Wed.Aug 21, 2024

article thumbnail

A backdoor in millions of Shanghai Fudan Microelectronics RFID cards allows cloning

Security Affairs

A flaw in millions of RFID cards manufactured by Shanghai Fudan Microelectronics allows these contactless cards to be cloned instantly. Researchers from security firm Quarkslab discovered a backdoor in millions of RFID cards manufactured by the Chinese chip manufacturer Shanghai Fudan Microelectronics. The experts announced the discovery of a hardware backdoor and successfully cracked its key allowing the instantaneous cloning of RFID smart cards. “In this paper, we present several attacks

article thumbnail

Ransomware Gangs Are in Decline But Still Make Lots of Noise

Data Breach Today

RedSense's Bohuslavskiy and Smith on How Attacks on Healthcare Show Desperation RedSense’s Yelisey Bohuslavskiy and Marley Smith believe ransomware is declining but caution that it still poses a significant threat. While attackers recycle old methods, they're taking desperate measures to target vulnerable groups such as cancer centers and to stoke fears in the marketplace.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked APT used a new RAT called MoonPeak

Security Affairs

North Korea-linked APT Kimsuky is likely behind a new remote access trojan called MoonPeak used in a recent campaign spotted by Cisco Talos. Cisco Talos researchers uncovered the infrastructure used by the North Korea-linked APT group tracked as UAT-5394, which experts suspect is linked to the Kimsuky APT group. The infrastructure includes staging, C2 servers, and machines used by the group to test their implants.

Phishing 333
article thumbnail

Black Hat Fireside Chat: User feedback, AI-infused email security are both required to deter phishing

The Last Watchdog

I recently learned all about the state-of-the art of phishing attacks – the hard way. Related: GenAI-powered attacks change the game An email arrived from the head of a PR firm whom I’ve known for 20 years asking me to click on a link to check out a proposal. Foolishly, I did so all too quickly. Within a few minutes, many of my contacts, and even strangers, were receiving a similar malicious email from me.

Phishing 289
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Pro-Russia group Vermin targets Ukraine with a new malware family

Security Affairs

The Computer Emergency Response Team of Ukraine (CERT-UA) warned of new phishing attacks, carried out by the Vermin group, distributing a malware. The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign conducted by the Vermin group that distributed malware. Vermin is a pro-Russian hacker group, also tracked as UAC-0020 , that operates under the control of the law enforcement agencies of the temporarily occupied Luhansk.

Phishing 317

More Trending

article thumbnail

Experts disclosed a critical information-disclosure flaw in Microsoft Copilot Studio

Security Affairs

Researchers have disclosed a critical security vulnerability in Microsoft’s Copilot Studio that could lead to the exposure of sensitive information. Researchers disclosed a critical security vulnerability, tracked as CVE-2024-38206 (CVSS score: 8.5), impacting Microsoft’s Copilot Studio. An attacker can exploit the vulnerability to access sensitive information.

Metadata 307
article thumbnail

$2.25M Settlement Reached in Atlantic General Hack Lawsuit

Data Breach Today

Nearly 137,000 People Affected in 2023 Ransomware Attack on Maryland-Based Hospital A ransomware attack against Berlin, Maryland-based Atlantic General Hospital that affected the personal information of 137,000 individuals in 2023 has led to a $2.25 million preliminary settlement of a consolidated proposed federal class action lawsuit.

article thumbnail

How to clear the cache on your iPhone (and why you should)

Collaboration 2.0

Cache and cookies can clog your browser and slow your iPhone's performance, but there's a simple way to bring your device back up to speed. Try this today and see the difference.

246
246
article thumbnail

How Cybercrime Fuels Human Trafficking and Gambling Scams

Data Breach Today

Infoblox Researchers on Links Between Human Trafficking, Cybercrime and Gambling Illegal gambling operations depend on trafficked individuals to perform cybercriminal activities. Threat researchers at Infoblox explain how cybercriminals use trafficked people for operations such as pig-butchering scams and leverage European sports sponsorships to boost illegal gambling websites.

277
277
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

This Pixel 9 Pro XL vs. iPhone 15 Pro camera shootout has a clear winner - and one big surprise

Collaboration 2.0

The Pixel 9 Pro XL winning against the iPhone 15 Pro in most instances wasn't a surprise but there's one big miss on the new Google phone.

246
246
article thumbnail

How to Account for Disinformation Risks in Election Security

Data Breach Today

CISO Lester Godsey on Building Custom Frameworks to Combat Election-Related Threats Maricopa County CISO Lester Godsey highlights the growing threat of misinformation and its impact on election security. He explains how his team is integrating cybersecurity frameworks to address both digital and physical risks, focusing on disinformation campaigns and election integrity.

