Tue.May 21, 2024

article thumbnail

Blackbasta group claims to have hacked Atlas, one of the largest US oil distributors

Security Affairs

The Blackbasta extortion group claims to have hacked Atlas, one of the largest national distributors of fuel in the United States. Atlas is one of the largest national fuel distributors to 49 continental US States with over 1 billion gallons per year. The Blackbasta extortion group added the company to the list of victims on its Tor leak site, as the researcher Dominic Alvieri reported.

article thumbnail

RSAC Fireside Chat: IRONSCALES utilizes LLM, superior intel to stay a step ahead of Deep Fakes

The Last Watchdog

There was a lot of buzz at RSAC 2024 about how GenAI and Large Language Models (LLM) are getting leveraged — by both attackers and defenders. Related: Is your company moving too slow or too fast on GenAI? One promising example of the latter comes from messaging security vendor IRONSCALES. I had the chance to sit down with Eyal Benishti , IRONSCALES founder and CEO, to get a breakdown of how their new Generative Adversarial Network (GAN) technology utilizes a specialized LLM to reinforce an

Phishing 303
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts released PoC exploit code for RCE in QNAP QTS

Security Affairs

Experts warn of fifteen vulnerabilities in the QNAP QTS, the operating system for the Taiwanese vendor’s NAS products. An audit of QNAP QTS conducted by WatchTowr Labs revealed fifteen vulnerabilities, most of which have yet to be addressed. The most severe vulnerability is a flaw tracked as CVE-2024-27130. The issue is an unpatched stack buffer overflow vulnerability in the ‘No_Support_ACL’ function of ‘share.cgi,’ an unauthenticated attacker can exploit this issue

article thumbnail

How to Land Your Dream Job in Tech

Data Breach Today

Tips to Get You to the Place in Your Career Where You Really Want to Be LinkedIn recently released its list of the top companies to work for in 2024. Securing a technical position at a top company requires a strategic approach. Here are some practical tips to help you get started on landing your dream job in tech.

Security 298
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

CISA adds NextGen Healthcare Mirth Connect flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

CISA adds NextGen Healthcare Mirth Connect deserialization of untrusted data vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a NextGen Healthcare Mirth Connect vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The issue, tracked as CVE-2023-43208 , is a Deserialization of Untrusted Data Vulnerability.

IT 311

More Trending

article thumbnail

Experts warn of a flaw in Fluent Bit utility that is used by major cloud platforms and firms

Security Affairs

A vulnerability in the Fluent Bit Utility, which is used by major cloud providers, can lead to DoS, information disclosure, and potentially RCE. Tenable researchers have discovered a severe vulnerability in the Fluent Bit utility, which is used on major cloud platforms. Fluent Bit is an open-source, lightweight, and high-performance log processor and forwarder.

Cloud 306
article thumbnail

Eventbrite Promoted Illegal Opioid Sales to People Searching for Addiction Recovery Help

WIRED Threat Level

A WIRED investigation found thousands of Eventbrite posts selling escort services and drugs like Xanax and oxycodone—some of which the company’s algorithm recommended alongside addiction recovery events.

Sales 233
article thumbnail

Embracing the Unique Identity of Women in Information Management: Finding Acceptance and Home

AIIM

We live and work in the liminal spaces where transformation and possibility reside. It is this possibility that we, as Women in Information Management, must take advantage of.

IT 210
article thumbnail

Training LLMs: Questions Rise Over AI Auto Opt-In by Vendors

Data Breach Today

Few Restrictions Appear to Exist, Provided Companies Behave Transparently Can individuals' personal data and content be used by artificial intelligence firms to train their large language models, without requiring users to opt in? The answer may vary by geography, but even in Europe so far appears to be "yes," provided vendors practice transparency with users.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The best VPN trials of 2024: Expert tested and reviewed

Collaboration 2.0

We found the best VPN free trial offers so you can test a VPN's speed and reliability before you commit.

190
190
article thumbnail

100 Groups Urge Feds to Put UHG on Hook for Breach Notices

Data Breach Today

Medical Associations Ask HHS to Clarify HIPAA Duties in Change Healthcare Hack More than 100 medical associations and industry groups representing tens of thousands of U.S. doctors and healthcare professionals have banded together to urge federal regulators to hold Change Healthcare responsible for breach notifications related to a massive February ransomware attack.

article thumbnail

News alert: Memcyco report reveals only 6% of brands can stop digital impersonation fraud

The Last Watchdog

New York, NY, May 21, 2024, CyberNewsWire — Memcyco Inc., provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State of Website Impersonation Scams report. Notably, Memcyco’s research indicates that the majority of companies do not have adequate solutions to counter digital impersonation fraud, and that most only learn about attacks from their customers.

B2C 162
article thumbnail

Did OpenAI Illegally Mimic Scarlett Johansson's Voice?

Data Breach Today

Actor Said She Firmly Declined Offer From AI Firm to Serve as Voice of GPT-4.o Hollywood megastar Scarlett Johansson said a voice built into OpenAI's new GPT-4o is "eerily similar" to her own, despite her declining the company's request to lend it her voice. While AI firms have a penchant for moving fast and breaking things, how far can their appropriation go?

IT 182
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Have I Been Pwned Employee 1.0: Stefán Jökull Sigurðarson

Troy Hunt

We often do that in this industry, the whole "1.0" thing, but it seems apt here. I started Have I Been Pwned (HIBP) in 2013 as a pet project that scratched an itch, so I never really thought of myself as an "employee" Over time, it grew (and I tell you what, nobody is more surprised by that than me!) and over the last few years, my wife Charlotte got more and more involved.

