Mon.Oct 28, 2024

article thumbnail

A crime ring compromised Italian state databases reselling stolen info

Security Affairs

Italian police arrested four and are investigating dozens, including Leonardo Maria Del Vecchio, for alleged unauthorized access to state databases. Italian authorities have arrested four individuals as part of an investigation into alleged illegal access to state databases. The police are also investigating dozens of other individuals, including the son of Luxottica founder Leonardo Maria Del Vecchio.

article thumbnail

Dutch Police and FBI Infiltrate Info-Stealer Infrastructure

Data Breach Today

Cops Recover Redline, Meta Infostealer Data; Promise Criminal Users: 'See You Soon' The Dutch National Police, working with the FBI, say they've disrupted the Redline and Meta info-stealing malware services after obtaining "full access" to them, including source code and extensive details pertaining to their users, with follow-on "legal actions" now "underway.

Access 313
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A long supply chain adds third-party risks, as each partner’s security affects your own, making identity and access management more challenging. Identity-related attack vectors are a significant concern, with a substantial percentage of cyberattacks —often cited as over 70%—involving compromised credentials or identity theft. However, this problem primarily stems from a lack of visibility.

B2B 311
article thumbnail

8 ways I prepped my iPhone for iOS 18.1 - and I recommend you do too

Collaboration 2.0

For the smoothest, safest upgrade, take these steps before you update your iPhone.

306
306
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Black Basta affiliates used Microsoft Teams in recent attacks

Security Affairs

ReliaQuest researchers observed Black Basta affiliates relying on Microsoft Teams to gain initial access to target networks. ReliaQuest researchers warn that Black Basta ransomware affiliates switched to Microsoft Teams, posing as IT support to deceive employees into granting access. The BlackBasta ransomware operators were spotted posing as corporate help desks and contacting employees to help them mitigate an ongoing spam attack.

More Trending

article thumbnail

How iOS 18 turned my Apple Watch into the productivity tool of my sci-fi dreams

Collaboration 2.0

I can now do serious writing work easily and from anywhere - on my Apple Watch. Here's how you can, too.

290
290
article thumbnail

Key Federal Cyber Panel to Probe Chinese Telecoms Hacking

Data Breach Today

Cyber Safety Review Board to Examine Beijing-Linked Telecom Breaches A key federal cybersecurity panel will investigate Chinese-linked hacks into United States telecom networks and wiretapping infrastructure amid growing concerns of vulnerabilities embedded into the nation's communications infrastructure, an official told Information Security Media Group.

article thumbnail

I switched from Intel to AMD - here's why I'm never going back

Collaboration 2.0

I find AMD's Ryzen CPUs far more reliable than any Intel-based system I've ever used. But that's not the only thing to make me a convert.

273
273
article thumbnail

Delta Air Lines Sues CrowdStrike Over July System Meltdown

Data Breach Today

Lawsuit Compares Botched Software Update to Hacking Delta Air Lines filed an acerbic lawsuit Friday afternoon against CrowdStrike that likens the endpoint security vendor's botched July 19 update to hacking. The suit accuses the cybersecurity company of "installing an exploit in Delta systems" by automatically rolling out an update.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Vulnerability Recap 10/28/24 – Phishing, DoS, RCE & a Zero-Day

eSecurity Planet

Like last week, this week’s theme continues to be vulnerabilities, discovered months ago, that are still rearing their head. A July Microsoft SharePoint issue has been added to the Cybersecurity Infrastructure and Security Agency’s catalog of known exploitable vulnerabilities. Additionally, VMware released a patch for an already-patched vulnerability from last month due to an insufficient heap overflow fix.

Phishing 103
article thumbnail

Claude's Computer Use May End Up a Cautionary Tale

Data Breach Today

Update to Anthropic Model Allows Automation Without Human Oversight Anthropic's updated Claude model can autonomously run tasks on computers it's used on, a feature the company positions as a perk. The feature has the potential to boost productivity, but security experts - and the AI giant itself - sound caution about its potential cybersecurity risks.

article thumbnail

This Linux distribution doesn't require installation, and still remembers where you left off

Collaboration 2.0

If you're looking for a Linux distribution you can carry with you, PorteuX might be just the ticket to the freedom you've been looking for.

