Remove Education Remove IT Remove Retail Remove Tools
article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer in Brazil, Dimas Volvo, leaked sensitive files through its website. website, belonging to an independent Volvo retailer in the Santa Catarina region of Brazil.

Retail 91
article thumbnail

New Agent Raccoon malware targets the Middle East, Africa and the US

Security Affairs

The malware was used in attacks against multiple industries, including education, real estate, retail, non-profit organizations, telecom companies, and governments. The backdoor is written in.NET and leverages the domain name service (DNS) protocol to establish a covert communication channel with the command and control infrastructure.

Retail 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top GRC Tools & Software for 2021

eSecurity Planet

Data privacy regulations like the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) can be hard to navigate for businesses of any size, but GRC tools can simplify and streamline compliance with all of the requirements. Contents: Top GRC tools comparison. Top GRC tools comparison.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

Exclusive: Researchers dumped Gigabytes of data from Agent Tesla C2Cs

Security Affairs

Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data leakage. The majority of intercepted credentials by Agent Tesla related to financial services, online-retailers, e-government systems and personal and business e-mail accounts. .

article thumbnail

Conversational AI use cases for enterprises

IBM Big Data Hub

This class of AI-based tools, including chatbots and virtual assistants, enables seamless, human-like and personalized exchanges. The emergence of NLG has dramatically improved the quality of automated customer service tools, making interactions more pleasant for users, and reducing reliance on human agents for routine inquiries.

Analytics 103
article thumbnail

Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations

Security Affairs

“These operations have targeted various industries, including Aerospace & Defense, Education, Energy & Utilities, Governments, Hospitality, Manufacturing, Oil & Gas, Retail, Technology, and Transportation. . ” reads the joint report. ” concludes the report. . ” concludes the report.