Thu.Jul 18, 2024

article thumbnail

SAPwned flaws in SAP AI core could expose customers’ data

Security Affairs

Researchers discovered security flaws in SAP AI Core cloud-based platform that could expose customers’ data. Cybersecurity researchers at Wiz uncovered five security flaws, collectively tracked as SAPwned, in the SAP AI Core cloud-based platform. An attacker can exploit the flaws to obtain access tokens and customer data. SAP AI Core, developed by SAP, is a cloud-based platform providing the essential infrastructure and tools for constructing, managing, and deploying predictive AI workfl

Cloud 352
article thumbnail

Cyber Fail: Attack of the Zombie APIs!

Data Breach Today

Also: Election Security Dysfunction; the Legacy of Government-Backed Spyware Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we take on the looming menace of zombie APIs, the terrors of election dysfunction and the scary legacy of government-backed spyware and its impact on privacy rights.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums

Security Affairs

The cybercrime group FIN7 is advertising a security evasion tool in multiple underground forums, cybersecurity company SentinelOne warns. SentinelOne researchers warn that the financially motivated group FIN7 is using multiple pseudonyms to advertise a security evasion tool in several criminal underground forums. FIN7 developed a tool called AvNeutralizer (also known as AuKill) that can bypass security solutions.

article thumbnail

Operation Spincaster Targets Crypto Pig-Butchering Scams

Data Breach Today

Public-Private Effort Based on Intelligence Tied to $162 Million in Crypto Losses A public-private effort with the codename Operation Spincaster is using intelligence related to 7,000 compromised cryptocurrency wallets and $162 million in losses to warn victims, recover funds and disrupt groups involved in crypto-powered approval phishing or pig-butchering scams.

Phishing 275
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

How to Protect Privacy and Build Secure AI Products

Security Affairs

AI systems are transforming technology and driving innovation across industries. How to protect privacy and build secure AI products? How to Protect Privacy and Build Secure AI Products AI systems are transforming technology and driving innovation across industries. However, their unpredictability raises significant concerns about data security and privacy.

Privacy 337

More Trending

article thumbnail

Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums

Security Affairs

The cybercrime group FIN7 is advertising a security evasion tool in multiple underground forums, cybersecurity company SentinelOne warns. SentinelOne researchers warn that the financially motivated group FIN7 is using multiple pseudonyms to advertise a security evasion tool in several criminal underground forums. FIN7 developed a tool called AvNeutralizer (also known as AuKill) that can bypass security solutions.

article thumbnail

Why AI and Human Behavior Drive New Urgency for Zero Trust

Data Breach Today

How CISOs Can Leverage Zero Trust and AI to Protect Against the Human Element We can't overlook the human factor. The adoption of Zero Trust is a response to the vulnerabilities that human actions can introduce, and AI is expected to bring greater automation to help organizations achieve their cybersecurity objectives faster.

article thumbnail

Amazon Fire TV Omni Series QLED is worth it for Alexa fans

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming.

IT 246
article thumbnail

SAPwned flaws in SAP AI core could expose customers’ data

Security Affairs

Researchers discovered security flaws in SAP AI Core cloud-based platform that could expose customers’ data. Cybersecurity researchers at Wiz uncovered five security flaws, collectively tracked as SAPwned, in the SAP AI Core cloud-based platform. An attacker can exploit the flaws to obtain access tokens and customer data. SAP AI Core, developed by SAP, is a cloud-based platform providing the essential infrastructure and tools for constructing, managing, and deploying predictive AI workfl

Cloud 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The Ninja Creami Ice Cream Maker is still $30 off after Prime Day

Collaboration 2.0

Craving a summer treat? The Ninja Creami can make all your frozen desserts and smoothies, comes with two pint-sized containers, and is still $30 off even though Prime Day is over.

246
246
article thumbnail

Top 'Privacy by Design' Considerations for Medical Devices

Data Breach Today

The interconnectedness of medical devices, which generate data that can be distributed to multiple systems that are often managed by different policies, presents privacy concerns that device manufacturers must address, said Adam Hesse, CEO of Full Spectrum.

Privacy 173
article thumbnail

Will the Galaxy S25 get satellite texting? Samsung is working on the feature again

Collaboration 2.0

Samsung has been working on satellite connectivity for at least a year. Will it finally catch up to Apple in the space race?

IT 246
article thumbnail

Breach Roundup: North Korean Hackers Target macOS Users

Data Breach Today

Interpol Arrests 300, Seizes $3 Million From West African Financial Crime Gang This week, North Korean hackers targeted macOS users, Bassett Furniture suffered a ransomware attack, Interpol arrested 300 and seized $3 million, new details emerged about Designed Receivable Solutions, Repligen reported a cyber incident, and MarineMax reported a data breach.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The Jackery Explorer 1000 is one of the best portable power stations, and now get a whopping 52% off!

