Fri.Aug 02, 2024

article thumbnail

Avtech camera vulnerability actively exploited in the wild, CISA warns

Security Affairs

CISA warned that an Avtech camera vulnerability, which is still unpatched, is being actively exploited in the wild. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn of a vulnerability, tracked as CVE-2024-7029 (CVSS base score of 8.8), in Avtech camera that has been exploited in the wild. An attacker can exploit this flaw to inject and execute commands as the owner of the running process. “Successful exploitation of this vulnerability could a

article thumbnail

How to replace Windows with Linux Mint on your PC

Collaboration 2.0

Are you sick of Windows fouling up? Do you want to try something different? Then, it's time to try the best Linux desktop, Linux Mint 22.

IT 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Investors sued CrowdStrike over false claims about its Falcon platform

Security Affairs

Investors have sued CrowdStrike because the cybersecurity firm made false claims about its Falcon platform. Investors have sued CrowdStrike because the company made false and misleading claims on the testing of its Falcon platform. In July, a faulty update released by CrowdStrike Falcon caused Windows systems to display a BSoD screen. The incident caused widespread global disruptions, impacting critical infrastructure such as airports, hospitals, and TV stations.

IT 304
article thumbnail

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

WIRED Threat Level

Social Security numbers, death certificates, voter applications, and other personal data were accessible on the open internet, highlighting the ongoing challenges in election security.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Zeroing in on Zero Trust

Data Breach Today

How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.

More Trending

article thumbnail

CrowdStrike Faces Class Action Lawsuit Over Global IT Outage

Data Breach Today

Investors Say Cybersecurity Company Made False and Misleading Statements About Tech CrowdStrike faces a putative class action lawsuit over the widespread global IT outage in late July that caused major disruptions at airports and hospitals after the company pushed through a faulty update to its Falcon platform, causing its stock prices to plummet.

IT 189
article thumbnail

Apple Watch Series 9 vs. Series 8: Which model should you buy?

Collaboration 2.0

You can pick up an Apple Watch Series 9 for just $329 at Walmart, but is it worth the upgrade? We break down the features of the Apple Watch 9 and the Watch Series 8 to help you decide which is the best fit.

IT 190
article thumbnail

How AI Helps Strengthen Zero Trust Segmentation, Labeling

Data Breach Today

Illumio CEO Andrew Rubin Discusses the Role of Labeling in Effective Segmentation Illumio's Andrew Rubin explains how AI enhances zero trust security by improving labeling accuracy, which is essential for effective segmentation. Rubin discusses AI's potential to streamline security processes and covers key partnerships with firms such as Microsoft, Netscope and Wiz.

Security 162
article thumbnail

Have a soundbar? I found 5 ways to maximize your audio quality

Collaboration 2.0

If you already have a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are some simple steps to make it sound even better.

IT 190
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

US AI Safety Body to Get Early Access to OpenAI's Next Model

Data Breach Today

OpenAI Has Previously Been Criticized for Prioritizing Profits Over Safety OpenAI is "excited" to provide early access to its next foundational model to a U.S. federal body that assesses the safety of the technology, founder Sam Altman said on Thursday. OpenAI earlier essentially disbanded a "superalignment" security team set up to prevent AI systems from going rogue.

Access 147
article thumbnail

The brightest flashlights of 2024: Expert recommended

Collaboration 2.0

Ranging from 1,700 to 200,000 lumens, these are the brightest flashlights that experts say illuminate just about anything, for emergencies and more.

190
190
article thumbnail

Reimbursement Strategies Drive Down APP Scam Losses in UK

Data Breach Today

Customer Reimbursement Guidelines Are Convincing Banks to Scrutinize Transactions Despite making some progress in tackling APP scams, smaller payment firms still struggle with high fraud rates compared to large banks, as highlighted in a report by the U.K.’s Payment Systems Regulator. Customer reimbursement guidelines have prompted banks to scrutinize suspicious payments.

147
147
article thumbnail

The best earbuds I've ever listened to are not by Bose or Sony (and they're on sale)

Collaboration 2.0

The Denon PerL earbuds retain the same ultra high-quality sound as the Pro version, but are half the price, at $160 on Amazon.

