Tue.Aug 13, 2024

article thumbnail

Six 0-Days Lead Microsoft’s August 2024 Patch Push

Krebs on Security

Microsoft today released updates to fix at least 90 security vulnerabilities in Windows and related software, including a whopping six zero-day flaws that are already being actively exploited by attackers. Image: Shutterstock. This month’s bundle of update joy from Redmond includes patches for security holes in Office ,NET , Visual Studio , Azure , Co-Pilot , Microsoft Dynamics , Teams , Secure Boot, and of course Windows itself.

Security 254
article thumbnail

FBI Seizes Servers Powering Dispossessor Ransomware Group

Data Breach Today

Feds Also File Criminal Complaint Against 'Brain,' Alleged Leader of the Operation The FBI said it led the disruption of a ransomware group called Dispossessor, aka Radar, that amassed victims in dozens of countries. An international dismantling of the group's alleged infrastructure seized servers in the U.S., the U.K. and Germany, as well as multiple domain names.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Started with Gen AI for Information Management

AIIM

AIIM research shows that many organizations feel ready for AI, but encounter obstacles to implementation, especially a lack of available use cases. Where do organization start with Generative AI (Gen AI)?

article thumbnail

Black Hat Fireside Chat: Here’s how ‘Active ASPM’ is helping to triage and remediate coding flaws

The Last Watchdog

Application Security Posture Management ( ASPM ) arose a few years ago as a strategy to help software developers and security teams continually improve the security of business applications. Related: Addressing rising cyber compliance pressures At Black Hat USA 2024, an iteration called Active ASPM is in the spotlight. I had the chance to visit with Neatsun Ziv , CEO and co-founder of Tel Aviv-based OX Security , a leading Active ASPM solutions provider.

Cloud 130
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

The Post-Quantum Cryptography Algorithms are finalized! Now what?

Thales Cloud Protection & Licensing

The Post-Quantum Cryptography Algorithms are finalized! Now what? josh.pearson@t… Tue, 08/13/2024 - 16:11 With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium), SLH-DSA (formerly SPHINCS+) and with it the imminent end-of-life of the encryption foundations we have relied upon for decades, many organizations are left wondering exactly what they should do next.

More Trending

article thumbnail

New York Attorney General Publishes Guide to Avoid “Key Mistakes” Regarding Online Tracking Technologies

Data Matters

On July 30, 2024, New York Attorney General Letitia James announced website privacy guides for New York consumers and businesses. The guides, a business-focused Business Guide to Website Privacy Controls and a consumer-focused Consumer Guide to Tracking on the Web , are available on the Office of the New York State Attorney General’s (the “OAG’s”) website.

Privacy 97
article thumbnail

A PoC exploit code is available for critical Ivanti vTM bug

Security Affairs

Ivanti warned of a critical authentication bypass flaw in its Virtual Traffic Manager (vTM) appliances that can allow attackers to create rogue administrator accounts. Ivanti addressed a critical authentication bypass vulnerability, tracked as CVE-2024-7593 (CVSS score of 9.8), impacting Virtual Traffic Manager (vTM) appliances that can allow attackers to create rogue administrator accounts.

article thumbnail

Reflecting on KnowBe4's 5th Consecutive TrustRadius Tech Cares Award

KnowBe4

For the fifth year in a row, we've been honored with the TrustRadius Tech Cares Award ! This recognition is a testament to our unwavering commitment to corporate social responsibility (CSR) and the incredible efforts of our team.

114
114
article thumbnail

Vulnerability Recap 8/12/24 – Old Vulnerabilities Unexpectedly Emerge

eSecurity Planet

It’s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn’t look like they’ve been exploited yet, threat actors may make a move now that the flaws have been publicized. The other major news — which could affect both businesses and individuals — is a zero-day vulnerability found in most major web browsers on both Mac and Linux machines.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Chameleon Malware Poses as CRM App

KnowBe4

Researchers at ThreatFabric warn that a phishing campaign is distributing the Chameleon Android malware by impersonating a Customer Relationship Management (CRM) app. The campaign is currently targeting users in Canada and Europe, but may expand to other regions.

Phishing 112
article thumbnail

Vulnerability Recap 8/13/24 – Old Vulnerabilities Unexpectedly Emerge

eSecurity Planet

It’s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn’t look like they’ve been exploited yet, threat actors may make a move now that the flaws have been publicized. The other major news — which could affect both businesses and individuals — is a zero-day vulnerability found in most major web browsers on both Mac and Linux machines.

article thumbnail

Summer Lovin' or Summer Scammin'?

KnowBe4

Summer. The season of sun, sand, and romance scams. As the weather heats up, so does the activity of romance scammers, who prey on the vulnerabilities of those seeking love and companionship.

article thumbnail

ChatGPT vs. Microsoft Copilot vs. Gemini: Which is the best AI chatbot?

