Wed.Oct 30, 2024

article thumbnail

Russia-linked Midnight Blizzard APT targeted 100+ organizations with a spear-phishing campaign using RDP files

Security Affairs

Microsoft warns of a new phishing campaign by Russia-linked APT Midnight Blizzard targeting hundreds of organizations. Microsoft warns of a large-scale spear-phishing campaign by Russia-linked APT Midnight Blizzard (aka APT29 , SVR group , BlueBravo , Cozy Bear , Nobelium , Midnight Blizzard , and The Dukes ), targeting 1,000+ users across 100+ organizations for intelligence gathering.

Phishing 308
article thumbnail

Change Healthcare Breach Hits 100M Americans

Krebs on Security

Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information. Image: Tamer Tuncay, Shutterstock.com. A ransomware attack at Change Healthcare in the third week of February quickly spawned disruptions across the U.S. healthcare system that reverberated for months, thanks to the company’s c

Insurance 311
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New version of Android malware FakeCall redirects bank calls to scammers

Security Affairs

The latest FakeCall malware version for Android intercepts outgoing bank calls, redirecting them to attackers to steal sensitive info and bank funds. Zimperium researchers spotted a new version of the FakeCall malware for Android that hijacks outgoing victims’ calls and redirects them to the attacker’s phone number. The malware allows operators to steal bank users’ sensitive information and money from their bank accounts.

Phishing 329
article thumbnail

‘We’re a Fortress Now’: The Militarization of US Elections Is Here

WIRED Threat Level

From bulletproof glass, drones, and snipers to boulders blocking election offices, the US democratic system is bracing for violent attacks in 2024.

Security 343
article thumbnail

How to Start Virtual Care the Right Way: A Proven Roadmap for 2025 and Beyond

Speaker: Dr. Christine Gall, DrPH, MS, BSN, RN

The promise of virtual care is no longer theoretical and is now a critical solution to many of healthcare’s most urgent challenges. Yet many healthcare leaders remain unsure how to build a business case for investment and launching the right program at the right time can be the difference between value and failure. For organizations seeking a financially sound, clinically effective entry point, Virtual Patient Observation (VPO) offers a compelling case to lead with.

article thumbnail

QNAP fixed NAS backup zero-day demonstrated at Pwn2Own Ireland 2024

Security Affairs

QNAP fixed critical zero-day CVE-2024-50388 which was demonstrated against a TS-464 NAS device during the Pwn2Own Ireland 2024 competition. QNAP addressed a critical zero-day vulnerability, tracked as CVE-2024-50388, which was exploited by white hat hackers against a TS-464 NAS device during the recent Pwn2Own Ireland 2024 hacking competition. The flaw is an OS command injection vulnerability in HBS 3 Hybrid Backup Sync , a remote attacker could exploit it to execute arbitrary code commands on

More Trending

article thumbnail

Google fixed a critical vulnerability in Chrome browser

Security Affairs

Google addressed a critical vulnerability in its Chrome browser, tracked as CVE-2024-10487, which was reported by Apple. Google has patched a critical Chrome vulnerability, tracked as CVE-2024-10487, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. The vulnerability is an out-of-bounds write issue that resides in the Dawn implementation.

Security 332
article thumbnail

This $99 Android phone is no Pixel 9 Pro, but performs better than handsets twice the price

Collaboration 2.0

Not everyone needs a $1,000 phone​. If you're on a tight budget or you're shopping for the kids, the NUU N10 is a truly impressive budget handset.

306
306
article thumbnail

Microsoft Warns of Ongoing Russian Intelligence Campaign

Data Breach Today

Russian SVR Targeting Government, Academia, Defense Organizations Globally A Russian-state hacking group is posing as Microsoft employees and sending malicious configuration files as email attachments to target organizations across the world. The campaign has the hallmarks of a Midnight Blizzard phishing campaign although its use of an RDP configuration file is novel.

Phishing 303
article thumbnail

M4 Mac Mini vs. M2 Mac Mini: Which Apple desktop should you buy?

Collaboration 2.0

Apple's new Mac Mini offers a big performance boost thanks to the M4 chipset, but is it enough to warrant a purchase?

IT 290
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

Delta Air Lines' IT Outage Lawsuit: CrowdStrike Countersues

Data Breach Today

Vendor Blames Delta's Outage Severity on Its 'Own Response and IT Infrastructure' CrowdStrike has countersued customer Delta Air Lines, accusing the airline of employing a lawsuit and seeking damages in "a desperate attempt to shift blame" for Delta's own IT inadequacies having exacerbated its outage, unlike "other major airlines" that quickly resumed operations.

IT 302
article thumbnail

I tested sleep earbuds made by ex-Bose engineers, and they worked like a charm

Collaboration 2.0

The Ozlo Sleepbuds, with their calming audio output and comforting fit, are the best sleep earbuds I've ever used.

290
290
article thumbnail

Career Advice: Cybersecurity Means Business

Data Breach Today

Understanding the Impact of Security on the Business Makes You More Effective With cybersecurity now embedded across all industries and functions, the importance of aligning security measures with business objectives has never been greater. Here’s why being business savvy is crucial in cybersecurity - and how you can cultivate it to become a more effective professional.

article thumbnail

We have an official open-source AI definition now, but the fight is far from over

Collaboration 2.0

Which of the three sides are you on?

