Mon.Dec 02, 2024

article thumbnail

Russia Indicts Ransomware Hacker Wanted by the FBI

Data Breach Today

Suspected LockBit, Babuk Operator Mikhail Matveev Arrested in Russia A prolific ransomware affiliate hacker and developer is facing criminal charges in Russia, Kremlin media reported Friday. Mikhail Pavlovich Matveev has been wanted by U.S. authorities since 2023 for his role in hacking activities as part of ransomware groups including LockBit, Hive and Babuk.

article thumbnail

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

Security Affairs

The Tor Project seeks help deploying 200 WebTunnel bridges by year-end to counter government censorship. Recent reports from Russia show increased censorship targeting the Tor network, including blocking bridges, pluggable transports, and circumvention apps. Russian watchdog Roskomnadzor is making some bridges inaccessible, highlighting the urgent need for more WebTunnel bridges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SmokeLoader Campaign Targets Taiwanese Companies

Data Breach Today

Theat Actor Uses Trojan as Infostealer A threat actor is targeting Taiwanese companies using phishing emails and long-standing vulnerabilities to deliver SmokeLoader malware. The threat actor uses plugins for the infamous malware to directly attack systems rather than using SmokeLoader as its name suggests, as a loader for other malware.

Phishing 260
article thumbnail

Details about the iOS Inactivity Reboot Feature

Schneier on Security

I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details , discovered through reverse engineering. The feature triggers after seventy-two hours of inactivity, even it is remains connected to Wi-Fi.

IT 120
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Just Like Windows: Linux Targeted by First-Ever UEFI Bootkit - UPDATED

Data Breach Today

Linux-Targeting Bootkitty Appears More Proof-of-Concept Than Threat, Researchers Say Cybersecurity researchers have discovered the first-ever UEFI bootkit designed to target Linux systems and subvert their boot process for malicious purposes. The "Bootkitty" malware, first uploaded to VirusTotal this month, appears to be more "proof of concept" than full-fledged threat, they said.

More Trending

article thumbnail

China Beating US in Critical Technology Research Investments

Data Breach Today

Experts Warn China's Tech Rise Could Reshape Global Cybersecurity and Warfare China has surged past the United States in critical technology research, according to a recent report published by the Australian Strategic Policy Institute, as experts warn the shift could have profound global implications, including risks to U.S. cybersecurity, innovation and global leadership.

article thumbnail

One of the best work travel tablets is still nearly 25% off for Cyber Monday

Collaboration 2.0

The Asus ProArt PZ13 is a high-performing laptop-tablet hybrid with a gorgeous 3K OLED screen and a battery that lasts way longer than expected.

116
116
article thumbnail

Upwind Raises $100M to Thwart Cloud Security Vulnerabilities

Data Breach Today

Firm Focuses on Runtime Context, AI Enhancements to Counter Evolving Cloud Threats With $100 million in Series A funding, Upwind plans to strengthen its runtime and AI-powered cloud security platform. CEO Amiram Shachar outlines the company’s investments in engineering, customer engagement and scaling solutions to address vulnerabilities like misconfigurations and insecure APIs.

Cloud 237
article thumbnail

The Cruel Twist: When Fake Firing Leads to Real Hacking

KnowBe4

Cybercriminals are constantly evolving their tactics to exploit our vulnerabilities. A recent phishing campaign has taken this to a new low, preying on people's fear of job loss to trick them into compromising their own security.

Phishing 107
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Feds Propose AI 'Guard Rails' for Medicare Advantage Plans

Data Breach Today

Provision Emphasizes Existing Medicare Regs for Equitable Access to Health Services The Centers for Medicare and Medicaid Services has issued proposed "guard rails" to help ensure that the use of artificial intelligence for Medicare Advantage insurance plans does not result in inequitable access to healthcare-related services. The proposed rule will go into effect in 2026.

article thumbnail

I test AI tools for a living, and these are the only two worth paying for

Collaboration 2.0

Generative AI can supercharge your productivity, but which tools truly deliver? These are my must-have subscriptions for programming, graphics, and creative workflows that actually pay off.

106
106
article thumbnail

Cyber Incidents Hit 3 NHS Hospitals in U.K.

Data Breach Today

Inc Ransom is Leaking Stolen Data in At Least 2 Attacks, Including Pediatric Info At least three United Kingdom National Health Service hospitals are responding to recent cyber incidents, including a children's hospital and a heart and chest specialty hospital are both located in Liverpool and share IT systems. Inc Ransom claims to have stolen data from those two hospitals.

