Thu.Aug 08, 2024

article thumbnail

FBI and CISA update a joint advisory on the BlackSuit Ransomware group

Security Affairs

FBI and CISA published a joint advisory on the BlackSuit Ransomware group, the document provides TTPs and IOCs as recently as July 2024. CISA, in collaboration with the FBI, has published a joint advisory on the BlackSuit Ransomware group. The advisory includes recent and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) related to BlackSuit operation, which rebrands legacy Royal ransomware , identified by FBI investigations as recent as July 20

article thumbnail

USPS Text Scammers Duped His Wife, So He Hacked Their Operation

WIRED Threat Level

The Smishing Triad network sends up to 100,000 scam texts per day globally. One of those messages went to Grant Smith, who infiltrated their systems and exposed them to US authorities.

Security 322
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Android Kernel Remote Code Execution flaw ( CVE-2024-36971 ) and an Apache OFBiz Path Traversal issue ( CVE-2024-32113 ) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 319
article thumbnail

McLaren Health Hit With Ransomware for Second Time in a Year

Data Breach Today

Clinicians Say Current Hack More Disruptive Than 2023 Attack Michigan-based McLaren Health Care is dealing with its second cyberattack in less than a year, disrupting IT systems and patient services at its 13 hospitals and other medical facilities. Ransomware gang INC Ransom allegedly claims to have carried out this latest attack.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers

Security Affairs

An 18-year-old bug, dubbed “0.0.0.0 Day,” allows malicious websites to bypass security in Chrome, Firefox, and Safari to breach local networks. Oligo Security’s research team warns of an 18-year-old bug, dubbed “0.0.0.0 Day,” that allows malicious websites to bypass security in Chrome, Firefox, and Safari to breach local networks.

Security 306

More Trending

article thumbnail

Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes

WIRED Threat Level

Hacker Samy Kamkar is debuting his own open source version of a laser microphone—a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you’re typing.

Privacy 233
article thumbnail

This affordable Android tablet has a big screen and lasted me days

Collaboration 2.0

This Blackview Tab 18, with an octa-core processor, 12GB of RAM, and a huge battery, is just the thing for me.

246
246
article thumbnail

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

WIRED Threat Level

Attacks on Microsoft’s Copilot AI allow for answers to be manipulated, data extracted, and security protections bypassed, new research shows.

Phishing 228
article thumbnail

One year later: The Flipper Zero is still cool. Here are 7 useful things you can do

Collaboration 2.0

This weird little device blew up on TikTok, but there are quite a few impressive things you can do with it. Here are some of the most useful.

IT 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Computer Crash Reports Are an Untapped Hacker Gold Mine

WIRED Threat Level

One hacker solved the CrowdStrike outage mystery with simple crash reports, illustrating the wealth of detail about potential bugs and vulnerabilities those key documents hold.

Mining 169
article thumbnail

The best Android VPN services of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best Android VPNs that provide high levels of security and high speeds without slowing down your phone.

Security 190
article thumbnail

US Water Cybersecurity Improvement Efforts at Loggerheads

Data Breach Today

Legal and Voluntary Methods Fall Short Cyber threats against the U.S. water sector are growing but the main federal regulatory agency that oversees it may be stymied by a lack of cooperation from sector operators, concludes a Government Accountability Office report. Attacks against the water sector have mounted steadily.

article thumbnail

The Windows 10 clock is ticking: 5 ways to save your old PC in 2025 (most are free)

Collaboration 2.0

As many as 240 million Windows 10 PCs can't be upgraded to Windows 11. But instead of trashing your device when Windows 10 support runs out, here are five viable alternatives to save you money and trouble.

190
190
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Breach Roundup: Royal Ransomware Group On An Extortion Tear

Data Breach Today

Also: French Museum Ransomware Attack, Cisco Smart Install and SharpRhino Malware This week, Royal ransomware, a French museum ransomware attack and a putative class action over a background check data breach. Singapore removed an app monitoring internet use on student devices, a warning over Cisco Smart Install, the upstart SharpRhino gang and an exposed Illinois voter database.

article thumbnail

I'm a pro Linux user, and this distribution is one of the most unique I've tried

Collaboration 2.0

If you're looking to try something new with Linux that is not only cool-looking but also has a lot to offer users of every type, Rhino Linux is sure to impress.

