Tue.Jul 30, 2024

article thumbnail

A crafty phishing campaign targets Microsoft OneDrive users

Security Affairs

Researchers detected a sophisticated phishing campaign targeting Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a sophisticated phishing campaign targeting Microsoft OneDrive users. Threat actors rely on social engineering tactics to trick users into executing a PowerShell script, which leads to their systems being compromised.

Phishing 359
article thumbnail

Study: Average Cost of a Data Breach Rises to $4.9 Million

Data Breach Today

Involving Law Enforcement After Ransomware Attacks Drives Down Costs, Study Finds Data breaches continue to grow more costly, with the average cost of a breach hitting an all-time high of $4.9 million, driven by greater business disruption and post-breach customer support and remediation expenses, according to the latest annual Cost of a Data Breach Report from IBM.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds VMware ESXi bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a VMware ESXi bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an authentication bypass VMware ESXi vulnerability, tracked as CVE-2024-37085 (CVSS score of 6.8), to its Known Exploited Vulnerabilities (KEV) catalog.

IT 327
article thumbnail

Ransomware Gangs Exploit VMware ESXi Flaw

Data Breach Today

Bug Allows Attackers to Add New Users to a Group With Full Admin Privileges Ransomware hackers discovered a way to gain full administrative privileges on VMware ESXi hypervisors connected to Microsoft's Active Directory, a finding that resulted in extortion demands from cybercriminals, including Storm-0506, Storm-1175, Octo Tempest and Manatee Tempest.

article thumbnail

How to Start Virtual Care the Right Way: A Proven Roadmap for 2025 and Beyond

Speaker: Dr. Christine Gall, DrPH, MS, BSN, RN

The promise of virtual care is no longer theoretical and is now a critical solution to many of healthcare’s most urgent challenges. Yet many healthcare leaders remain unsure how to build a business case for investment and launching the right program at the right time can be the difference between value and failure. For organizations seeking a financially sound, clinically effective entry point, Virtual Patient Observation (VPO) offers a compelling case to lead with.

article thumbnail

Mandrake Android spyware found in five apps in Google Play with over 32,000 downloads since 2022

Security Affairs

A new version of the Mandrake Android spyware has been found in five apps on Google Play, which have been downloaded over 32,000 times since 2022. Researchers from Kaspersky discovered a new version of the Mandrake Android spyware in five app on Google Play, totaling over 32,000 downloads between 2022 and 2024. Researchers from Bitdefender discovered the high-sophisticated Android spyware Mandrake in 2022, while investigating highly targeted attacks against specific devices.

Libraries 318

More Trending

article thumbnail

SideWinder phishing campaign targets maritime facilities in multiple countries

Security Affairs

The APT group SideWinder launched a new espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. SideWinder (also known as Razor Tiger, Rattlesnake, and T-APT-04) has been active since at least 2012, the group mainly targeted Police, Military, Maritime, and the Naval forces of Central Asian countries. In the 2022 attacks, the threat actors also targeted departments of Foreign Affairs, Scientific and Defence organisations, Aviation, IT industry, and Le

Phishing 305
article thumbnail

Trellix's Dual AI Strategy: Combating and Using AI in Cyber

Data Breach Today

CEO Bryan Palma on Cobalt Strike Takedown and Generative AI's Role in Cyber Defense Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.

article thumbnail

Changing these 5 settings can instantly improve your TV picture quality

Collaboration 2.0

With a bit of patience and experimentation, you can adjust your TV's basic settings for a better viewing experience.

246
246
article thumbnail

Judge Allows Lawsuit Against EHR Vendor in Hack to Proceed

Data Breach Today

Several Claims Dismissed, But Other Allegations in Breach Case Get a Green Light A federal judge has dismissed several claims but has given the green light for plaintiffs to move forward with other allegations in a proposed class action filed against electronic health records vendor NextGen in the aftermath of a 2023 ransomware attack that affected about 1 million people.

article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

My new favorite rugged smartwatch is not made by Apple or OnePlus

Collaboration 2.0

Packed with cutting-edge features, enhanced durability, and a sleek design, the Galaxy Watch Ultra sets a new standard for a Wear OS device.

246
246
article thumbnail

UK ICO Reprimands Electoral Commission for 2021 Hack

Data Breach Today

Hackers Sued ProxyShell to Compromise Commission Systems The British data regulator reprimanded the U.K.'s Electoral Commission for its failure to prevent a 2021 cyberattack that resulted in the exposure of millions of voter records. Hackers breached the Electoral Commission's networks after exploiting the ProxyShell vulnerability.

IT 182
article thumbnail

Apple Vision Pro FAQ: Price, features, hands-on insights, and everything you need to know

Collaboration 2.0

Is Apple's spatial computing headset worth the price? Can you try it before buying? ZDNET answers all your burning questions.