264
264
article thumbnail

Don't Let a Third-Party Data Breach Destroy Your Institution's Reputation

Data Breach Today

Strategies for Safeguarding Data and Reputation at Financial Institutions In today's increasingly digital world, trust isn't always easy to come by. Businesses no longer have complete control over their technology stack. Instead, they rely heavily on third-party solutions, applications and products to keep operations running smoothly. But those third parties pose risks.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Take Google's new AI course, write better prompts

Collaboration 2.0

The self-paced 'Prompting Essentials' course requires no previous experience and is available now on Coursera.

263
263
article thumbnail

Why Shoring Up Cyber at Rural and Small Hospitals Is Urgent

Data Breach Today

When a large hospital in an urban area is shut down by ransomware, the disruption can be significant, but when a rural hospital faces a similar cyber outage, the impact on patient safety and the community can be extreme, said Nitin Natarajan of the Cybersecurity and Infrastructure Security Agency.

article thumbnail

The Windows 11 24H2 bug list grows again: 9 reasons to avoid this update for now

Collaboration 2.0

Microsoft's official 24H2 update for Windows 11 has been saddled with one bug after another. Here's what you may find if you jump to the new version right now.

260
260
article thumbnail

Armis Secures $200M to Drive M&A and Federal Market Growth

Data Breach Today

Series D Funding on $4.2B Valuation to Support OT, Medical Device Security Growth Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.

Marketing 269
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How Claude's new AI data analysis tool compares to ChatGPT's version (hint: it doesn't)

Collaboration 2.0

I tested Claude's new free data-crunching AI tool. Unfortunately, it rejects even moderately sized datasets - and the paid version isn't much better.

IT 260
article thumbnail

Deepfake Phone Scams for Less Than a Dollar a Pop

Data Breach Today

Academics Build AI Agent With OpenAI to Execute Phone Scams at Scale Hackers can use OpenAI's real-time voice API to carry out for less than a dollar deepfake scams involving voice impersonations of government officials or bank employees to swindle victims, said researchers at the University of Illinois Urbana-Champaign.

article thumbnail

Google Chromecast vs Roku: Which streaming device platform is right for you?

Collaboration 2.0

The Google Chromecast and Roku streaming devices are wildly popular among cord-cutters, but which one is right for you? We break down the differences and help you decide.

257
257
article thumbnail

US Bans Investments Into Cutting Edge Chinese Tech

Data Breach Today

US Treasury Issues Regulations Restricting Investments in Foreign Semiconductors, AI The U.S. Department of Treasury published final regulations Monday for investors planting dollars abroad that aims to restrict investments from the United States into sensitive technologies developed by foreign adversaries while continuing to ensure open investments practices remain intact.

241
241
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

iOS 18.1 with Apple Intelligence is here. Try these 5 AI features first

Collaboration 2.0

I spoke with Apple's Bob Borchers about the big Apple Intelligence upgrade and I've been trying out the beta version for the past three months.

255
255
article thumbnail

Forrester's 2025 Predictions: Gen AI Investments to Decline

Data Breach Today

Forrester's Cody Scott on Why 2025 Will Be Pivotal for Security Leaders Forrester's 2025 Predictions for Cybersecurity, Risk and Privacy report forecasts that security leaders will scale back generative AI investments by 10%. AI productivity gains have fallen short of expectations, forcing CISOs to reprioritize budgets and reassess gen AI’s role in security operations.

Privacy 225
article thumbnail

Grab the 4TB Samsung T5 portable SSD for almost 50% off at Amazon

Collaboration 2.0

The Samsung T5 Evo 4TB portable SSD is almost $200 off at Amazon, saving you 46% on all the storage space you'll need for games, documents, photos, and videos. But you'll have to hurry, you might not see an SSD deal this good again until Black Friday.

244
244
article thumbnail

The Relevance of Privacy-Preserving Techniques and Generative AI to DORA Legislation

Thales Cloud Protection & Licensing

The Relevance of Privacy-Preserving Techniques and Generative AI to DORA Legislation madhav Tue, 10/29/2024 - 04:55 The increasing reliance on digital technologies has created a complex landscape of risks, especially in critical sectors like finance. To address these challenges, the European Union introduced the Digital Operational Resilience Act (DORA) in 2022, designed to ensure that financial entities can withstand and recover from cyber threats while maintaining operational continuity.

Privacy 62
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

You could win $25,000 for pushing Google's Gemini 1.5 to its limit

Collaboration 2.0

Google's latest AI model has a much larger context window than before, and this data science competition platform wants to see what you can do with it.

article thumbnail

Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

WIRED Threat Level

A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.

Security 172
article thumbnail

How to print from Linux using only the command line

Collaboration 2.0

You may not need it often, but this trick comes in handy when you do.

IT 235