Sat.Jul 27, 2024 - Fri.Aug 02, 2024

article thumbnail

Study: Average Cost of a Data Breach Rises to $4.9 Million

Data Breach Today

Involving Law Enforcement After Ransomware Attacks Drives Down Costs, Study Finds Data breaches continue to grow more costly, with the average cost of a breach hitting an all-time high of $4.9 million, driven by greater business disruption and post-breach customer support and remediation expenses, according to the latest annual Cost of a Data Breach Report from IBM.

article thumbnail

Don’t Let Your Domain Name Become a “Sitting Duck”

Krebs on Security

More than a million domain names — including many registered by Fortune 100 firms and brand protection companies — are vulnerable to takeover by cybercriminals thanks to authentication weaknesses at a number of large web hosting providers and domain registrars, new research finds. Image: Shutterstock. Your Web browser knows how to find a site like example.com thanks to the global Domain Name System (DNS), which serves as a kind of phone book for the Internet by translating human-frie

Phishing 308
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat hunters – A day in the life

OpenText Information Management

Threat hunting is not just a job; it's a commitment to staying one step ahead of cyber adversaries. In this post, we'll dive into the daily life of a threat hunter, highlighting the myriad challenges they face. From technical hurdles to human and communication challenges, the life of a threat hunter is as demanding as it is rewarding. This is the third post in our ongoing “The Rise of the Threat Hunter” blog series.

article thumbnail

Ukraine’s cyber operation shut down the ATM services of major Russian banks

Security Affairs

Ukraine launched a massive cyber operation that shut down the ATM services of the biggest Russian banks on July 27, reported the Kyiv Post. Ukraine has launched a massive cyberattack against ATMs of Russian banks, the cyber operation began on July 23. “This is an opportune moment to fully implement the Kremlin’s long-desired ‘import substitution’ in the form of wooden abacuses, paper savings books, and cave paintings for accounting.” reported the KyivPost. “In Russia, it has al

Paper 361
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Ransomware Gangs Exploit VMware ESXi Flaw

Data Breach Today

Bug Allows Attackers to Add New Users to a Group With Full Admin Privileges Ransomware hackers discovered a way to gain full administrative privileges on VMware ESXi hypervisors connected to Microsoft's Active Directory, a finding that resulted in extortion demands from cybercriminals, including Storm-0506, Storm-1175, Octo Tempest and Manatee Tempest.

More Trending

article thumbnail

A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers

WIRED Threat Level

The RayV Lite will make it hundreds of times cheaper for anyone to carry out physics-bending feats of hardware hacking.

IT 239
article thumbnail

Fake Falcon crash reporter installer used to target German Crowdstrike users

Security Affairs

CrowdStrike warns about a new threat actor targeting German customers by exploiting a recent issue with Falcon Sensor updates. On July 24, 2024, CrowdStrike experts identified a spear-phishing campaign targeting German customers by exploiting the recent issue with Falcon Sensor updates. A previously unknown threat actor set up a fake website, resembling a German entity, to distribute a bogus CrowdStrike Crash Reporter installer.

Passwords 357
article thumbnail

Trellix's Dual AI Strategy: Combating and Using AI in Cyber

Data Breach Today

CEO Bryan Palma on Cobalt Strike Takedown and Generative AI's Role in Cyber Defense Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.

article thumbnail

16 incredibly useful things Alexa can do on Amazon Echo

Collaboration 2.0

Alexa has grown into a pervasive personal assistant. We were curious about what features the Alexa team loves that many of us haven't noticed. Here are 16 slick features you may have missed.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

He Was an FBI Informant—and Inspired a Generation of Violent Extremists

WIRED Threat Level

Joshua Caleb Sutter infiltrated far-right extremist organizations as a confidential FBI informant, all while promoting hateful ideologies that influenced some of the internet's most violent groups.

Security 231
article thumbnail

A crafty phishing campaign targets Microsoft OneDrive users

Security Affairs

Researchers detected a sophisticated phishing campaign targeting Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a sophisticated phishing campaign targeting Microsoft OneDrive users. Threat actors rely on social engineering tactics to trick users into executing a PowerShell script, which leads to their systems being compromised.

Phishing 356
article thumbnail

Judge Allows Lawsuit Against EHR Vendor in Hack to Proceed

Data Breach Today

Several Claims Dismissed, But Other Allegations in Breach Case Get a Green Light A federal judge has dismissed several claims but has given the green light for plaintiffs to move forward with other allegations in a proposed class action filed against electronic health records vendor NextGen in the aftermath of a 2023 ransomware attack that affected about 1 million people.

article thumbnail

This Roku soundbar turned my old TV into the ultimate 4K theater experience

Collaboration 2.0

Roku's Streambar Pro gives your TV audio a boost while adding 4K streaming, and it's relatively affordable at $180.

IT 246
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Celebrating 80 Years of AIIM: A Journey Through Information Management

AIIM

Today (July 28, 2024), we at AIIM (Association for Intelligent Information Management) are thrilled to celebrate our 80th anniversary. With celebrations kicking off earlier this year at the AIIM Conference, today offers us a moment to reflect on our rich history, celebrate our achievements, and look forward to an exciting future in the ever-evolving world of information management.

