Sat.Nov 16, 2024 - Fri.Nov 22, 2024

article thumbnail

Fintech Giant Finastra Investigating Data Breach

Krebs on Security

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of the security incident after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company.

article thumbnail

Increased GDPR Enforcement Highlights the Need for Data Security

Security Affairs

GDPR protects sensitive data like health and financial details, and its enforcement underscores the growing need for stronger data security measures. GDPR: The landscape of data privacy and protection has never been more critical. With regulators around the world intensifying scrutiny, companies are facing increasing pressure to comply with stringent data protection laws.

GDPR 323
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

WIRED Threat Level

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Security 363
article thumbnail

AI transformation is the new digital transformation. Here's why that change matters

Collaboration 2.0

Your boss has read about the power of generative AI and wants you to stop dithering about potential risks and start delivering results.

article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

Zero Days Top Cybersecurity Agencies' Most-Exploited List

Data Breach Today

Cybersecurity Officials Urge to Prioritize Fixing These 15 Most-Exploited Flaws Which vulnerabilities need fixing first to best block nation-state and other hacking attempts? Enter the latest Five Eyes intelligence partnership list of the 15 flaws most targeted by attackers, of which 11 were zero-days. Many organizations have yet to patch them all.

More Trending

article thumbnail

Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany

WIRED Threat Level

More than 3 billion phone coordinates collected by a US data broker expose the detailed movements of US military and intelligence workers in Germany—and the Pentagon is powerless to stop it.

Military 363
article thumbnail

AI just gave us the Star Trek farewell we always wanted - watch it here

Collaboration 2.0

William Shatner and Leonard Nimoy reunite in a powerful short film using AI and deepfake technology to give fans the emotional farewell they deserve.

IT 351
article thumbnail

Closer to the Edge: Hyperscaling Have I Been Pwned with Cloudflare Workers and Caching

Troy Hunt

I've spent more than a decade now writing about how to make Have I Been Pwned (HIBP) fast. Really fast. Fast to the extent that sometimes, it was even too fast: The response from each search was coming back so quickly that the user wasn’t sure if it was legitimately checking subsequent addresses they entered or if there was a glitch. Over the years, the service has evolved to use emerging new techniques to not just make things fast, but make them scale more under load, increase avail

article thumbnail

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

Security Affairs

T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it was hacked as part of a long-running cyber espionage campaign targeting Telco companies. Recently, the FBI and CISA announced they are continuing to investigate a large-scale cyber-espionage campaign by China-linked threat actors targeting U.S. telecoms, compromising networks to steal call records and access private communications, mainly of governme

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

China’s Surveillance State Is Selling Citizen Data as a Side Hustle

WIRED Threat Level

Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online—no questions asked.

Marketing 351
article thumbnail

I replaced my M1 MacBook Pro with a base model M4 - and it blew my $3,000 laptop away

Collaboration 2.0

Apple's flagship M4 laptops won't wow you with flashy features or fresh designs, but they're almost so polished that you can't complain.

IT 337
article thumbnail

Oklahoma Hospital Says Ransomware Hack Hits 133,000 People

Data Breach Today

Incident Is Among Growing List of Attacks on Small, Rural Hospitals An Oklahoma hospital quickly restored its IT systems after a ransomware attack in September, but the 62-bed hospital could not recover some data and later learned that hackers may have accessed the personal information of 133,000 people. The attack is the latest involving a small rural hospital.

article thumbnail

China-linked actor’s malware DeepData exploits FortiClient VPN zero-day

Security Affairs

Chinese threat actors use custom post-exploitation toolkit ‘DeepData’ to exploit FortiClient VPN zero-day and steal credentials. Volexity researchers discovered a vulnerability in Fortinet’s Windows VPN client that China-linked threat actor BrazenBamboo abused in their DEEPDATA malware. BrazenBamboo is known to be the author of other malware families, including LIGHTSPY , DEEPDATA, and DEEPPOST.

Passwords 297
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Inside the Booming ‘AI Pimping’ Industry

WIRED Threat Level

AI-generated influencers based on stolen images of real-life adult content creators are flooding social media.

Privacy 334
article thumbnail

How to create a podcast with AI in seconds: Easy, step-by-step instructions

Collaboration 2.0

Using PDFs, text files, or audio files, Google's NotebookLM tool can generate a podcast episode that sounds just like two real people discussing your topic. We'll walk you through exactly how it's done.

IT 317
article thumbnail

US Cyber Force Surges Global Operations Amid Rising Threats

Data Breach Today

US Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024 A secretive U.S. military unit has surged its support to partner nations across the globe in 2024 while combatting escalating threats from foreign adversaries like China and North Korea, a top official from Cyber Command told the Cyberwarcon summit on Friday.

