Sat.Jul 13, 2024 - Fri.Jul 19, 2024

article thumbnail

Banks and Airlines Disrupted as Mass Outage Hits Windows PCs

Data Breach Today

CrowdStrike Confirms Faulty Software Update for Falcon Sensor, Is Deploying Fix Banks, airlines, media giants and others are being disrupted by a mass, global IT outage tied to Windows PCs. While CrowdStrike has issued a workaround tied to a Falcon software update that appears to be the culprit, many IT administrators say it so far remains difficult to implement at scale.

IT 306
article thumbnail

Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks

Krebs on Security

At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets of Google Domains a year ago, but many customers still haven’t set up their new accounts. Experts say malicious hackers learned they could commandeer any migrated Squarespace accounts that hadn’t yet been registered, merely by supplying an email address tied to an existing domain.

Security 316
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious

Schneier on Security

6.8% , to be precise. From ZDNet : However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all mitigated traffic. The scale of these attacks is staggering. In the first quarter of 2024 alone, Cloudflare blocked 4.5 million unique DDoS attacks. That total is nearly a third of all the DDoS attacks they mitigated the previous year.

Cloud 136
article thumbnail

Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

WIRED Threat Level

A software update from cybersecurity company CrowdStrike appears to have inadvertently disrupted IT systems globally.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Russian nationals plead guilty to participating in the LockBit ransomware group

Security Affairs

Two Russian nationals pleaded guilty to participating in the LockBit ransomware group and carrying out attacks against victims worldwide. Two foreign nationals, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, pleaded guilty in Newark federal court for their roles in the LockBit ransomware operation. The LockBit ransomware operation has been active since January 2020, the group hit over 2,500 victims across 120 countries, including 1,800 in the U.S.

More Trending

article thumbnail

Global Microsoft Meltdown Tied to Bad Crowdstrike Update

Krebs on Security

A faulty software update from cybersecurity vendor Crowdstrike crippled countless Microsoft Windows computers across the globe today, disrupting everything from airline travel and financial institutions to hospitals and businesses online. Crowdstrike said a fix has been deployed, but experts say the recovery from this outage could take some time, as Crowdstrike’s solution needs to be applied manually on a per-machine basis.

article thumbnail

How One Bad CrowdStrike Update Crashed the World’s Computers

WIRED Threat Level

A defective CrowdStrike kernel driver sent computers around the globe into a reboot death spiral, taking down air travel, hospitals, banks, and more with it. Here’s how that’s possible.

IT 363
article thumbnail

SAPwned flaws in SAP AI core could expose customers’ data

Security Affairs

Researchers discovered security flaws in SAP AI Core cloud-based platform that could expose customers’ data. Cybersecurity researchers at Wiz uncovered five security flaws, collectively tracked as SAPwned, in the SAP AI Core cloud-based platform. An attacker can exploit the flaws to obtain access tokens and customer data. SAP AI Core, developed by SAP, is a cloud-based platform providing the essential infrastructure and tools for constructing, managing, and deploying predictive AI workfl

Cloud 354
article thumbnail

Millions of Exim Servers Still Exposed to Critical Flaw

Data Breach Today

Nearly 5 Million Servers May be Affected, Only 82 Have Been Patched A critical vulnerability in Exim Mail Transfer Agent enables threat actors to bypass email security filters and deliver malicious attachments directly to user inboxes. Nearly 5 million servers could be vulnerable, but only 82 public-facing servers have updated to the patched release, Exim 4.98.

Security 313
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Wanted! An IG Code of Human Ethics

Weissman's World

I recently gave a presentation to ARMA International about the human consequences of what we do, and though you probably can get a copy of it from ARMA itself – and for sure you can from me – I wanted to take a minute to reinforce the criticality of my point. Most of us spend… Read More » Wanted! An IG Code of Human Ethics The post Wanted!

IT 290
article thumbnail

Don't Fall for CrowdStrike Outage Scams

WIRED Threat Level

Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm's catastrophic software update.

Security 286
article thumbnail

Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums

Security Affairs

The cybercrime group FIN7 is advertising a security evasion tool in multiple underground forums, cybersecurity company SentinelOne warns. SentinelOne researchers warn that the financially motivated group FIN7 is using multiple pseudonyms to advertise a security evasion tool in several criminal underground forums. FIN7 developed a tool called AvNeutralizer (also known as AuKill) that can bypass security solutions.

article thumbnail

Why Google Is Eyeing a $23B Buy of Cloud Security Phenom Wiz

Data Breach Today

Largest Deal in Cyber History Would Help Google Rival Microsoft, Limit Partnerships Despite all the platformization buzz, there are very few vendors with market-leading capabilities in at least three disparate security technology categories. That could change if Google forges ahead with buying cloud security firm Wiz for a reported $23 billion just two years after buying Mandiant.