Collaboration 2.0

This Jackery portable power station is a fantastic model for camping and RV trips, or for emergencies and power outages -- and it's now got 52% off for in this Amazon Prime Day deal that's still live.

IT 246
article thumbnail

Judge Dismisses Most SEC Fraud Claims Against SolarWinds

Data Breach Today

Feds Can Proceed With Claims About Falsehoods in SolarWinds Security Statement A judge Thursday dismissed most of the claims federal regulators made against SolarWinds related to allegedly misleading investors about the company's cybersecurity practices and risks. The SEC can proceed only with claims related to the security statement issued by SolarWinds before the 2020 hack.

article thumbnail

Better than Ring? This video doorbell has no subscription fees and is $130 after Prime Day

Collaboration 2.0

The Lorex 2K video doorbell is the company's flagship front-door security system, and it's 28% off with an Amazon Prime Day deal that is still available.

Security 246
article thumbnail

Cryptohack Roundup: $230M WazirX Exploit in India

Data Breach Today

Also: Craig Wright, Be Seated. Will the Real Satoshi Nakamoto Please Stand Up? This week, WazirX, LI.FI, Dough Finance and CoinStats were breached; Satoshi Nakamoto impersonator's was charged; FTX and CFTC reached a settlement; a man was convicted of fraud; new details emerged in the Tornado Cash and SEC cases; and Taiwan set new AML rules.

162
162
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Nvidia finally open sources some of its GPU drivers. How to tell what's under your hood

Collaboration 2.0

A welcome step toward a more open ecosystem for Linux users and developers, the upcoming R560 driver release also puts Nvidia in a better position to compete with AMD. It's about time.

IT 190
article thumbnail

Gen AI Spending Slows as Businesses Exercise Caution

Data Breach Today

High Implementation Costs and Hallucination Risks Curb AI Investments in 2024 Generative AI has advanced rapidly over the past year, and organizations are recognizing its potential across business functions. But businesses have now taken a cautious stance regarding gen AI adoption due to steep implementation costs and concerns regarding hallucinations.

Risk 162
article thumbnail

How to watch the 2024 Summer Olympics without cable

Collaboration 2.0

The Summer Olympics are only a month away. Here's how to watch them all, in some cases for free.

190
190
article thumbnail

Change Healthcare Ransomware Attack May Cost Nearly $2.5 Billion

KnowBe4

The ransomware attack against UnitedHealth Group’s Change Healthcare platform is expected to cost the company up to $2.45 billion, more than a billion dollars more than was previously estimated, Cybersecurity Dive reports. The incident has already cost the firm nearly $2 billion.

article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

How to use ChatGPT to create an app

Collaboration 2.0

So you want to create an app using ChatGPT and make a bajillion dollars? Here's what you need to know.

190
190
article thumbnail

7 in 10 Organizations Experienced a Business Email Compromise Attack in the Last 12 Months

KnowBe4

Despite ransomware getting the lion’s share of the tech pub headlines, business email compromise (BEC) attacks are alive and well… and having a material impact.

article thumbnail

Microsoft is changing how it delivers Windows updates: 4 things you need to know

Collaboration 2.0

Those monthly Patch Tuesday updates are going to get smaller and easier to manage, Microsoft says. Here's when and how.

IT 189
article thumbnail

Criminal Gang Physically Assaulting People for Their Cryptocurrency

Schneier on Security

This is pretty horrific : …a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement and the criminal complaint laying out charges against St. Felix focused largely on a single theft of cryptocurrency from an elderly North Carolina couple, whose home St. Felix and one of his accomplices broke into before physically assaulting the two victims—­both in their seventies—­and forcing them to transfer

Access 124
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

This 3-in-1 MagSafe charger is my new favorite travel accessory, it supports Qi2, and it's still discounted!

Collaboration 2.0

The new ESR 3-in-1 wireless travel charger can simultaneously power your iPhone, AirPods, and Apple Watch. And it's still discounted in this post-Amazon Prime Day deal.

IT 189
article thumbnail

Chile Leads Latin America With New Cybersecurity Governance

KnowBe4

Chile took a major step toward a more resilient cyber landscape for its citizens and the Latin American region on Tuesday, March 26, 2024, when Chile’s president of the Republic, Gabriel Boric, signed and enacted the new Cybersecurity and Critical Information Infrastructure Framework Law. The new framework and regulations it creates allow Chile to strengthen its digital security.

article thumbnail

This sports watch has a ChatGPT-like running coach. Here's how it works

Collaboration 2.0

The Amazfit Cheetah smartwatch is built with runners in mind, so much so that it comes with its own AI training bot.

IT 189