Fri.Jul 26, 2024

article thumbnail

BIND updates fix four high-severity DoS bugs in the DNS software suite

Security Affairs

The Internet Systems Consortium (ISC) released BIND security updates that fixed several remotely exploitable DoS bugs in the DNS software suite. The Internet Systems Consortium (ISC) released security updates for BIND that address DoS vulnerabilities that could be remotely exploited. An attacker can exploit these vulnerabilities to disrupt DNS services.

article thumbnail

French Government Investigates Suspected Chinese Espionage

Data Breach Today

National Police Probe Botnet Campaign That Infected 3,000 Machines The French government has launched an investigation into a suspected Chinese espionage campaign that infected thousands of networks in France. The botnet campaign pushed out the PlugX remote access Trojan that has infected 3,000 machines in France since 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A bug in Chrome Password Manager caused user credentials to disappear

Security Affairs

Google addressed a Chrome’s Password Manager bug that caused user credentials to disappear temporarily for more than 18 hours. Google has addressed a bug in Chrome’s Password Manager that caused user credentials to disappear temporarily. An 18-hour outage impacted Google Chrome’s Password Manager on Wednesday, impacting users who rely on the tool to store and autofill their passwords.

Passwords 350
article thumbnail

PKfail Is a Newly Discovered Pathway for Firmware Malware

Data Breach Today

UEFI Developer Leaked a Secure Boot Asymmetric Key Hundreds of laptop and server models from mainstream manufacturers are at risk of hacking that bypasses protections meant to ensure only trusted software can load during computer bootup, warn researchers from California supply chain startup Binarly.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services

Krebs on Security

Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a Google Workspace account, and leverage that to impersonate a domain holder at third-party services that allow logins through Google’s “Sign in with Google” feature. Last week, KrebsOnSecurity heard from a reader who said they received a notice that their email address had been used to create a potentially malicious Workspace account that Google

Access 318

More Trending

article thumbnail

What to expect from Made by Google 2024: Pixel 9 Pro Fold, Watch, Android 15, AI, and more

Collaboration 2.0

Google's next big product launch takes place on August 13. Here's everything you can expect from the event.

246
246
article thumbnail

National Vulnerability Backlog Could Surge to 30,000 by 2025

Data Breach Today

New Analysis Reveals Growing Crisis for the National Vulnerability Database A growing backlog at the National Institute of Standards and Technology National Vulnerability Database could surge to above 30,000 unanalyzed security flaws by the end of the year if the agency fails to significantly ramp up its processing rates, according to a new analysis released Friday.

Security 297
article thumbnail

The best wired earbuds of 2024: Expert reviewed

Collaboration 2.0

Ditch your Bluetooth buds -- wires are back. We tested the best wired earbuds you can buy.

190
190
article thumbnail

Tackling Fraud in AI Deepfakes With Layered Controls

Data Breach Today

Anthony Hope of NAB on the Latest Approaches to Handling AML and Financial Crimes Banks need to make changes to fraud programs to tackle mule accounts in the age of AI. Organizations need to move away from having one control to handle all suspicious accounts, said Anthony Hope, group head of AML, counter-terrorist financing, and fraud risk at NAB.

Risk 282
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Microsoft's July update may put your PC in BitLocker recovery - here's how to fix this

Collaboration 2.0

A patch is coming, but for now you'll need to enter your BitLocker recovery key to successfully boot into Windows.

190
190
article thumbnail

CrowdStrike Outage: 97% of Disrupted Endpoints Restored

Data Breach Today

250,000 of the 8.5 Million Affected Windows Hosts Still Need to Be Recovered CrowdStrike said nearly all of the Windows hosts disrupted by its faulty July 19 update are now fixed. The company said the flaw involved a relatively new threat detection feature that uses configuration data that "maps to specific behaviors for the sensor to observe, detect or prevent.

IT 275
article thumbnail

I've tried a zillion desktop distros - it doesn't get any better than Linux Mint 22

Collaboration 2.0

Linux Mint's latest release continues its tradition of excellence. It's easy to learn and use, faster than Windows, and runs on a thrift-store PC. What more can you ask for?