Cloud 310
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

This tiny accessory gives your Android thermal vision superpowers

Collaboration 2.0

It might seem like a total gimmick, but it's a must-have tool in my toolbox.

IT 246
article thumbnail

The US Supreme Court Kneecapped US Cyber Strategy

WIRED Threat Level

After the Supreme Court limited the power of federal agencies to craft regulations, it’s likely up to Congress to keep US cybersecurity policy intact.

article thumbnail

Ransomware groups target Veeam Backup & Replication bug

Security Affairs

Multiple ransomware groups were spotted exploiting a vulnerability, tracked as CVE-2023-27532, in Veeam Backup & Replication. The vulnerability CVE-2023-275327 (CVSS score of 7.5) impacts the Veeam Backup & Replication component. An attacker can exploit the issue to obtain encrypted credentials stored in the configuration database, potentially leading to gaining access to the backup infrastructure hosts.

article thumbnail

Hacktivists Dump Disney Slack Data Online Over AI Projects

Data Breach Today

Disney’s Data Targeted for Using Artists’ Work in AI Systems, Hacking Group Says An apparent hacktivist group known as NullBulge claimed to have released a major data trove of sensitive information from Disney’s third-party digital workplace collaboration platform, Slack, after reportedly targeting the tech giant for its use of artists' work in training advanced AI systems.

IT 304
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

This iPhone thermal camera accessory is one of my favorite tools

Collaboration 2.0

The industrial-grade Topdon TC002 gives your iPhone a cool superpower and you can get it for much less than a dedicated thermal imaging camera.

IT 246
article thumbnail

Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages

WIRED Threat Level

A hacker group called “NullBulge” says it stole more than a terabyte of Disney’s internal Slack messages and files from nearly 10,000 channels in an apparent protest over AI-generated art.

IT 270
article thumbnail

A critical flaw in Cisco SSM On-Prem allows attackers to change any user’s password

Security Affairs

A vulnerability in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers allows threat actors to change any user’s password. Cisco has addressed a critical vulnerability, tracked as CVE-2024-20419 (CVSS score of 10.0), in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers that allows attackers to change any user’s password.

Passwords 349
article thumbnail

AT&T Allegedly Pays Ransom After Snowflake Account Breach

Data Breach Today

Paying Criminals for a Promise to Delete Data Is Part of the Problem What will it take for victims of ransomware, extortion and other types of cybercrime to stop directly funding their attackers? The latest breached business to pay a ransom to its attackers appears to be AT&T, which reportedly paid Shiny Hunters over $350,000 for a promise to delete stolen data.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Amazon Fire TV Omni Series QLED is worth it for Alexa fans

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming.

IT 246
article thumbnail

AT&T Paid a Hacker $370,000 to Delete Stolen Phone Records

WIRED Threat Level

A security researcher who assisted with the deal says he believes the only copy of the complete dataset of call and text records of “nearly all” AT&T customers has been wiped—but some risks may remain.

Risk 267
article thumbnail

Rite Aid disclosed data breach following RansomHub ransomware attack

Security Affairs

The American drugstore chain Rite Aid Corporation disclosed a data breach following the cyber attack that hit the company in June. The American drugstore chain giant Rite Aid suffered a data breach following a cyberattack in June conducted by the RansomHub ransomware group. The group is the third-largest drugstore chain in the United States, with over 2,000 stores, and ranked No. 148 in the Fortune 500 in 2022.

article thumbnail

Atos Secures 1.675 Billion Euros in Financing to Stay Afloat

Data Breach Today

Banks, Bondholders Help French Firm Restructure Debt Ahead of Government Takeover French IT consultancy Atos has raised 1.675 billion euros to restructure its debt as the company prepares to finalize a takeover bid by the French government. About 800 million euros will go toward keeping the business running, according to an announcement by the Paris-based firm on Monday.

Security 297
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Ninja Creami Ice Cream Maker is still $30 off after Prime Day

Collaboration 2.0

Craving a summer treat? The Ninja Creami can make all your frozen desserts and smoothies, comes with two pint-sized containers, and is still $30 off even though Prime Day is over.

246
246
article thumbnail

US Senators Secretly Work to Block Safeguards Against Surveillance Abuse

WIRED Threat Level

Senator Mark Warner is trying to pass new limits on when the government can wiretap Americans. At least two senators are quietly trying to stop him.

article thumbnail

How to Protect Privacy and Build Secure AI Products

Security Affairs

AI systems are transforming technology and driving innovation across industries. How to protect privacy and build secure AI products? How to Protect Privacy and Build Secure AI Products AI systems are transforming technology and driving innovation across industries. However, their unpredictability raises significant concerns about data security and privacy.

Privacy 340