Military 280
article thumbnail

Apple addressed two actively exploited zero-day vulnerabilities

Security Affairs

Apple released security updates for iOS, iPadOS, macOS, visionOS, and Safari browser to address two actively exploited zero-day flaws. Apple released security updates for two zero-day vulnerabilities, tracked as CVE-2024-44309 and CVE-2024-44308, in iOS, iPadOS, macOS, visionOS, and Safari web browser, which are actively exploited in the wild. The vulnerability CVE-2024-44309 is a cookie management issue in WebKit that could lead to a cross-site scripting (XSS) attack when processing malicious w

Security 289
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist

WIRED Threat Level

Plus: An “AI granny” is wasting scammers’ time, a lawsuit goes after spyware-maker NSO Group’s executives, and North Korea–linked hackers take a crack at macOS malware.

Privacy 277
article thumbnail

Update your iPhone, iPad, and Mac now to patch these serious zero-day security flaws

Collaboration 2.0

The emergency updates resolve two zero-day flaws that may have already been exploited in the wild.

Security 312
article thumbnail

How Advances in Cloud Security Help Future-Proof Resilience

Data Breach Today

Embracing Zero Trust and AI in Cloud Security Zero trust, artificial-intelligence-driven security and automation tools are reshaping how organizations maintain uptime, even during a cyberattack. These advances underscore how the future of enterprise resilience is increasingly tied to advancements in cloud security.

Cloud 277
article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

The U.S. Justice Department charged five suspects linked to the Scattered Spider cybercrime gang with wire fraud conspiracy. The U.S. Justice Department charged five alleged members of the cybercrime gang Scattered Spider (also known as UNC3944 , 0ktapus ) with conspiracy to commit wire fraud. “Law enforcement today unsealed criminal charges against five defendants who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee cr

Phishing 273
article thumbnail

Maximizing Profit and Productivity: The New Era of AI-Powered Accounting

Speaker: Yohan Lobo and Dennis Street

In the accounting world, staying ahead means embracing the tools that allow you to work smarter, not harder. Outdated processes and disconnected systems can hold your organization back, but the right technologies can help you streamline operations, boost productivity, and improve client delivery. Dive into the strategies and innovations transforming accounting practices.

article thumbnail

Meta Finally Breaks Its Silence on Pig Butchering

WIRED Threat Level

The company gave details for the first time on its approach to combating organized criminal networks behind the devastating scams.

IT 271
article thumbnail

These durable bone-conduction headphones sound just as good models twice its price

Collaboration 2.0

Although Raycon's bone-conducting headphones aren't the best-sounding devices on the market, they offer solid water resistance, a good battery life, and three EQ settings.

Marketing 309
article thumbnail

Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime

Data Breach Today

FBI Ties Suspects to at Least 45 Attacks and Theft of Cryptocurrency Worth Millions The U.S. government on Wednesday unsealed criminal charges against five suspected members of the "loosely organized, financially motivated cybercriminal group" Scattered Spider. The suspects have been tied to 45 attacks, disrupting businesses and stealing cryptocurrency worth millions of dollars.

article thumbnail

Russian Phobos ransomware operator faces cybercrime charges

Security Affairs

Russian Phobos ransomware operator Evgenii Ptitsyn, accused of managing attacks, was extradited from South Korea to the US to face cybercrime charges. Russian Phobos ransomware operator Evgenii Ptitsyn, suspected of playing a key role in the ransomware operations, was extradited from South Korea to the US to face cybercrime charges. According to the DoJ, the Phobos ransomware operation targeted over 1,000 public and private entities in the United States and worldwide, extorting more than $16 mil

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

ICE Can Already Sidestep Sanctuary City Laws Through Data-Sharing Fusion Centers

WIRED Threat Level

Built to combat terrorism, fusion centers give US Immigration and Customs Enforcement a way to gain access to data that’s meant to be protected under city laws limiting local police cooperation with ICE.

Access 267
article thumbnail

OpenAI updates GPT-4o, reclaiming its crown for best AI model

Collaboration 2.0

If you use ChatGPT for writing, you'll be happy to hear this.

IT 306
article thumbnail

CISA Red Team Finds Alarming Critical Infrastructure Risks

Data Breach Today

Red Team Finds Vulnerabilities in Critical Infrastructure Org’s Security Framework The U.S., cyber defense agency is urging critical infrastructure operators to learn from the experience of a volunteer read teaming test and not rely too heavily on host-based endpoint detection and response solutions at the expense of network layer protections.

Risk 274