Wed.Jun 19, 2024

article thumbnail

Perplexity Is a B t Machine

WIRED Threat Level

A WIRED investigation shows that the AI search startup Perplexity is surreptitiously downloading your data.

Security 363
article thumbnail

Google Chrome 126 update addresses multiple high-severity flaws

Security Affairs

Google released Chrome 126 update that addresses a high-severity vulnerability demonstrated at the TyphoonPWN 2024 hacking competition. Google has issued a Chrome 126 security update, addressing six vulnerabilities, including a flaw, tracked as CVE-2024-6100 which was demonstrated during the SSD Secure Disclosure’s TyphoonPWN 2024. TyphoonPWN is a live hacking competition held annually at TyphoonCon, an Offensive Security Conference in Seoul, South Korea.

Security 359
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK Pathology Lab Ransomware Attackers Demanded $50 Million

Data Breach Today

Russian-Speaking Gang Follows Typical Playbook; Critical Services Still Disrupted The ransomware attack that disrupted U.K. pathology services provider Synnovis, continuing to cause thousands of canceled and delayed operations and appointments across London, reportedly featured a $50 million ransom demand from attackers, backed by the typical threat to leak stolen data.

article thumbnail

Chip maker giant AMD investigates a data breach

Security Affairs

AMD announced an investigation after a threat actor attempted to sell data allegedly stolen from its systems. AMD has launched an investigation after the threat actor IntelBroker announced they were selling sensitive data allegedly belonging to the company. “We are aware of a cybercriminal organization claiming to be in possession of stolen AMD data,” the chip maker told media outlets. “We are working closely with law enforcement officials and a third-party hosting partner to i

article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

This Is What Would Happen if China Invaded Taiwan

WIRED Threat Level

The new book World on the Brink: How America Can Beat China in the Race for the 21st Century lays out what might actually happen if China were to invade Taiwan in 2028.

Security 286

More Trending

article thumbnail

Law Enforcement's Role in Remediating Ransomware Attacks

Data Breach Today

Different Countries Have Different Levels of Law Enforcement Involvement This year's Sophos State of Ransomware report reveals how reporting levels and official responses vary across 14 countries. The survey finds that reporting ransomware attacks is common, and victims almost always receive support as a result.

article thumbnail

Alleged researchers stole $3 million from Kraken exchange

Security Affairs

Alleged researchers have exploited a zero-day in Kraken crypto exchange to steal $3 million worth of cryptocurrency. Kraken Chief Security Officer Nick Percoco revealed that alleged security researchers exploited a zero-day flaw to steal $3 million worth of cryptocurrency. The researchers are refusing to return the stolen funds. Kraken Security Update: On June 9 2024, we received a Bug Bounty program alert from a security researcher.

Sales 339
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

The tectonic shift of network security is gaining momentum, yet this transformation continues to lag far behind the accelerating pace of change in the operating environment. Related: The advance of LLMs For at least the past decade, the cybersecurity industry has been bending away from rules-based defenses designed to defend on-premises data centers and leaning more into tightly integrated and highly adaptable cyber defenses directed at the cloud edge.

article thumbnail

Popular Chatbots Spout Russian Misinformation, Finds Study

Data Breach Today

OpenAI, Meta and 8 Other Chatbots Use Disinformation Network as Source Popular artificial intelligence chatbots are rife with Russian disinformation, warns NewsGuard, the rating system for news and information websites. The chatbots failed to recognize that sites such as "The Boston Times" or "The Houston Post" are Russian propaganda fronts.

article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

New Blog Moderation Policy

Schneier on Security

There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that I need to do something. My options are limited because I’m just one person, and this website is free, ad-free, and anonymous.

IT 126
article thumbnail

Making the Move From Tech Expert to Cybersecurity Leader

Data Breach Today

10 Practical Steps to Make Yourself Stand Out as 'Leadership Material' To obtain a leadership role, consistently show your commitment to the field, your willingness to help others and your ability to effectively communicate and solve problems. By doing so, you can build a reputation as a knowledgeable, proactive and reliable leader in cybersecurity.

article thumbnail

Happy 1st Birthday to Our KnowBe4 Community!

KnowBe4

Happy 1st birthday to our KnowBe4 Community! We’re so excited to celebrate our community's first anniversary. It’s been filled with so many wholesome moments and learning opportunities.

122
122
article thumbnail

Chinese Hackers Used Open-Source Rootkits for Espionage

Data Breach Today

UNC3886 Targeted Edge Devices for Persistence, Mandiant Says A suspected Chinese hacking group used open-source rootkits to ensure persistence on compromised edge devices such as VMware ESXi servers for espionage campaigns, Google Mandiant said. The hacking group, which Mandiant tracks as UNC3886, is likely a Chinese threat group hacking for Beijing.

173
173
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

How I organize my Slack workspaces with custom themes (and you can too)

Collaboration 2.0

Are your multiple Slack workspaces getting confusing? Here's how to differentiate them with custom themes.

100
100
article thumbnail

Ever Tried to Report a Scam on Facebook? Good Luck!

Data Breach Today

It's Time for Big Tech to Be Held Accountable for Rampant Online Fraud From account takeover threats to fake investment schemes, it doesn't take much time on social media to stumble upon a scam. But if you try to report these bad actors to social platforms such as Facebook, you may have a hard time doing so. On Facebook, "scam" or "fraud" aren't reporting options.

IT 162
article thumbnail

The Rise of Privacy-by-Design: APRA's Impact on Business Practices

Thales Cloud Protection & Licensing

The Rise of Privacy-by-Design: APRA's Impact on Business Practices josh.pearson@t… Thu, 06/20/2024 - 07:01 When it comes to privacy, the regulatory landscape in the US is a patchwork of laws, where individual states like California lead the way with regulations like its California Consumer Privacy Act (CCPA) and then followed it up with the expanded California Privacy Rights Act (CPRA).

Privacy 62
article thumbnail

Pentagon Cybersecurity, Workforce Woes Threaten Tech Rollout

Data Breach Today

New Report Says DOD Is Lagging in Procuring New Tech Amid Cybersecurity Failures The U.S. Department of Defense is struggling to rapidly test and deploy emerging technologies due to a series of cybersecurity and workforce challenges that hinder the Pentagon's process of acquiring weapon systems, according to a new Government Accountability Office report.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Guarding the grid: How utilities harness data to boost safety and productivity

OpenText Information Management

Throughout my career in the utilities industry, I’ve helped organizations to embrace change. I specialize in geographic information systems (GIS) , which is software that helps utilities manage location data and other asset information on a digital map. In the field, we rely on a team of people to answer the call and fix what's broken. Technology can help those teams respond even faster, especially during critical situations.

ECM 64
article thumbnail

Radiology Practice Hack Affects Sensitive Data of 512,000

Data Breach Today

Breach Is Latest Major Cyber Incident Reported by a Medical Imaging Provider A Minnesota-based radiology practice is notifying more than 500,000 individuals that their information was accessed and potentially acquired by hackers. The incident is one of several major health data breaches reported by radiologists in recent months as affecting hundreds of thousands of patients.