IT 246
article thumbnail

Meta Prompt Guard Is Vulnerable to Prompt Injection Attacks

Data Breach Today

Researchers Add Spaces in 'Ignore Previous Instructions' Prompt to Bypass Security A machine learning model that Meta released last week to prevent prompt injection attacks is vulnerable to prompt injection attacks, researchers said. There is as yet no definitive solution to the problems of jailbreaking and prompt injection attacks.

Security 173
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

The square-shaped robot vacuum that kept my floors free of muddy paw prints this summer

Collaboration 2.0

The Ecovacs Deebot X2 Omni is a jack-of-all-trades robot vacuum mop with a unique square form that sets it apart from the competition.

IT 244
article thumbnail

How Cribl Lake Transformed IT and Security Data Management

Data Breach Today

CEO Clint Sharp on Launching a Turnkey Data Lake Offering, AI Copilot Integration Cribl CEO Clint Sharp introduces Cribl Lake, a turnkey data lake solution that addresses common data storage challenges. Sharp highlights the benefits of seamless integration with Cribl Cloud and the use of AI for enhanced data management and security for IT leaders.

IT 162
article thumbnail

This Linux distro is inspired by Windows' UI - and it works surprisingly well

Collaboration 2.0

Windows 11 is a divisive operating system, but it does get some things right. If you like the way Windows looks but you want to use Linux, Deepin is the way to go.

IT 189
article thumbnail

Account Takeover Fraud Declines in Financial Services

Data Breach Today

Tighter Security Controls Help Stop Fraud, But Fake IDs and Web Scraping Are Rising Account takeover fraud in the financial services industry is declining in contrast with other industries such as retail and hospitality. Researchers at Human Security attribute the nearly 50% reduction to one of the basic controls in cybersecurity: multifactor authentication.

article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

TV running slow? Changing these 6 settings can instantly speed up performance

Collaboration 2.0

Try these quick fixes to eliminate lag and juddering from your TV viewing experience.

189
189
article thumbnail

Human Risk and Email Security: New Mimecast CEO's Vision

Data Breach Today

Marc Van Zadelhoff Highlights Email Security Enhancements and International Growth New Mimecast CEO Marc van Zadelhoff talks about the integration of Elevate to manage human risk and the company's strategy for technological innovation. He also details plans for expanding Mimecast's presence in non-English-speaking markets and enhancing channel partnerships.

Risk 130
article thumbnail

The best budget gaming laptops: Expert tested

Collaboration 2.0

We found the best budget gaming laptops from Lenovo, MSI, and more (starting at just $550) to help you find the best fit for your wallet and your game library.

Libraries 190
article thumbnail

Providing Security Updates to Automobile Software

Schneier on Security

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight years after their purchase date. Samsung and Google provide Android OS updates and security updates for seven years. Apple halts servicing products seven years after they stop selling them. That might not cut it in the auto world, where the average age of cars on US roads is only going up.

Security 128
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

The best gaming PCs of 2024: Expert tested

Collaboration 2.0

We tested the best gaming PCs from Alienware, Lenovo, HP, and more to help you find the right one for your budget and library.

Libraries 190
article thumbnail

New Phishing Kit Uses Voice Call Generator to Impersonate Spanish Banks

KnowBe4

A new cybercriminal group is selling “a sophisticated AI-powered phishing-as-a-service platform” that targets 36 Spanish banks, according to researchers at Group-IB.

Phishing 126
article thumbnail

Microsoft 365 goes down - again

Collaboration 2.0

It's not just you (or Crowdstrike) - Microsoft 365 really is going through an outage. Here's what we know.

IT 190
article thumbnail

Dark Angels Ransomware Group Scores Record-Breaking $75 Million Payday

KnowBe4

In the ever-evolving world of cybercrime, ransomware attacks continue to be a lucrative business for cybercriminals.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

One of the best budget Android tablets I've tested is not made by Samsung or TCL

Collaboration 2.0

If you want a tablet for normal use and entertainment, the $169 AGM Pad P2 gets my recommendation.

190
190
article thumbnail

Organizations Prepare for More Evolved AI-Based Cyber Attacks as Deepfakes Become Top Concern

KnowBe4

New data on how the threat of AI in cyber crime is being seen as a growing risk provides insight into how organizations are shifting from reaction to prevention.

Risk 120
article thumbnail

You'll soon be able to manage your Android device from the Windows 11 file manager

Collaboration 2.0

If you're an Android and Windows user, you'll be relieved to know that your PC will soon let you wirelessly browse the files on your phone as if it were a drive connected to your computer.

IT 190