Passwords 135
article thumbnail

CISA: NextGen Healthcare Flaw Still Exploited After 7 Months

Data Breach Today

Attackers Are Targeting the Widely Used Mirth Connect Data Integration Platform Cyberattackers are actively exploiting a vulnerability in the NextGen Healthcare Mirth Connect product, an open-source data integration platform widely used by healthcare companies, said CISA in an alert Monday. The flaw, which allows remote code execution, has been known since October 2023.

173
173
article thumbnail

Cyber Insurance Claims Rise Due To Phishing and Social Engineering Cyber Attacks

KnowBe4

New data covering cyber insurance claims through 2023 shows claims have increased while reaffirming what we already know: phishing and social engineering are the real problem.

Insurance 124
article thumbnail

Kevin Mandia Exits Mandiant CEO Role After Google Purchase

Data Breach Today

Sandra Joyce, Jurgen Kutscher to Oversee Mandiant Threat Intel, IR Business Units Kevin Mandia will vacate the CEO position at his namesake company 20 months after the threat intelligence and incident response titan was bought by Google. Mandia's May 31 transition into an advisory role at Google will cap off two decades of private sector leadership for the U.S.

173
173
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Detecting Malicious Trackers

Schneier on Security

From Slashdot : Apple and Google have launched a new industry standard called “ Detecting Unwanted Location Trackers ” to combat the misuse of Bluetooth trackers for stalking. Starting Monday, iPhone and Android users will receive alerts when an unknown Bluetooth device is detected moving with them. The move comes after numerous cases of trackers like Apple’s AirTags being used for malicious purposes.

IT 122
article thumbnail

Snapchat Revises AI Privacy Policy Following UK ICO Probe

Data Breach Today

ICO Urges Companies to Assess Data Protection Before Releasing Products Instant messaging app Snapchat brought its artificial intelligence-powered tool under compliance after the U.K. data regulator said it violated the privacy rights of individual Snapchat users. The agency concluded its probe by stating that the company has brought its privacy measures in compliance.

Privacy 162
article thumbnail

Newly Updated Grandoreiro Banking Trojan Distributed Via Phishing Campaigns

KnowBe4

Researchers at IBM X-Force are tracking several large phishing campaigns spreading an updated version of the Grandoreiro banking trojan.

Phishing 119
article thumbnail

Healthcare Identity Security: What to Expect From a Solution

Data Breach Today

What are the key elements of a successful identity security program, and what are common pitfalls organizations experience when launching one? SailPoint healthcare experts Matthew Radcliffe and Rob Sebaugh detail myths and realities of today's cloud-based identity security deployment strategies.

Security 147
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

CyberheistNews Vol 14 #21 How Come Unknown Attack Vectors Are Surging in Ransomware Infections?

KnowBe4

How Come Unknown Attack Vectors Are Surging in Ransomware Infections?

article thumbnail

Collibra wins prestigious 2024 Communicator Award for AI Governance campaign

Collibra

Today, we’re thrilled to announce that Collibra has been awarded multiple Communicator Awards for our ‘Do more with trusted data’ campaign in the following categories: Excellence Award for Campaign B2B for Branded Content Distinction Award for Campaign B2B for Integrated & Multi-Channel Distinction Award for Campaign B2B for Online Advertising & Marketing The Communicator Awards, sanctioned and judged by the Academy of Interactive and Visual Arts (AIVA), is the leading global awa

article thumbnail

The Shadow War: Cognitive Warfare and the Politics of Disinformation

KnowBe4

For better or for worse, we live in a world that is an anarchy of nations. Over the last few decades, warfare has transcended traditional battlefields. We may already be experiencing a cold World War III, not with bombs and tanks, but through the covert methods of cognitive warfare and disinformation campaigns. IT professionals find themselves literally in the trenches of this war.

IT 111
article thumbnail

Now Available: IG Maturity Index Report 2023

IG Guru

Check out the link to the report here. The post Now Available: IG Maturity Index Report 2023 first appeared on IG GURU.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Shooting to score with Scout Advisor’s NLP

IBM Big Data Hub

Phrases like “striking the post” and “direct free kick outside the 18” may seem foreign if you’re not a fan of football (for Americans, see: soccer). But for a football scout, it’s the daily lexicon of the job, representing crucial language that helps assess a player’s value to a team. And now, it’s also the language spoken and understood by Scout Advisor—an innovative tool using natural language processing (NLP) and built on the IBM® wa

article thumbnail

Angular vs. React in 2024: A Comparative Analysis

Enterprise Software Blog

What is the thing that really shapes the success and efficiency of a new software project? It is definitely the choice of a front-end framework that we make. As we are almost halfway through 2024, the battle between Angular vs. React continues to shake and excite the developers’ community. And while it is true that both technologies are powerful enough, each with its own strengths and diverse needs that it addresses, to empower developers to build and deploy apps of the future, they also share s

article thumbnail

Alternatives to vSphere in Light of Forthcoming Broadcom Changes

Adapture

When Broadcom acquired VMware in November 2023 , partners and clients alike were expecting changes, but in the months following the acquisition, the changes have included business structure, partner requirements, licensing structure, product lines, and pricing. Some long-time customers of VMware are discovering that their solution is no longer working for them.

Cloud 52