Tue.Dec 03, 2024

article thumbnail

Why Phishers Love New TLDs Like.shop,top and.xyz

Krebs on Security

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as.shop ,top ,xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees the domain name industry is moving forward with plans to introduce a slew of new gTLDs.

Phishing 282
article thumbnail

Energy industry contractor ENGlobal Corporation discloses a ransomware attack

Security Affairs

ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware attack disrupted the operations of a major energy industry contractor, ENGlobal Corporation. Founded in 1985, ENGlobal Corporation designs automated control systems for commercial and government sectors, reporting $6 million in Q3 revenue and $18.4 million year-to-date.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Section 1033 Push Banks to Provide Customers with “Financial SIM Card”

Data Breach Today

Authored by: Matt Kunkel, CEO, LogicGate The Consumer Financial Protection Bureau (CFPB) recently finalized a set of rules that would bring a similar level of convenience to the financial world. These changes to Section 1033 of the Dodd-Frank Act make it significantly easier for customers to retain access to their financial history no matter which bank they transact with.

Access 272
article thumbnail

Microsoft ramps up pressure on users running Windows 11 on unsupported PCs

Collaboration 2.0

The company is threatening to add a watermark to the desktop of any unsupported PC running Windows 11.

344
344
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

News alert: Sweet Security releases its evolutionary Cloud Native Detection and Response platform

The Last Watchdog

Tel Aviv, Israel, Dec. 3, 2024, CyberNewswire — With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure Sweet Security today announced the release of its unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time.

Cloud 130

More Trending

article thumbnail

U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2023-45727 North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability CVE-2024-11680 ProjectSend Improper Authentication Vulnerabil

IT 280
article thumbnail

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

WIRED Threat Level

A new proposal by the Consumer Financial Protection Bureau would use a 54-year-old privacy law to impose new oversight of the data broker industry. But first, the agency must survive Elon Musk.

Privacy 273
article thumbnail

I deleted thousands of tweets from X with this new tool - for free

Collaboration 2.0

Now you can easily migrate from X with this powerful tool that deletes tweets, likes, and DMs, while backing up your data for a fresh start elsewhere.

267
267
article thumbnail

GoodRx Agrees to Pay $25M to Settle Web Tracker Lawsuit

Data Breach Today

Telehealth Firm Previously Paid $1.5M Fine to FTC for Similar Privacy Issues GoodRx has reached a $25 million preliminary settlement of proposed class action litigation alleging the telehealth company violated privacy and an assortment other laws and statues when it previously collected and shared consumers' information with third-parties through online tracking tools.

Privacy 264
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Enterprises struggle with what to do with Gen AI, say venture capitalists

Collaboration 2.0

Despite some uncertainty, enterprise investments in applications soared eight-fold in 2024, with spending on AI-generated code leading the way.

article thumbnail

European Police Disrupts Matrix Encrypted Service

Data Breach Today

Platform Used for Drugs, Arms trafficking, and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.

article thumbnail

The Samsung phone I recommend to most people is $100 off during post-Cyber Monday sales

Collaboration 2.0

While it doesn't flip, fold, or have a built-in S Pen stylus, the Galaxy S24 FE offers all the essentials at a relatively accessible price. Although Cyber Monday sales are over, deals for the phone are still live on Best Buy.

Sales 264
article thumbnail

16 Zero-Days Uncovered in Fuji Electric Monitoring Software

Data Breach Today

Flaws in Fuji's Tellus and V-Server Software Pose Risks to Critical Infrastructure Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Save big on a touchless vacuum this holiday season

Collaboration 2.0

Get an EyeVac touchless vacuum at 30% off for only $100, just in time for the holidays, with this lingering Cyber Monday deal.

259
259
article thumbnail

He Got Banned From X. Now He Wants to Help You Escape, Too

WIRED Threat Level

When programmer Micah Lee was kicked off X for a post that offended Elon Musk, he didn't look back. His new tool for saving and deleting your X posts can give you that same sweet release.

Privacy 251
article thumbnail

Global AI computing will use 'multiple NYCs' worth of power by 2026, says founder

Collaboration 2.0

AI computing will continue to soar with inference, requiring completely new multiple-gigawatt AI data centers.

259
259
article thumbnail

'Horns&Hooves' Malware Campaign Hits Over 1,000 Victims

Data Breach Today

Russian Threat Actor Delivers NetSupport RAT, BurnsRAT via Fake Requests A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf.

Retail 243
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

You can test all the best Linux distros right in your web browser with this site

Collaboration 2.0

If you've ever wanted to see what Linux was all about but didn't want to go through the steps of installing it, this site offers a great option.

IT 250
article thumbnail

China Is Outpacing US in Critical Tech Research Investments

Data Breach Today

Experts Warn China's Tech Rise Could Reshape Global Cybersecurity and Warfare China has surged past the United States in critical technology research, according to a recent report published by the Australian Strategic Policy Institute. Experts warn the shift could have profound global implications, including risks to U.S. cybersecurity, innovation and global leadership.

article thumbnail

Get this awesome Windows 11 Pro Mini PC for $300

Collaboration 2.0

It's a tiny PC with lots of power and tons of possibilities - and it's not a Raspberry Pi.

IT 245
article thumbnail

Korean Firm Sold Satellite Receivers With DDoS Feature

Data Breach Today

Firm Allegedly Embedded DDoS at the Request of a Foreign Client A South Korean company exported 240,000 satellite receivers with distributed denial-of-service attack capabilities, leading to the arrest of its CEO by the Korean National Police Agency. The company and its employees face criminal prosecution for allegedly violating South Korea’s cybersecurity laws.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

This TCL QLED TV is the model I recommend to most buyers - and it just hit an all-time low price

Collaboration 2.0

The 2024 TCL QM8 might be one of the best TVs for the money on the market, and it's even cheaper right now than it was during Black Friday.

IT 240
article thumbnail

Sixgen's Kyrus Acquisition Boosts National Cybersecurity

Data Breach Today

Buy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise Sixgen will enhance its cybersecurity operations through the purchase of Washington D.C.-area Kyrus. The move introduces reverse engineering and analytics expertise to Sixgen's portfolio, aligning with its mission to protect critical infrastructure and bolster American cyber defense capabilities.

article thumbnail

I highly recommend this 12-in-1 electric screwdriver, and now get 25% off

Collaboration 2.0

This top-rated electric screwdriver has served me well for over a year. And you can buy the Hoto Rechargeable Electric Screwdriver for $45 on Amazon.

240
240
article thumbnail

Feds Propose AI 'Guardrails' for Medicare Advantage Plans

Data Breach Today

Provision Emphasizes Existing Medicare Regs for Equitable Access to Health Services The Centers for Medicare and Medicaid Services has issued proposed "guardrails" to help ensure that the use of artificial intelligence for Medicare Advantage insurance plans does not result in inequitable access to healthcare-related services. The proposed rule will go into effect in 2026.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Forget the Ray-Ban Metas: Samsung's upcoming smart glasses are the wearables I've been waiting for

Collaboration 2.0

New reports point to the Korean giant unveiling its first smart glasses during a January Unpacked event alongside the expected Galaxy S25 series. Here's what we know.

IT 240
article thumbnail

Elevating Information Management: Shell's Journey to Maturity

AIIM

At Shell, we're on an exciting journey to raise our Information Management (IM) maturity. Our approach is twofold: we look externally at what others in the industry are doing, and we also focus internally on our own progress.

211
211
article thumbnail

How to use your Apple Watch to predict when you may get sick

Collaboration 2.0

The Vitals app can catch if your vitals are out of the norm. Here's how to use it to stay ahead of flu season.

IT 240