasury Department notified lawmakers Friday that the agency was the victim of a major cyberattack in which Chinese-linked hackers gained access to unclassified documents after gaining access to remote workstations through a third-party software provider, BeyondTrust.

Access 147

More Trending

article thumbnail

Four-Faith Routers Exploited Using New Flaw

Data Breach Today

Attackers Exploiting OS Command Injection Vulnerability Hackers are exploiting a high-severity command injection vulnerability in Chinese-manufactured Four-Faith industrial routers. Typical customers of Four-Faith use the routers for remote monitoring, control systems, supervisory control and data acquisition networks.

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Collaboration 2.0

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

122
122
article thumbnail

A Year of AI Pragmatism and Paradigm Shifts

Data Breach Today

2025 Is Likely to See Balanced Approach to AI Across Industries The AI landscape is set to transform in 2025 with pragmatic approaches to implementation replacing the experimental fervor. This shift will span industries and developer ecosystems. Technologies will ride on the transformative power of AI and the responsibility that comes with it.

IT 147
article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Collaboration 2.0

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

119
119
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Protecting Highly Sensitive Health Data for Research

Data Breach Today

Fully homomorphic encryption can safeguard highly sensitive health data related to rare diseases, underserved populations and clinical trials as it is shared with medical researchers, said Kurt Rohloff, co-founder and CTO of Duality Technologies, who said projects to apply it are underway right now.

article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

IT 118
article thumbnail

Volkswagen Subsidiary Exposed Data of 800,000 Cars Online

Data Breach Today

Flaw Exposed Vehicle Data and Private Details of Car Owners in Europe A security snafu at a Volkswagen subsidiary exposed vehicle information and ownership details on approximately 800,000 cars, including precise location data and owners' personal profiles. A whistleblower found a vulnerability in the cloud storage accounts of Volkswagen subsidiary Cariad.

Cloud 130
article thumbnail

How to add alt text to images on Bluesky (and why you should)

Collaboration 2.0

Alt text is far more important than you might think, and Bluesky makes it fairly easy for you to add it to images you post.

IT 117
article thumbnail

Foundational ABM Building Blocks

Account-based marketing (ABM) is a key strategy for driving sustainable growth. Today, many B2B companies use ABM teams or technologies to make sales. But getting a program off the ground successfully doesn’t have to be a daunting task. Watch this webinar with Rachael Foster, Director of Account-Based Experience at ZoomInfo, and Dan Dolph, Manager of Account-Based Experience at ZoomInfo.

article thumbnail

Cisco states that the second data leak is linked to the one from October

Security Affairs

Cisco confirmed the authenticity of the 4GB of leaked data, the data was compromised in a recent security breach, marking the second leak in the incident. Cisco confirmed the authenticity of the 4GB of leaked data, which was compromised in a recent security breach, marking it as the second leak in the incident. “We are aware of some recent social media posts made by the actor.

article thumbnail

New Windows 11 24H2 bug could block future security updates - see who's affected

Collaboration 2.0

Installing the Windows 11 2024 version via a CD or flash drive may cause it to reject any future updates.

Security 108
article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

article thumbnail

5 alternative browsers that might just replace Safari on your Mac

Collaboration 2.0

Although Safari is a competent browser, there are better alternatives available. Let's look at five hidden gems I've tried and recommend -- but you might not have heard about them until now.

102
102
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake

Security Affairs

An X user using the handle @NSA_Employee39 disclosed a zero-day vulnerability in the open-source file archive software 7-Zip. A verified X account, @NSA_Employee39, claimed to disclose a zero-day vulnerability in the open-source file archive software 7-Zip. The X user announced it would be dropping 0days all this week, starting with an arbitrary code execution vulnerability in the open-source software 7-Zip.

Archiving 127
article thumbnail

This low-cost Lenovo gaming PC is the one I recommend to most people. Let me tell you why

Collaboration 2.0

The Lenovo LOQ Tower 17IRR9 is a solid little machine capable of easily handling most workloads. And the best part is that it's inexpensive.

IT 97
article thumbnail

China-linked actors hacked US Treasury Department

Security Affairs

China-linked threat actors breached the U.S. Treasury Department by hacking a remote support platform used by the agency. China-linked threat actors breached the U.S. Treasury Department via a compromised remote support platform. The Treasury Department discovered the security breach on December 8th from its vendor BeyondTrust , according to a letter to lawmakers.

article thumbnail

Google's quantum breakthrough is 'truly remarkable' - but there's more to do

Collaboration 2.0

Scaling physical qubits reliably is a step forward. Now comes the hard part: actual circuits.

94
article thumbnail

AI in Sales: How AI is Transforming Go-to-Market

How will generative AI transform sales? It’s a question that promises to drive billions of dollars in revenue opportunities over the next five to 10 years. And if you’re not leveraging AI solutions in your go-to-market motions, you’re already behind. In this eBook, we’ll cover: How today’s top sales leaders are incorporating AI into their go-to-market motions.

article thumbnail

Threat actors attempt to exploit a flaw in Four-Faith routers

Security Affairs

VulnCheck researchers warn that threat actors are attempting to exploit a high-severity vulnerability impacting some Four-Faith routers. Cybersecurity firm VulnCheck warns that a high-severity flaw, tracked as CVE-2024-12856 (CVSS score: 7.2), in Four-Faith routers is actively exploited in the wild. The vulnerability is an operating system (OS) command injection vulnerability that impacts Four-Faith router models F3x24 and F3x36. “At least firmware version 2.0 allows authenticated and remo

article thumbnail

If you're ready for something different, I recommend this Linux distro to newbies and experts alike

Collaboration 2.0

OpenMandriva is a sensible operating system that's not based on the top four most popular Linux distros, but just as easy to use.

88
article thumbnail

The Most Dangerous People on the Internet in 2024

WIRED Threat Level

From Elon Musk and Donald Trump to state-sponsored hackers and crypto scammers, this was the year the online agents of chaos gained ground.

Privacy 114
article thumbnail

If updates bricked your Meta Quest headset, try this first - then ask for a replacement

Collaboration 2.0

A recent software update is disabling Quest 2, 3, and 3S models. Meta is offering free replacements to some users.

79
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Weekly Update 432

Troy Hunt

There's a certain irony to the Bluesky situation where people are pushing back when I include links to X. Now, where have we seen this sort of behaviour before? 🤔 When I'm relying on content that only appears on that platform to add context to a data breach in HIBP and that content is freely accessible from within the native Bluesky app (without needing an X account), we're out of reasonable excuses for the negativity.

article thumbnail

These are the top wearable tech products of 2024

Collaboration 2.0

From sleep earbuds to smart rings, here are the wearables that impressed me most this year.

77
article thumbnail

U.S. Army Soldier Arrested in AT&T, Verizon Extortions

Krebs on Security

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m , a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea.

Military 336