Sales 190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Android Malware BingoMod Steals Money, Wipes Devices

Data Breach Today

Malware Enables Overlay Attacks and Remote Access to Compromised Devices A newly discovered remote access Trojan is attacking Android users primarily to initiate money transfers on infected devices, but it has an additional capability: It can wipe the infected device once it's done. BingoMod masquerades as a mobile security tool.

Access 147
article thumbnail

The best sports watches of 2024: Expert tested and reviewed

Collaboration 2.0

The best sports watches capture your metrics for recovery, sleep, and detailed training guidance without a coach. Here's how to choose the right one for you.

190
190
article thumbnail

News alert: Security Risk Advisors launchs VECTR Enterprise Edition for ‘purple team’ benchmarking

The Last Watchdog

Philadelphia, PA, Aug. 1, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition , a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking. VECTR Enterprise is designed to support organizations that want to mature and communicate the success of their purple team exercises with benchmarking and executive reporting features.

Risk 147
article thumbnail

5 Linux terminal apps that are better than your default

Collaboration 2.0

The Linux terminal isn't something every user has to deal with. But when you do, you'll want a terminal that either makes the job a bit easier or is awesome enough to make you not mind using it. Here are five options.

IT 190
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Feds Hit Ambulance Company With Big 'Right of Access' Fine

Data Breach Today

HHS OCR: The Firm Took More Than a Year to Provide a Patient With Requested Records Federal regulators smacked an ambulance firm with a $115,200 civil monetary penalty for failing to provide a patient with her requested health records for more than a year. The penalty is the U.S. Department of Health and Human Services' 49th HIPAA "right of access" enforcement action.

Access 130
article thumbnail

How to subscribe to ChatGPT Plus (and 4 reasons why you should)

Collaboration 2.0

OpenAI keeps unveiling new features and rolling them out to its Plus plan subscribers. Here's what you get with a subscription.

IT 190
article thumbnail

Preparing for the New EU AI Act: Key Compliance Steps

Data Breach Today

Attorney Jonathan Armstrong Discusses the AI Act's Impact on Global Organizations This week, the European Union's AI Act has gone into force, marking a significant step in AI development. Starting Aug. 1, 2024, it will enforce strict rules on high-risk AI systems and prohibit harmful practices, to ensure transparency and protect fundamental rights.

article thumbnail

Photoshop vs. Midjourney vs. DALL-E 3: Which AI image generator wins my 5 tests?

Collaboration 2.0

How does Photoshop's AI hold up against DALL-E and Midjourney? I test their skills in a creative clash involving giant robots and futuristic scenarios.

189
189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

ISMG Editors: IBM Report Says Data Breach Costs Are Rising

Data Breach Today

Also: Check Point's New CEO; How the US Election Will Affect Federal Cyber Policy In the latest weekly update, Information Security Media Group editors discussed insights from IBM's data breach report, significant leadership changes at Check Point, and the potential impact of the upcoming U.S. election on federal cybersecurity policy.

article thumbnail

Intel offers a two-year extended warranty for crashing chips. Here's what you need to know

Collaboration 2.0

There's still no recall, but boxed Intel Core 13th and 14th Gen desktop processors will get an extended warranty.

189
189
article thumbnail

EU AI Act Enters Into Force

Data Breach Today

Regulatory Requirements Will Become Enforceable in Phases The world's first-ever binding regulation on artificial intelligence came into force on Thursday. The law's requirements are set to be enforced in a phased manner. The ban on high-risk AI systems is set to be actionable first, six months after the enforcement date.

article thumbnail

The best webcams for streaming of 2024: Expert tested and reviewed

Collaboration 2.0

We tested some of the best webcams for streaming from HyperX, Logitech, and more to help you find the best webcam for improving the production value of your pre-recorded content or live stream.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Russian Cybercriminals to Be Released in Major Prisoner Swap

Data Breach Today

US Agrees to Release Them in Exchange for Wrongfully Detained Americans, Others The United States and its allies agreed to release eight Russian nationals held in prisons around the world for cybercrimes and other criminal activity in exchange for 16 people in the largest post-Cold War prisoner swap between Washington and the Kremlin.

IT 130
article thumbnail

5 Linux commands to use for quickly viewing the content of files

Collaboration 2.0

From code and notes to configuration files (and everything in between), I have to view the content files regularly. Here are five ways to do it.

IT 189
article thumbnail

Phishing Attacks Continue to Leverage URL Shorteners to Obfuscate Malicious Links

KnowBe4

Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services, concealing a links.

Phishing 126