Risk 277
article thumbnail

How to use ChatGPT: Everything to know about using GPT-4o and GPT-4o mini

Collaboration 2.0

Want to use the most popular AI chatbot available? We'll walk you through how to get started with ChatGPT and how to get the most out of it.

IT 246
article thumbnail

An In Depth Look at AI & the Evolving Cyber Threat Landscape

Data Breach Today

In the fast-changing world of cyber warfare, staying ahead of threats is essential.

274
274
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The best SSH clients for Linux (and why you need them)

Collaboration 2.0

If you're looking for a better way to interact with SSH remote connections, you should try one of these clients.

246
246
article thumbnail

Ransomware Again on Track to Achieve Record-Breaking Profits

Data Breach Today

Does That Mean Improved Defenses and Law Enforcement Disruptions Are Failing? Ransomware groups' collective profits are on track to achieve another record-breaking year, even though fewer victims overall appear to be paying a ransom, experts warn. One expert says the success comes down to a handful of high-profile attacks.

article thumbnail

YouTube rolls out customizable NFL multiview, but there is a catch

Collaboration 2.0

You'll soon be able to build a two-, three-, or four-game display to catch multiple NFL games at once, but the option isn't open to everyone.

246
246
article thumbnail

The Strategic Need for Employee Training and Education

Data Breach Today

Why the Benefits Far Outweigh the Risks Today's workforce is increasingly insisting on having employer-provided education and development opportunities. Learn why offering employees opportunities for education and development is both a retention strategy and a key component of a successful business strategy.

Education 261
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ring just launched a new Battery Doorbell with better features for the same price

Collaboration 2.0

The new Ring Battery Doorbell replaces the older $100 battery-powered Ring Video Doorbell and packs more features for the same price.

246
246
article thumbnail

Researchers Thrust a Virtual Stick Into the Bike Spokes

Data Breach Today

Wireless Gear Shifting System Is Vulnerable to Replay Attacks Imagine cruising down a bike path and having the gears suddenly shift without warning. Security researchers say cybercriminals could take advantage of new wireless controlled bicycle gear systems to make that happen - and cause crashes and injuries.

Security 246
article thumbnail

The US Government Wants You—Yes, You—to Hunt Down Generative AI Flaws

WIRED Threat Level

The AI ethics nonprofit Humane Intelligence and the US National Institute of Standards and Technology are launching a series of contests to get more people probing for problems in generative AI systems.

article thumbnail

The best web hosting services of 2024: Expert tested and reviewed

Collaboration 2.0

Want to build a website? We tested the top web hosting services that offer fast speeds, solid customer service, and good value for money.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Stadiums Are Embracing Face Recognition. Privacy Advocates Say They Should Stick to Sports

WIRED Threat Level

Protesters took to Citi Field Wednesday to raise awareness of the facial recognition systems that have become common at major league sporting venues.

Privacy 196
article thumbnail

How open source is steering AI down the high road

Collaboration 2.0

At Open Source Summit China, Jim Zemlin highlights the Linux Foundation's most significant contributions to AI development.

190
190
article thumbnail

Threat Actors Abuse URL Rewriting to Mask Phishing Links

KnowBe4

Threat actors are abusing a technique called “URL rewriting” to hide their phishing links from security filters, according to researchers at Perception Point.

Phishing 124
article thumbnail

The best home battery and backup systems of 2024: Expert tested

Collaboration 2.0

We tested and researched the best home battery and backup systems from EcoFlow, Tesla, Anker, and others to help you find the right fit for making your home more eco-friendly.

190
190
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US Political Campaigns Targeted by Iranian Spear Phishing Attacks

KnowBe4

Researchers at Recorded Future’s Insikt Group warn that the Iranian state-sponsored threat actor “GreenCharlie” is launching spear phishing attacks against US political campaigns.

Phishing 122
article thumbnail

How to screen record in Windows 10 or 11 with built-in tools

Collaboration 2.0

Windows 10 and 11 each offer a built-in screen-recording tool for gaming, though it can record just about any screen activity. And Windows 11 has an even better option. Here's what to know.

IT 190
article thumbnail

Story of an Undercover CIA Agent who Penetrated Al Qaeda

Schneier on Security

Rolling Stone has a long investigative story (non-paywalled version here ) about a CIA agent who spent years posing as an Islamic radical. Unrelated, but also in the “real life spies” file: a fake Sudanese diving resort run by Mossad.

122
122