Thu.Jul 11, 2024

article thumbnail

Multiple threat actors exploit PHP flaw CVE-2024-4577 to deliver malware

Security Affairs

Multiple threat actors exploit a recently disclosed security PHP flaw CVE-2024-4577 to deliver multiple malware families. The Akamai Security Intelligence Response Team (SIRT) warns that multiple threat actors are exploiting the PHP vulnerability C VE-2024-4577 to deliver multiple malware families, including Gh0st RAT , RedTail cryptominers, and XMRig. “Threat actors continued the speedy-time-from-disclosure-to-exploitation trend and were quick to leverage this new vulnerability — we obser

Honeypots 347
article thumbnail

Experts: Federal Privacy Law Needed to Curb AI Data Misuse

Data Breach Today

New Bill Would Create Data Minimization Measures, Express Permission Requirements Experts warned in congressional testimony to the Senate Commerce Committee on Thursday that the absence of a comprehensive privacy bill in the United States is hindering economic competition for technology companies and jeopardizing the privacy of the American public.

Privacy 303
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI-Powered Russia’s bot farm operates on X, US and its allies warn

Security Affairs

The US and its allies disrupted an AI-powered Russia-linked bot farm on the social media platform X relying on the Meliorator AI software. The U.S. FBI and Cyber National Mission Force, along with Dutch and Canadian intelligence and security agencies, warned social media companies about Russian state-sponsored actors using covert AI software, Meliorator, in disinformation campaigns.

IT 346
article thumbnail

How to clear the cache on your TV (and why you should do it)

Collaboration 2.0

Clearing the cache on your TV can be a great way to improve its performance, fix bugs, and ensure you get the best viewing experience. But what exactly is a cache, and why is it important to clear it?

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

October ransomware attack on Dallas County impacted over 200,000 people

Security Affairs

The ransomware attack that hit Dallas County in October 2023 has impacted more than 200,000 individuals exposing their personal information. In October 2023 the Play ransomware group hit Dallas County, Texas, and added the city to its Tor leak site claiming the theft of sensitive documents from multiple departments. Dallas refused to pay the ransom and the extortion group leaked the stolen documents in November 2023.

More Trending

article thumbnail

CrystalRay operations have scaled 10x to over 1,500 victims

Security Affairs

A threat actor known as CrystalRay targeted 1,500 victims since February using tools like SSH-Snake and various open-source utilities. The Sysdig Threat Research Team (TRT) first spotted the threat actor CrystalRay on February 2024 and observed it using the SSH-Snake open-source software penetration testing tool. The experts collected new evidence that revealed that the threat actor expanded its operations.

Marketing 317
article thumbnail

Every product Samsung unveiled at Unpacked July 2024: Galaxy Z Fold 6, Watch Ultra, Ring, more

Collaboration 2.0

At Unpacked yesterday, Samsung unveiled several new products, including two foldable phones, smartwatches, earbuds, and a smart ring that competes with Oura.

246
246
article thumbnail

Multifactor Authentication Shouldn't Be Optional

Data Breach Today

Cloud Customers Should Demand More Security From Providers The theft of terabytes of Snowflake customers' data through credential stuffing hacks highlights how multifactor authentication shouldn't be optional for safeguarding accounts. Experts are calling on providers to build in more robust identity and authentication security features, at no extra cost.

article thumbnail

3 ways to interact with Gemini from the MacOS desktop

Collaboration 2.0

If Gemini is your go-to AI and MacOS is your operating system of choice, you'll be glad to know there are ways to interact with Google's AI from Apple's desktop.

243
243
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Pressure Grows in Congress to Treat Crypto Investigator Tigran Gambaryan, Jailed in Nigeria, as a Hostage

WIRED Threat Level

A new resolution echoes what 16 members of Congress have already said to the White House: It must do more to free one of the most storied crypto-focused federal agents in history.

IT 213
article thumbnail

Multiple Threat Actors Moving Quickly to Exploit PHP Flaw

Data Breach Today

Easily Exploited Vulnerability Becomes Major Target for Malware Campaigns, Botnets Multiple threat actors began exploiting a critical vulnerability in PHP within a day of its public disclosure last month and are moving quickly to infect systems with malware, according to a report by the Akamai Security Intelligence Response Team. Administrators are advised to patch immediately.

Security 195
article thumbnail

Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison

WIRED Threat Level

The cybercrime boss, who helped lead the prolific Zeus malware gang and was on the FBI’s “most wanted” list for years, has been sentenced to 18 years and ordered to pay more than $73 million.

