Tue.Dec 03, 2024

article thumbnail

Why Phishers Love New TLDs Like.shop,top and.xyz

Krebs on Security

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as.shop ,top ,xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees the domain name industry is moving forward with plans to introduce a slew of new gTLDs.

Phishing 261
article thumbnail

GoodRx Agrees to Pay $25M to Settle Web Tracker Lawsuit

Data Breach Today

Telehealth Firm Previously Paid $1.5M Fine to FTC for Similar Privacy Issues GoodRx has reached a $25 million preliminary settlement of proposed class action litigation alleging the telehealth company violated privacy and an assortment other laws and statues when it previously collected and shared consumers' information with third-parties through online tracking tools.

Privacy 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The key role static code analyzers play in detecting coding errors, eliminating flaws

The Last Watchdog

In the modern world of software development, code quality is becoming a critical factor that determines a project success. Errors in code can entail severe consequences. Related: The convergence of network, application security For example, vulnerabilities in banking applications can lead to financial data leaks, and errors in medical systems can threaten the health of patients.

Risk 200
article thumbnail

European Police Disrupts Matrix Encrypted Service

Data Breach Today

Platform Used for Drugs, Arms trafficking, and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Elevating Information Management: Shell's Journey to Maturity

AIIM

At Shell, we're on an exciting journey to raise our Information Management (IM) maturity. Our approach is twofold: we look externally at what others in the industry are doing, and we also focus internally on our own progress.

159
159

More Trending

article thumbnail

Microsoft ramps up pressure on users running Windows 11 on unsupported PCs

Collaboration 2.0

The company is threatening to add a watermark to the desktop of any unsupported PC running Windows 11.

137
137
article thumbnail

'Horns&Hooves' Malware Campaign Hits Over 1,000 Victims

Data Breach Today

Russian Threat Actor Delivers NetSupport RAT, BurnsRAT via Fake Requests A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf.

Retail 243
article thumbnail

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

WIRED Threat Level

A new proposal by the Consumer Financial Protection Bureau would use a 54-year-old privacy law to impose new oversight of the data broker industry. But first, the agency must survive Elon Musk.

Privacy 125
article thumbnail

China Is Outpacing US in Critical Tech Research Investments

Data Breach Today

Experts Warn China's Tech Rise Could Reshape Global Cybersecurity and Warfare China has surged past the United States in critical technology research, according to a recent report published by the Australian Strategic Policy Institute. Experts warn the shift could have profound global implications, including risks to U.S. cybersecurity, innovation and global leadership.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Energy industry contractor ENGlobal Corporation discloses a ransomware attack

Security Affairs

ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware attack disrupted the operations of a major energy industry contractor, ENGlobal Corporation. Founded in 1985, ENGlobal Corporation designs automated control systems for commercial and government sectors, reporting $6 million in Q3 revenue and $18.4 million year-to-date.

article thumbnail

New Section 1033 Push Banks to Provide Customers with “Financial SIM Card”

Data Breach Today

Authored by: Matt Kunkel, CEO, LogicGate The Consumer Financial Protection Bureau (CFPB) recently finalized a set of rules that would bring a similar level of convenience to the financial world. These changes to Section 1033 of the Dodd-Frank Act make it significantly easier for customers to retain access to their financial history no matter which bank they transact with.

Access 272
article thumbnail

He Got Banned From X. Now He Wants to Help You Escape, Too

WIRED Threat Level

When programmer Micah Lee was kicked off X for a post that offended Elon Musk, he didn't look back. His new tool for saving and deleting your X posts can give you that same sweet release.

Privacy 123
article thumbnail

Korean Firm Sold Satellite Receivers With DDoS Feature

Data Breach Today

Firm Allegedly Embedded DDoS at the Request of a Foreign Client A South Korean company exported 240,000 satellite receivers with distributed denial-of-service attack capabilities, leading to the arrest of its CEO by the Korean National Police Agency. The company and its employees face criminal prosecution for allegedly violating South Korea’s cybersecurity laws.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

News alert: Sweet Security releases its evolutionary Cloud Native Detection and Response platform

The Last Watchdog

Tel Aviv, Israel, Dec. 3, 2024, CyberNewswire — With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure Sweet Security today announced the release of its unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time.

