Thu.Aug 08, 2024

article thumbnail

Russian cyber spies stole data and emails from UK government systems

Security Affairs

Earlier this year, Russian cyber spies breached UK government systems and stole sensitive data and emails, reported The Record media. Earlier this year, Russia’s foreign intelligence service stole internal emails and data on individuals from the UK government. The news was first reported by Recorded Future News, which obtained an official description of the incident report.

article thumbnail

USPS Text Scammers Duped His Wife, So He Hacked Their Operation

WIRED Threat Level

The Smishing Triad network sends up to 100,000 scam texts per day globally. One of those messages went to Grant Smith, who infiltrated their systems and exposed them to US authorities.

Security 351
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI and CISA update a joint advisory on the BlackSuit Ransomware group

Security Affairs

FBI and CISA published a joint advisory on the BlackSuit Ransomware group, the document provides TTPs and IOCs as recently as July 2024. CISA, in collaboration with the FBI, has published a joint advisory on the BlackSuit Ransomware group. The advisory includes recent and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) related to BlackSuit operation, which rebrands legacy Royal ransomware , identified by FBI investigations as recent as July 20

article thumbnail

Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes

WIRED Threat Level

Hacker Samy Kamkar is debuting his own open source version of a laser microphone—a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you’re typing.

Privacy 311
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Android Kernel Remote Code Execution flaw ( CVE-2024-36971 ) and an Apache OFBiz Path Traversal issue ( CVE-2024-32113 ) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 326

More Trending

article thumbnail

0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers

Security Affairs

An 18-year-old bug, dubbed “0.0.0.0 Day,” allows malicious websites to bypass security in Chrome, Firefox, and Safari to breach local networks. Oligo Security’s research team warns of an 18-year-old bug, dubbed “0.0.0.0 Day,” that allows malicious websites to bypass security in Chrome, Firefox, and Safari to breach local networks.

Security 314
article thumbnail

McLaren Health Hit With Ransomware for Second Time in a Year

Data Breach Today

Clinicians Say Current Hack More Disruptive Than 2023 Attack Michigan-based McLaren Health Care is dealing with its second cyberattack in less than a year, disrupting IT systems and patient services at its 13 hospitals and other medical facilities. Ransomware gang INC Ransom allegedly claims to have carried out this latest attack.

article thumbnail

New Mac Mini: M4 powered yet small as an Apple TV?

Collaboration 2.0

The new version of the Mac Mini is said to be the smallest computer Apple's ever made, but one of the most powerful with the new M4 chip.

246
246
article thumbnail

Computer Crash Reports Are an Untapped Hacker Gold Mine

WIRED Threat Level

One hacker solved the CrowdStrike outage mystery with simple crash reports, illustrating the wealth of detail about potential bugs and vulnerabilities those key documents hold.

Mining 221
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

This affordable Android tablet has a big screen and lasted me days

Collaboration 2.0

This Blackview Tab 18, with an octa-core processor, 12GB of RAM, and a huge battery, is just the thing for me.

246
246
article thumbnail

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

WIRED Threat Level

New research shows how known techniques for finding weaknesses in websites are actually practical in uncovering vulnerabilities, for better or worse.

Security 194
article thumbnail

One year later: The Flipper Zero is still cool. Here are 7 useful things you can do

Collaboration 2.0

This weird little device blew up on TikTok, but there are quite a few impressive things you can do with it. Here are some of the most useful.

IT 246
article thumbnail

US Water Cybersecurity Improvement Efforts at Loggerheads

Data Breach Today

Legal and Voluntary Methods Fall Short Cyber threats against the U.S. water sector are growing but the main federal regulatory agency that oversees it may be stymied by a lack of cooperation from sector operators, concludes a Government Accountability Office report. Attacks against the water sector have mounted steadily.

article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

This is the $400 Android phone to beat in 2024 - and it includes a stylus and free earbuds

Collaboration 2.0

If you enjoy using a stylus to capture quick notes, create GIFs, and even solve basic handwritten calculations, look to Motorola's Moto G Stylus 5G (2024). For a limited time, you can also get a free pair of earbuds with it.