IT 190
article thumbnail

ISMG Editors: The CrowdStrike Outage - One Week Later

Data Breach Today

The Recovery Progress, Impact on Commercial and Public Sectors, and Lessons Learned In the latest weekly update, ISMG editors discussed the massive CrowdStrike IT outage that crashed 8.5 million Windows systems and severely affected the healthcare, finance and transportation sectors. Here's what you need to know one week later about the recovery, impact and lessons learned.

IT 273
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

How to calibrate your TV for the best picture quality - 2 easy and simple methods

Collaboration 2.0

You might not be aware of it, but your TV may not be performing at its potential. A proper calibration could be just what you need.

IT 189
article thumbnail

Heightened Focus in the EU for the Protection of Minors Online

Data Matters

The protection of minors online continues to be a focus for EU regulators. Following the publication last year by the European Parliament of its guidelines on online age verification methods for children, the European Commission has recently announced it will be holding a dedicated stakeholder workshop in September 2024 to discuss guidelines for age verification and protecting minors.

Privacy 178
article thumbnail

Elon Musk's X now trains Grok on your data by default - here's how to opt out

Collaboration 2.0

Your posts and interactions on X are being used to train Grok, but you can put a stop to it.

IT 189
article thumbnail

A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them

WIRED Threat Level

KnowBe4 detailed the incident in a recent blog post as a warning for other potential targets.

Security 169
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

I replaced my Ring with this Arlo 2K video doorbell, and it's perfect for smart home beginners

Collaboration 2.0

Arlo's 2K Video Doorbell offers fantastic visual playback, a loud alarm, and customizability in all the ways you'd want it.

IT 189
article thumbnail

Europe Is Pumping Billions Into New Military Tech

WIRED Threat Level

The European Commission is allocating €7.3 billion for defense research over the next seven years. From drones and tanks of the future to battleships and space intelligence, here's what it funds.

Military 168
article thumbnail

I replaced my Nest with this Arlo 2K video doorbell, and it's perfect for smart home beginners

Collaboration 2.0

Arlo's 2K Video Doorbell offers fantastic visual playback, a loud alarm, and customizability in all the ways you'd want it.

IT 189
article thumbnail

Compromising the Secure Boot Process

Schneier on Security

This isn’t good : On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by Acer, Dell, Gigabyte, Intel, and Supermicro. The cause: a cryptographic key underpinning Secure Boot on those models that was compromised in 2022. In a public GitHub repository committed in December of that year, someone working for multiple US-based device manufacturers published what’s known as a platform key, the cryptogra

Security 134
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

This Asus Copilot+ PC has one of the best displays I've seen on a laptop (and it exudes premium)

Collaboration 2.0

The Asus Vivobook S 15 has a brilliant OLED screen and weighs barely over three pounds, making it a fantastic choice for digital nomads who want an ultraportable, premium laptop.

IT 189
article thumbnail

Phishing Campaigns Continue To Exploit CrowdStrike Outage

KnowBe4

As expected, threat actors are taking advantage of the global IT outage caused by a faulty CrowdStrike update last Friday, SC Media reports.

Phishing 130
article thumbnail

My new favorite travel gadget is an e-reader that looks like a phone (but isn't)

Collaboration 2.0

It turns out, the Onyx Boox Palma, an Android-based e-reader that just so happens to look like a phone, is a brilliant idea.

IT 189
article thumbnail

New Phishing Scam Leverages Chat To Add Credibility And Ensure Success

KnowBe4

An expository look at one phishing scam intent on stealing credit card details shows how scammers are leveraging trusted aspects of ecommerce to make.

Phishing 122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Buy a Windows 11 Pro license for $25 right now

Collaboration 2.0

Get a lifetime Windows 11 Pro license with more productivity features that will help you get things done -- and it's 87% off with this deal.

IT 189
article thumbnail

Russian Super-Threat Group Fin7 Comes Back from the Dead

KnowBe4

Declared “dead” by the U.S. Attorney’s Office in 2023, this threat group now has massive cybercrime infrastructure in use and is impersonating some.

article thumbnail

These transparent earbuds by Nothing made my AirPods look and sound boring

Collaboration 2.0

Priced to compete, the Nothing Ear (a) are a delightful addition to a market that desperately needs some color.

Marketing 189