Cloud 130
article thumbnail

Sixgen's Kyrus Acquisition Boosts National Cybersecurity

Data Breach Today

Buy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise Sixgen will enhance its cybersecurity operations through the purchase of Washington D.C.-area Kyrus. The move introduces reverse engineering and analytics expertise to Sixgen's portfolio, aligning with its mission to protect critical infrastructure and bolster American cyber defense capabilities.

article thumbnail

Why I pick this ultraportable Lenovo tablet over the iPad Air for multimedia consumption

Collaboration 2.0

The Lenovo Tab Plus proves big things come in small packages. It is an 11.5-inch tablet that houses a surprisingly powerful speaker system and 2K display.

IT 119
article thumbnail

Feds Propose AI 'Guardrails' for Medicare Advantage Plans

Data Breach Today

Provision Emphasizes Existing Medicare Regs for Equitable Access to Health Services The Centers for Medicare and Medicaid Services has issued proposed "guardrails" to help ensure that the use of artificial intelligence for Medicare Advantage insurance plans does not result in inequitable access to healthcare-related services. The proposed rule will go into effect in 2026.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2023-45727 North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability CVE-2024-11680 ProjectSend Improper Authentication Vulnerabil

IT 113
article thumbnail

I deleted thousands of tweets from X with this new tool - for free

Collaboration 2.0

Now you can easily migrate from X with this powerful tool that deletes tweets, likes, and DMs, while backing up your data for a fresh start elsewhere.

106
106
article thumbnail

Malicious Google Ads Target Users Seeking Solutions to Printer Problems

KnowBe4

Scammers are abusing Google ads to target users searching for help with printer problems, according to researchers at Malwarebytes.

Security 106
article thumbnail

Enterprises struggle with what to do with Gen AI, say venture capitalists

Collaboration 2.0

Despite some uncertainty, enterprise investments in applications soared eight-fold in 2024, with spending on AI-generated code leading the way.

article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

With Threats to Encryption Looming, Signal’s Meredith Whittaker Says ‘We’re Not Changing’

WIRED Threat Level

At WIRED’s The Big Interview event, the president of the Signal Foundation talked about secure communications as critical infrastructure and the need for a new funding paradigm for tech.

article thumbnail

The Samsung phone I recommend to most people is $100 off during post-Cyber Monday sales

Collaboration 2.0

While it doesn't flip, fold, or have a built-in S Pen stylus, the Galaxy S24 FE offers all the essentials at a relatively accessible price. Although Cyber Monday sales are over, deals for the phone are still live on Best Buy.

Sales 105
article thumbnail

CyberheistNews Vol 14 #49 [Heads Up] Bad Actor Uses Deepnude AI Image Generator to Lure And Infect Users

KnowBe4

CyberheistNews Vol 14 #49 [Heads Up] Bad Actor Uses Deepnude AI Image Generator to Lure And Infect Users

81
article thumbnail

Save big on a touchless vacuum this holiday season

Collaboration 2.0

Get an EyeVac touchless vacuum at 30% off for only $100, just in time for the holidays, with this lingering Cyber Monday deal.

104
104
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The ASA flaw CVE-2014-2120 is being actively exploited in the wild

Security Affairs

Cisco warns customers that a decade-old ASA vulnerability, tracked as CVE-2014-2120, is being actively exploited in the wild. Cisco warns that the decade-old ASA vulnerability CVE-2014-2120 is being actively exploited in attacks in the wild, and urges customers to review the updated advisory. The vulnerability resides in the WebVPN login page of Cisco Adaptive Security Appliance (ASA) Software, an unauthenticated, remote attacker could exploit the flaw to conduct a cross-site scripting (XSS) att

Security 120
article thumbnail

Global AI computing will use 'multiple NYCs' worth of power by 2026, says founder

Collaboration 2.0

AI computing will continue to soar with inference, requiring completely new multiple-gigawatt AI data centers.

103
103
article thumbnail

And the Winner of The Inside Man Biggest Fan Contest 2024 is…

KnowBe4

It’s been several weeks since the exciting premiere of The Inside Man - Season 6 in St. Petersburg, Fl. If you missed my post , I talked about this magical night where we released the latest blockbuster season of this award winning security awareness series.