Security 212
article thumbnail

The best cheap tablets of 2024: Expert tested and reviewed

Collaboration 2.0

We went hands-on with the top cheap tablets under $400 that offer high-end features at lower prices from Apple, Amazon, and more.

190
190
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Breach Roundup: Microsoft Patches Zero-Day Active Since 2023

Data Breach Today

Also: Europol Decries Mobile Encryption; FBCS Breach Victim Count Grows This week, Microsoft and Adobe released patches, Europol pushed back against mobile encryption, Japan warned of Kimsuky attacks, the FBCS breach victim count grew, and a fraud campaign offered fake tickets to the Summer Olympics in Paris.

article thumbnail

How to write better ChatGPT prompts in 5 steps

Collaboration 2.0

There's an art to making the most of AI. Here's how to level up your prompt-writing game.

190
190
article thumbnail

Major Health Data Breaches: How Are Trends Shifting in 2024?

Data Breach Today

Midyear Analysis of HHS OCR 'Wall of Shame' Shows Hacks, Vendor Breaches Top List Hacks and vendor incidents continue to dominate major health data breach trends in 2024, but a handful of large incidents involving "unauthorized access or disclosure" also top the list of major health data breaches reported to federal regulators so far this year. How are trends shifting?

article thumbnail

Do you need antivirus on Linux?

Collaboration 2.0

If you've been a Windows user for years, then you are well aware of the need for antivirus software. It's a given. But does the same hold true for the open-source operating system?

IT 190
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Getting From Midlevel to Specialty Niche in Cybersecurity

Data Breach Today

How to Make a Plan, Continue to Learn and Leverage Your Experience The cybersecurity field offers numerous opportunities to specialize and deepen your expertise in niche areas. Here are some sophisticated niches that offer advanced career paths for midlevel professionals and some avenues you can pursue to gain experience while building your portfolio and skills.

article thumbnail

How to install Linux on an old laptop to give it new life and purpose

Collaboration 2.0

If you're looking to revive that aging laptop, Linux might be your best bet. Here's how easy it is to set up.

IT 190
article thumbnail

Cryptohack Roundup: Huione Guarantee

Data Breach Today

Also: FTX and Mt. Gox Every week, ISMG rounds up cybersecurity incidents in digital assets. This week, Elliptic alleged that Huione Guarantee is laundering money, the sentencing dates of former FTX executives were revealed, a Paxful co-founder pleaded guilty, and Mt. Gox started to repay its debts.

article thumbnail

The best portable power stations of 2024: Expert tested and reviewed

Collaboration 2.0

Going off the grid, or need power in a pinch during a power outage? I tested the best portable power stations to keep your devices running.

190
190
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Apple Is Alerting iPhone Users of Spyware Attacks

Schneier on Security

Not a lot of details : Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks. It’s the second such alert campaign from the company this year, following a similar notification sent to users in 92 nations in April.

IT 130
article thumbnail

If you're ready to leave Windows 11 behind, this is the distro for new Linux users

Collaboration 2.0

SDesk is a lightweight open-source alternative to Windows or MacOS that will look familiar to anyone who's used a computer.

189
189
article thumbnail

Ransomware Attacks on Healthcare Is Costing Lives

KnowBe4

Ransomware is more prolific and expensive than ever. Depending on the source you read, the average or median ransomware payment was at least several hundred thousand dollars to well over several million in 2023. Marsh, a leader in cybersecurity insurance, wrote that its customers paid an average of $6.5 million in ransom in 2023 (after just paying an average of $1.4 million in 2023).

article thumbnail

The 47 best early Prime Day 2024 gaming deals

Collaboration 2.0

Amazon's annual Prime Day sale is just around the corner, but you don't have to wait to find great deals on gaming consoles, PCs and laptops, accessories, and even games themselves.

Sales 189
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

GUEST ESSAY: How cybercriminals are using ‘infostealers’ to sidestep passwordless authentication

The Last Watchdog

Passwords have been the cornerstone of basic cybersecurity hygiene for decades. Related: Passwordless workpace long way off However, as users engage with more applications across multiple devices, the digital security landscape is shifting from passwords and password managers towards including passwordless authentication, such as multi-factor authentication (MFA), biometrics, and, as of late, passkeys.

article thumbnail

The best earbuds of 2024: Expert tested and reviewed

Collaboration 2.0

We listened to hundreds of hours of music, podcasts, and videos to test the best earbuds from Sony, Apple, and more. Here are our favorites.

189
189
article thumbnail

Phishing Attacks Against State and Local Governments Are Surging

KnowBe4

Researchers at Abnormal Security have observed a 360% increase in phishing attacks against state and local government entities over the past year.

Phishing 117