IT 195
article thumbnail

The Apple Watch Ultra 2 is still $80 off at Best Buy for Cyber Monday (while the deal lasts)

Collaboration 2.0

Snag Apple's Watch Ultra 2 for $80 off at Best Buy. The deal is going fast during the last few hours of Cyber Monday.

105
105
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Malicious Ads in Search Results Are Driving New Generations of Scams

WIRED Threat Level

The scourge of “malvertising” is nothing new, but the tactic is still so effective that it's contributing to the rise of investment scams and the spread of new strains of malware.

IT 97
article thumbnail

My favorite DeWalt tool set is 46% off for Cyber Monday

Collaboration 2.0

Save $80 on this brilliant DeWalt power tool kit at Amazon for Cyber Monday -- the perfect gift for DIY beginners and tradespeople.

99
article thumbnail

The Pressure Is on for Big Tech to Regulate the Broken Digital Advertising Industry

WIRED Threat Level

Brands have been at the mercy of the algorithm when it comes to where their ads appear online, but they’re about to get more control.

IT 84
article thumbnail

I recommend this $60 anti-spy camera finder to anyone traveling (get 38% off for Cyber Monday)

Collaboration 2.0

Social media is awash with ads for gadgets that detect hidden cameras and bugs in your hotel room, Airbnb, or even your own home. So I tested one to see if it actually works.

IT 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

[NEW PRODUCT]: KnowBe4’s AIDA: Revolutionizing Security Awareness Training with AI-Powered Automation and Personalization

KnowBe4

Technological advances in artificial intelligence (AI) are only making the ongoing problem of social engineering worse.

article thumbnail

Last chance to get 1 year of Hulu for $0.99 a month with this Cyber Monday streaming deal

Collaboration 2.0

Hulu's Cyber Week deal drops the price of a monthly subscription to the streaming service from $7.99 to $0.99 a month for your first year. But hurry - it expires today.

IT 98
article thumbnail

China Threat Actor Targets Individuals and Entities in Japan Via Spear Phishing Campaign

KnowBe4

Researchers at Trend Micro warn that the China-aligned threat actor Earth Kasha has launched a new spear phishing campaign targeting individuals and organizations in Japan.

article thumbnail

One of the best work travel tablets has been discounted by nearly 25% for Cyber Monday

Collaboration 2.0

The Asus ProArt PZ13 is a high-performing laptop-tablet hybrid with a gorgeous 3K OLED screen and a battery that lasts way longer than expected.

98
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

CILIP and school library organisations submit joint response to DfE’s Curriculum & Assessment Review

CILIP

CILIP and school library organisations submit joint response to DfE’s Curriculum & Assessment Review CILIP, CILIP School Libraries Group (SLG), the Great School Libraries Campaign, the School Library Association (SLA), and the Association of Senior Children's and Education Librarians (ASCEL) have written a joint response to the Department for Education’s Curriculum & Assessment Review, highlighting the power and potential of school libraries and librarians.

article thumbnail

Save over $500 on this HP Victus gaming laptop at Best Buy for Cyber Monday

Collaboration 2.0

The HP Victus 15 packs in great features like a 144Hz refresh rate and AMD FreeSync Premium VRR support. And right now, you can buy it at Best Buy for $880.

IT 98
article thumbnail

Open Architecture Flexibility for Dynamic Security Environments

HID Global

Adopting open architecture in security systems provides clear advantages in integration, scalability, customization and longevity.

article thumbnail

Score a free Google Pixel 9 phone with this T-Mobile Cyber Monday deal

Collaboration 2.0

T-Mobile will give you a free Pixel 9 phone with a qualifying trade-in or new line activation, with up to $800 back across 24 months of credits this Cyber Monday.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Protect sector apprenticeships – Level 7 Apprenticeship funding under threat

CILIP

Protect sector apprenticeships – Level 7 funding under threat CILIP is raising the alarm about proposed changes to the Growth and Skills Levy, that could result in Level 7 apprenticeships being excluded from Government funding. Apprenticeships are a vital part of CILIP’s sector workforce development strategy, promoting equity, offering a range of pathways into and through the profession, and filling skills gaps.

article thumbnail

Volvo's new ad is basically a free digital marking course: 3 takeaways you need to know

Collaboration 2.0

Jaguar broke the internet with a strange new rebrand recently, but Volvo went a very different direction. Here's why and how to use its example to level up your next digital marketing campaign.

article thumbnail

Live Stream: AWS Partners LIVE!

eSecurity Planet

Get a front row seat to hear real stories from customers and AWS leaders about navigating pressing topics, learn about new product launches, watch demos, and get behind-the-scenes insights. You can catch all the excitement on the AWS Partner Network YouTube channel, where we’ll be sharing breaking news and exclusive insights alongside our competency partners.

Security 124