IT 246
article thumbnail

Breach Roundup: Royal Ransomware Group On An Extortion Tear

Data Breach Today

Also: French Museum Ransomware Attack, Cisco Smart Install and SharpRhino Malware This week, Royal ransomware, a French museum ransomware attack and a putative class action over a background check data breach. Singapore removed an app monitoring internet use on student devices, a warning over Cisco Smart Install, the upstart SharpRhino gang and an exposed Illinois voter database.

article thumbnail

The best Android VPN services of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best Android VPNs that provide high levels of security and high speeds without slowing down your phone.

Security 190
article thumbnail

US Feds Arrest Man for North Korean Remote IT Worker Scam

Data Breach Today

Matthew Isaac Knoot Allegedly Hosted Laptop Farm in his Nashville Home U.S. federal prosecutors charged a Tennessee man with abetting North Korea in an ongoing effort to obtain remote IT work for its nationals as a way of generating hard currency. "North Korean IT workers are widespread in Fortune 500 companies," said a threat analyst.

IT 147
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

The Windows 10 clock is ticking: 5 ways to save your old PC in 2025 (most are free)

Collaboration 2.0

As many as 240 million Windows 10 PCs can't be upgraded to Windows 11. But instead of trashing your device when Windows 10 support runs out, here are five viable alternatives to save you money and trouble.

190
190
article thumbnail

Feds Drop Probe Into Progress Software Over MOVEit Zero-Day

Data Breach Today

Clop Ransomware Group Exploited Flaw to Steal Data Pertaining to 95M Individuals Progress Software said the U.S. Securities and Exchange Commission has dropped its probe into the business, launched after attackers exploited a zero-day flaw in its MOVEit secure file transfer software to steal data pertaining to over 2,770 organizations and 95 million individuals.

article thumbnail

I'm a pro Linux user, and this distribution is one of the most unique I've tried

Collaboration 2.0

If you're looking to try something new with Linux that is not only cool-looking but also has a lot to offer users of every type, Rhino Linux is sure to impress.

190
190
article thumbnail

Cryptohack Roundup: White Hats Hack Ronin Bridge

Data Breach Today

Also: Cryptonator, Crypto.com, Do Kwon Case Updates Every week, ISMG rounds up cybersecurity incidents in digital assets. This week, a $12M white hat hack on Ronin Bridge, Cryptonator indictment, potential prison sentence in Crypto.com case, a $212K Convergence hack, Do Kwon's extradition, and the FBI published a scam warning.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Will you pay for Apple Intelligence? Up to $20 a month is 'a real possibility'

Collaboration 2.0

Apple hasn't revealed pricing plans for access to its AI, but experts agree that one of these fee structures is likely.

Access 189
article thumbnail

CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Android Kernel Remote Code Execution flaw ( CVE-2024-36971 ) and an Apache OFBiz Path Traversal issue ( CVE-2024-32113 ) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 145
article thumbnail

Running out of Gmail storage? How to get another 15GB for free

Collaboration 2.0

Whether you're a digital hoarder or separating from a work or school account, you can archive your Google messages and media with this free and clever hack.

Archiving 189
article thumbnail

Fighting Scammers with Flexible Instant Payment Choices

Data Breach Today

Fraud Experts Eva Velasquez and Ken Palla on the Value of Adding Some Friction Giving customers more flexibility in instant payment systems could give users more control over their transactions and help fight scammers. An option to delay payments could introduce the needed friction to stop fraudulent payments, said fraud experts Eva Velasquez and Ken Palla.

130
130
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Proton Pass password manager adds identity data, biometric authentication

Collaboration 2.0

Proton's new features aim to save you time, reduce errors, and enhance security. The biometric authentication for Windows and MacOS is only supported in some plans.

article thumbnail

SEC Report Provides Insight into Key Tronic Ransomware Costs Totaling Over $17 Million

KnowBe4

The financial repercussions of the May 2024 ransomware attack on the electronics manufacturing services firm Key Tronic underscores just how costly these attacks are.

article thumbnail

Verizon is using AI to prevent accidental internet outages - here's how

Collaboration 2.0

Artificial intelligence is helping Verizon stop third-party cable cuts before they happen. Here's how it can help you, and what you should do before digging.