Collaboration 2.0

AI chatbots are more popular than ever, but with new updates coming out every few months, how do you determine which one is the best?

98
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

[FREE RESOURCE KIT] 2024 Cybersecurity Awareness Month Kit Now Available

KnowBe4

Cyber risks abound, inside and out. Threats to your organization can come in many forms; from a suspicious email with a dodgy attachment to improperly stored sensitive information.

article thumbnail

Google Pixel 9 Pro Fold vs Samsung Galaxy Z Fold 6 - which foldable is best?

Collaboration 2.0

Google's new flagship foldable, the Pixel 9 Pro Fold, just dropped, and it's packed with new features. But how does it compare to Samsung's Z Fold 6? Let's break down the major differences.

IT 98
article thumbnail

Attackers Abuse Google Drawings to Host Phishing Pages

KnowBe4

Researchers at Menlo Security warn that a phishing campaign is exploiting Google Drawings to evade security filters.

Phishing 100
article thumbnail

How to preorder the Pixel Buds Pro 2

Collaboration 2.0

On Tuesday at the Made by Google event, Google unveiled the new Google Pixel Buds Pro 2 earbuds, along with new Pixel phones and watches. We've found the best places to preorder the latest earbuds.

98
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Webinar: Move or Manage: Determining When Manage-in-Place Makes Sense

IG Guru

Move or Manage: Determining When Manage-in-Place Makes Sense When: Thursday, Aug. 22 at 12 p.m. (noon) MT. Where: Register via Zoom HERE. The Manage in Place concept is gaining in popularity, but many questions remain about when it makes sense to use it, and when it doesn’t. This presentation will look at multiple record-keeping scenarios to come […] The post Webinar: Move or Manage: Determining When Manage-in-Place Makes Sense first appeared on IG GURU.

IT 86
article thumbnail

The best AI chatbots for programming, and a bunch that failed miserably

Collaboration 2.0

I've been subjecting AI chatbots to a set of real-world programming tests. Which chatbots handled the challenge and which crawled home in shame? Read on.

98
article thumbnail

AI-Powered Contract Management Firm Reports Strong Growth Amid Expanding Global Demand

Information Matters

Summize, a provider of AI-powered Contract Lifecycle Management (CLM) solutions, has reported record performance figures for its fiscal year ending June 30, 2024. The company achieved over 100% growth in Read more The post AI-Powered Contract Management Firm Reports Strong Growth Amid Expanding Global Demand appeared first on Information Matters - AI in the UK.

IT 52
article thumbnail

Gemini to replace Google Assistant as Android's default - but you still have options

Collaboration 2.0

Google's latest artificial intelligence innovation, Gemini, is replacing Google Assistant as the default voice assistant on Android smartphones, including its own Pixel 9 series.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

5 tendances émergentes du marché du contrôle d'accès physique en 2024

HID Global

Face à l'évolution rapide des technologies et des menaces de sécurité, comprendre les tendances émergentes dans les solutions de contrôle d’accès physique est essentiel pour prendre les bonnes décisions stratégiques. Clara Bardou, Directrice de marché, HID France, nous éclaire sur les perspectives issues de l’étude réalisée par IFSEC Global en partenariat avec HID.

52
article thumbnail

5 most beautiful Linux distributions: 'Equal parts user-friendly and eye candy'

Collaboration 2.0

I've tried almost every kind of distro - for pros or beginners, for aging PCs or Windows lovers. These are the best darn looking Linux options I've found. See what you think.

75
article thumbnail

CyberheistNews Vol 14 #33 Your Users Still Fall For Phishing Attacks Because of URL Shorteners

KnowBe4

CyberheistNews Vol 14 #33 Your Users Still Fall For Phishing Attacks Because of URL Shorteners

article thumbnail

Google Pixel Watch 3: Key specs, features, price, and everything else you need to know

Collaboration 2.0

Google just unveiled the Pixel Watch 3, its latest smartwatch with a host of hardware updates and a 45mm watch size (finally). Here are some answers to the most commonly asked questions.

IT 92
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

5 things to consider during app rationalization

Jamf

Learn how application rationalization can streamline your IT, reduce costs and improve efficiency. Discover how to optimize your application portfolio with Jamf.

IT 40
article thumbnail

Google Pixel Watch 3 vs. Samsung Galaxy Watch 7: Which Android smartwatch is best for you?

Collaboration 2.0

Both of these new Google Wear OS smartwatches offer a similar software experience, but Google's and Samsung's optimizations set them apart.

97
article thumbnail

Mary Pickford’s 1953 Savings Bond Tour

Unwritten Record

Mary Pickford Departure, Union Station, Los Angeles, March 23, 1953. Local Identifier Number: 56-MP-12 Mary Pickford—born in Canada as Gladys Louise Smith—started her career in the American film industry at the turn of the century. As she rose to fame, she became known as “America’s Sweetheart” through her work in silent films. She was one of the most popular actresses through the 1910s and 1920s.