232
232
article thumbnail

BingoMod Android RAT steals money from victims’ bank accounts and wipes data

Security Affairs

BingoMod is a new Android malware that can wipe devices after stealing money from the victims’ bank accounts. Researchers at Cleafy discovered a new Android malware, called ‘BingoMod,’ that can wipe devices after successfully stealing money from the victims’ bank accounts. The Cleafy TIR team discovered the previously undetected malware at the end of May 2024.

article thumbnail

CrowdStrike Outage Could Cost Cyber Insurers $1.5 Billion

Data Breach Today

Most Claims Will Be Made Under 'Systems Failure' Coverage, Says Moody's Ratings The global IT outage triggered by a faulty CrowdStrike software update could lead to $400 million to $1.5 billion in payouts to cyber insurance policyholders, although the nonstandardized language used for such policies will make determining final losses a "lengthy process," analysts say.

Insurance 227
article thumbnail

Better than Ring? This video doorbell features all the benefits and no subscription fees

Collaboration 2.0

The Lorex 2K video doorbell is the company's flagship security system. I tested it to see if it was worth the money.

Security 246
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

WIRED Threat Level

Social Security numbers, death certificates, voter applications, and other personal data were accessible on the open internet, highlighting the ongoing challenges in election security.

article thumbnail

Over 20,000 internet-exposed VMware ESXi instances vulnerable to CVE-2024-37085

Security Affairs

Shadowserver researchers reported that over 20,000 internet-exposed VMware ESXi instances are affected by the actively exploited flaw CVE-2024-37085. Researchers at the Shadowserver Foundation reported that approximately 20,000 VMware ESXi servers exposed online appear impacted by the exploited vulnerability CVE-2024-37085. We have started sharing exposed VMware ESXi vulnerable to CVE-2024-37085 (authentication bypass).

article thumbnail

UK ICO Reprimands Electoral Commission for 2021 Hack Attack

Data Breach Today

Hackers Exploited ProxyShell Vulnerability to Compromise Commission Systems The British data regulator reprimanded the U.K.'s Electoral Commission for its failure to prevent a 2021 hack attack that resulted in the exposure of millions of voter records. Hackers breached the Electoral Commission's networks after exploiting the ProxyShell vulnerability.

IT 223
article thumbnail

This turntable is designed for beginners, but even experts will love its features

Collaboration 2.0

Audio-Technica's new AT-LP70X series of turntables is aimed at those new to vinyl, but without sacrificing audio quality.

IT 246
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Saboteurs Cut Internet Cables in Latest Disruption During Paris Olympics

WIRED Threat Level

Long-distance cables were severed across France in a move that disrupted internet connectivity.

Security 203
article thumbnail

Apple fixed dozens of vulnerabilities in iOS and macOS

Security Affairs

Apple has issued security updates to address multiple vulnerabilities across iOS, macOS, tvOS, visionOS, watchOS, and Safari. Apple released security updates to address multiple vulnerabilities in iOS, macOS, tvOS, visionOS, watchOS, and Safari. The IT giant released iOS 17.6 and iPadOS 17.6 to address dozens of security vulnerabilities, including authentication and policy bypasses, information disclosure and denial-of-service (DoS) issues, and bugs that can lead to memory leaks and unexpected a

article thumbnail

Zeroing in on Zero Trust

Data Breach Today

How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.

article thumbnail

How to get a free Windows (or Linux) recovery image for your Dell, HP, Lenovo, or Microsoft Surface PC

Collaboration 2.0

What's better than a clean install? How about a clean installation that includes all required drivers and utility programs? Here's how to locate a recovery image that will help you reinstall Windows 10, Windows 11, or even Linux on your Dell, HP, Lenovo, or Microsoft Surface PC.

246
246
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A Senate Bill Would Radically Improve Voting Machine Security

WIRED Threat Level

This year’s Intelligence Authorization Act would mandate penetration testing for federally certified voting machines and allow independent researchers to work on exposing vulnerabilities.

Security 198
article thumbnail

Security Affairs Malware Newsletter – Round 4

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Play Ransomware Group’s New Linux Variant Targets ESXi, Shows Ties With Prolific Puma Fake Browser Updates Lead to BOINC Volunteer Computing Software Impact of FrostyGoop ICS Malware on Connected OT Systems A Novel Static Analysis Approach Using System Calls for Linux IoT Malware Detection From Smishing and Vishing to compromission: dissecting Copybara’s Infectio

Security 335
article thumbnail

CrowdStrike Faces Class Action Lawsuit Over Global IT Outage

Data Breach Today

Investors Say Cybersecurity Company Made False and Misleading Statements About Tech CrowdStrike faces a putative class action lawsuit over the widespread global IT outage in late July that caused major disruptions at airports and hospitals after the company pushed through a faulty update to its Falcon platform, causing its stock prices to plummet.

IT 189