190
190
article thumbnail

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

WIRED Threat Level

New research shows how known techniques for finding weaknesses in websites are actually practical in uncovering vulnerabilities, for better or worse.

Security 157
article thumbnail

Will you pay for Apple Intelligence? Up to $20 a month is 'a real possibility'

Collaboration 2.0

Apple hasn't revealed pricing plans for access to its AI, but experts agree that one of these fee structures is likely.

Access 189
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US Feds Arrest Man for North Korean Remote IT Worker Scam

Data Breach Today

Matthew Isaac Knoot Allegedly Hosted Laptop Farm in his Nashville Home U.S. federal prosecutors charged a Tennessee man with abetting North Korea in an ongoing effort to obtain remote IT work for its nationals as a way of generating hard currency. "North Korean IT workers are widespread in Fortune 500 companies," said a threat analyst.

IT 147
article thumbnail

Running out of Gmail storage? How to get another 15GB for free

Collaboration 2.0

Whether you're a digital hoarder or separating from a work or school account, you can archive your Google messages and media with this free and clever hack.

Archiving 189
article thumbnail

Feds Drop Probe Into Progress Software Over MOVEit Zero-Day

Data Breach Today

Clop Ransomware Group Exploited Flaw to Steal Data Pertaining to 95M Individuals Progress Software said the U.S. Securities and Exchange Commission has dropped its probe into the business, launched after attackers exploited a zero-day flaw in its MOVEit secure file transfer software to steal data pertaining to over 2,770 organizations and 95 million individuals.

article thumbnail

Proton Pass password manager adds identity data, biometric authentication

Collaboration 2.0

Proton's new features aim to save you time, reduce errors, and enhance security. The biometric authentication for Windows and MacOS is only supported in some plans.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Cryptohack Roundup: White Hats Hack Ronin Bridge

Data Breach Today

Also: Cryptonator, Crypto.com, Do Kwon Case Updates Every week, ISMG rounds up cybersecurity incidents in digital assets. This week, a $12M white hat hack on Ronin Bridge, Cryptonator indictment, potential prison sentence in Crypto.com case, a $212K Convergence hack, Do Kwon's extradition, and the FBI published a scam warning.

article thumbnail

Verizon is using AI to prevent accidental internet outages - here's how

Collaboration 2.0

Artificial intelligence is helping Verizon stop third-party cable cuts before they happen. Here's how it can help you, and what you should do before digging.

article thumbnail

CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Android Kernel Remote Code Execution flaw ( CVE-2024-36971 ) and an Apache OFBiz Path Traversal issue ( CVE-2024-32113 ) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 142
article thumbnail

The tiniest Raspberry Pi - the $5 Pico 2 - gets a big performance boost

Collaboration 2.0

The Raspberry Pi Pico 2's next-generation processor supports both Arm and RISC-V architectures.

189
189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Fighting Scammers with Flexible Instant Payment Choices

Data Breach Today

Fraud Experts Eva Velasquez and Ken Palla on the Value of Adding Some Friction Giving customers more flexibility in instant payment systems could give users more control over their transactions and help fight scammers. An option to delay payments could introduce the needed friction to stop fraudulent payments, said fraud experts Eva Velasquez and Ken Palla.

130
130
article thumbnail

I tested this 'Free TV' in return for watching targeted ads - and was pleasantly surprised

Collaboration 2.0

Telly's promise of a free television in exchange for viewing tailored ads wasn't at all what I expected. And that's a good thing.

189
189
article thumbnail

SEC Report Provides Insight into Key Tronic Ransomware Costs Totaling Over $17 Million

KnowBe4

The financial repercussions of the May 2024 ransomware attack on the electronics manufacturing services firm Key Tronic underscores just how costly these attacks are.