274
274
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

Filigran Expands AI-Driven Threat Intel With $35M Series B

Data Breach Today

Insight Partners-Led Round Boosts US Growth, Fuels Threat Intelligence for Filigran Filigran’s $35 million Series B funding, led by Insight Partners, positions the company to scale its threat intelligence and proactive security capabilities while expanding its U.S. footprint. Plans include doubling the engineering team and strengthening breach and attack simulation capabilities.

Security 292
article thumbnail

Gen AI as a software quality tool? Skepticism is fading as more organizations implement it

Collaboration 2.0

IT pros' attitudes toward using generative AI as a quality assurance and testing vehicle have shifted significantly over the past 12 months, a new survey found.

IT 262
article thumbnail

CISA Opens Election War Room to Combat Escalating Threats

Data Breach Today

United States’ Top Cyber Defense Agency Mobilizes Nationwide Election Support Hub The director of the Cybersecurity and Infrastructure Security Agency said Wednesday the agency is establishing an election operations room to help counter foreign interference and support state officials amid escalating cyber and physical threats to the 2024 vote.

article thumbnail

Apple Watch lets you translate your conversations in real-time. Here's how

Collaboration 2.0

WatchOS 11's Translate app lets you have a live conversation in two languages with another person - right from your wrist.

259
259
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Do Leading AI Models Comply With the EU AI Act?

Data Breach Today

New Compliance Tool Say Many AI Firms Fail to Meet Security, Fairness Standards Large language models developed by Meta and Mistral AI are among a dozen artificial intelligence models that fail to meet the cybersecurity and fairness requirements of the European Union AI Act, which went into effect on Aug. 1, said developers of a new open-source AI evaluation tool.

article thumbnail

How to make LibreOffice look more like Microsoft Office

Collaboration 2.0

If you've been using Microsoft Office for years but want to switch to LibreOffice, here's how to get a more familiar UI to make the transition seamless.

259
259
article thumbnail

State Forces ENT Practice to Spend $2.25M on Better Security

Data Breach Today

NY AG Action and $1M Fine Follow Back-to-Back Hacks That Affected 224,500 in 2023 An upstate New York-based medical practice must spend $2.25 million to improve its data security practices over the next five years, plus pay state regulators up to a $1 million fine following an investigation into two ransomware attacks days apart in 2023 that affected nearly 224,500 people.

Security 286
article thumbnail

48% of people have been scammed while holiday shopping online - what to watch for

Collaboration 2.0

Almost half of Americans will do most of their holiday shopping between Black Friday and Cyber Monday. But that's also the busiest time of the year for scammers. Here's how to protect yourself.

257
257
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

New version of Android malware FakeCall redirects bank calls to scammers

Security Affairs

The latest FakeCall malware version for Android intercepts outgoing bank calls, redirecting them to attackers to steal sensitive info and bank funds. Zimperium researchers spotted a new version of the FakeCall malware for Android that hijacks outgoing victims’ calls and redirects them to the attacker’s phone number. The malware allows operators to steal bank users’ sensitive information and money from their bank accounts.

Phishing 246
article thumbnail

Can Apple's new AI photo 'Clean up' tool beat Google's Magic Editor? For some users, yes

Collaboration 2.0

On my iPhone, I used these rival tools to fix the busy backgrounds of some vacation pics. Compare the respective results here.

250
250
article thumbnail

Russia-linked Midnight Blizzard APT targeted 100+ organizations with a spear-phishing campaign using RDP files

Security Affairs

Microsoft warns of a new phishing campaign by Russia-linked APT Midnight Blizzard targeting hundreds of organizations. Microsoft warns of a large-scale spear-phishing campaign by Russia-linked APT Midnight Blizzard (aka APT29 , SVR group , BlueBravo , Cozy Bear , Nobelium , Midnight Blizzard , and The Dukes ), targeting 1,000+ users across 100+ organizations for intelligence gathering.

Phishing 246
article thumbnail

GitHub Copilot goes 'multi-model' with support for four new LLMs

Collaboration 2.0

The coding assistant is no longer OpenAI-exclusive. See what will be supported and when.

244
244
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Google fixed a critical vulnerability in Chrome browser

Security Affairs

Google addressed a critical vulnerability in its Chrome browser, tracked as CVE-2024-10487, which was reported by Apple. Google has patched a critical Chrome vulnerability, tracked as CVE-2024-10487, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. The vulnerability is an out-of-bounds write issue that resides in the Dawn implementation.

Security 246
article thumbnail

OpenAI's AI transcription tool hallucinates excessively - here's a better alternative

Collaboration 2.0

A researcher 'found hallucinations in eight out of every 10 audio transcriptions he inspected' from Whisper.

240
240
article thumbnail

Energizing business outcomes: How data-driven AI and cybersecurity shape the future of Energy & Utilities

CGI

The Energy and Utilities sector is undergoing rapid transformation, driven by decarbonization goals, changing consumer demands and technological advancements. In this changing environment, the sector is confronted with new market pressures, heightened competition, an increased risk of cyberattacks, and pricing pressures imposed by competition, governments and regulators.