Mon.Jan 29, 2024

article thumbnail

SolarWinds Requests Court Dismiss Regulator's Fraud Case

Data Breach Today

Calls Securities and Exchange Commission's Cybersecurity Allegations 'Unfounded' Network monitoring software vendor SolarWinds moved to dismiss a federal lawsuit accusing the company and its CISO of securities fraud after they allegedly misstated the efficacy of its cybersecurity controls. Russian intelligence hacked the company in an incident disclosed in 2020.

article thumbnail

Mercedes-Benz accidentally exposed sensitive data, including source code

Security Affairs

Researchers discovered that Mercedes-Benz accidentally left a private key online exposing internal data, including the company’s source code. RedHunt Labs researchers discovered that Mercedes-Benz unintentionally left a private key accessible online, thereby exposing internal data, including the company’s source code. It’s unclear if the data leak exposed customer data, RedHunt Labs shared its findings with TechCrunch and with the help of the media outlet notified the car maker.

Access 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Italian Regulator Again Finds Privacy Problems in OpenAI

Data Breach Today

ChatGPT Maker Has 30 Days to Respond ChatGPT maker OpenAI has 30 days to respond to the Italian data regulator after an investigation by the agency concluded the company apparently had violated European privacy laws. Europe is preparing to implement a comprehensive regulation on artificial intelligence.

Privacy 281
article thumbnail

NSA buys internet browsing records from data brokers without a warrant

Security Affairs

The U.S. National Security Agency (NSA) admitted to buying internet browsing records from data brokers to monitor Americans’ activity online without a court order. U.S. Senator Ron Wyden, D-Ore., released documents that confirmed the National Security Agency (NSA) buys Americans’ internet browsing records without a court order. The data acquired by the intelligence agency can reveal the websites visited by the US citizens and what apps they use.

Metadata 143
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity Incident Shuts Down New Jersey Schools

Data Breach Today

Thousands of Students Forced to Stay Home Amid Cybersecurity Incident A school district in Freehold Township, New Jersey was forced to close its schools and offices for thousands of students Monday after suffering a cybersecurity incident that caused technical difficulties across its network environment, administrators said.

More Trending

article thumbnail

Insurance Broker Notifying 1.5 Million of Health Info Hack

Data Breach Today

California Firm Said August Attack Affected Clients' Data A California insurance broker that handles employee benefits, workers' compensation and property liability is notifying more than 1.5 million individuals about a ransomware/data exfiltration attack last August that involved health insurance information, passport numbers and Social Security numbers.

Insurance 263
article thumbnail

Ukraine’s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’

Security Affairs

Ukraine’s security service (SBU) detained an alleged member of the pro-Russia hacker group “the Cyber Army of Russia.” Ukraine’s security service, the SBU, announced that it has identified and detained an alleged member of the pro-Russia hacker group known as the Cyber Army of Russia. The news was first reported by The Record Media.

Military 141
article thumbnail

US Lawmakers Tell DOJ to Quit Blindly Funding ‘Predictive’ Police Tools

WIRED Threat Level

Members of Congress say the DOJ is funding the use of AI tools that further discriminatory policing practices. They're demanding higher standards for federal grants.

article thumbnail

Bravo Host Andy Cohen Scammed Out of a “Sizable” Amount of Money by Fraudsters Posing as the Bank

KnowBe4

Bravo host Andy Cohen tells how he became the victim of an impersonation scam that gave scammers access to and control over his bank account.

Access 124
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Executives Hacked

Schneier on Security

Microsoft is reporting that a Russian intelligence agency—the same one responsible for SolarWinds—accessed the email system of the company’s executives. Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and

Passwords 122
article thumbnail

Malvertising Targets Chinese-Speaking Users

KnowBe4

Researchers at Malwarebytes warn that a malvertising campaign is targeting Chinese-speaking users with phony ads for encrypted messaging apps. The ads impersonate apps that are restricted in China, such as Telegram or LINE.

article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

I've always thought of it a bit like baseball cards; a kid has a card of this one player that another kid is keen on, and that kid has a card the first one wants so they make a trade. They both have a bunch of cards they've collected over time and by virtue of existing in the same social circles, trades are frequent, and cards flow back and forth on a regular basis.

article thumbnail

Forget Deepfake Audio and Video. Now There’s AI-Based Handwriting!

KnowBe4

Researchers have developed AI technology that can mimic someone’s handwriting with only a few paragraphs of written content. Experts worry about the possibility of misuse.

Security 119
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Dashlane 2024

eSecurity Planet

Dashlane is a password management software that’s popular for business and personal uses alike. The company was founded in 2009, and the first software edition was released in 2012. Like many other password managers, Dashlane makes it easy for users to create new passwords and store existing ones in a secure vault. Internet security best practices mandate unique credentials for each online account; doing so would be impossible without a solid password manager like Dashlane.

Passwords 109
article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from January 2024

KnowBe4

Check out the January updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

How does data deduplication work?

IBM Big Data Hub

Recent years have witnessed an explosion in the proliferation of self-storage units. These large, warehouse units have sprung up nationally as a booming industry because of one reason—the average person now has more possessions than they know what to do with. The same basic situation also plagues the world of IT. We’re in the midst of an explosion of data.

article thumbnail

Scammers Use Airdrops to Lure Users With Phony NFTs

KnowBe4

Researchers at Check Point warn that scammers are using airdrops to distribute phony n on-fungible tokens ( NFTs) that direct users to malicious sites.

Phishing 117
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

A New Book, “Tomorrow’s Jobs Today,” Reveals Insights Into ChatGPT, Blockchain, AI

Information Governance Perspectives

Tomorrow’s Jobs Today on Audible With AI tools like ChatGPT dramatically transforming global labor markets, this book teaches ambitious new graduates and job seekers to embrace disruption in the information age and take advantage of rare opportunities emerging in an era defined by uncertainty. Silicon Valley, CA., January 29th, 20234/PRNewswire-PRWeb/ — JIA Publishing proudly offers the follow-up edition of Tomorrow’s Jobs Today , now available in bookstores everywhere.

article thumbnail

Identify Weak User Passwords With KnowBe4’s Enhanced Weak Password Test

KnowBe4

Passwords are part of every organization’s security risk profile. Just one weak password with access to an organization’s critical systems can cause a breach, take down a network or worse. Whether we like it or not, passwords are here to stay as a form of authentication.

Passwords 111
article thumbnail

VulnRecap 1/29/24 – Apple, Apache & VMware Under Attack

eSecurity Planet

In this week’s urgent updates, Apple and VMware issued updates for zero-day flaws currently under attack, and researchers detected a rise in attacks on unpatched Apache and Atlassian Confluence servers. Meanwhile, the release of proof-of-concept code starts the countdown to attack on other critical vulnerabilities, including Cisco Enterprise Communication, Fortra GoAnywhere, and GitLab.

article thumbnail

The AI Assistant for everyone: watsonx Orchestrate combines generative AI and automation to boost productivity

IBM Big Data Hub

What if employees had the ability to effortlessly delegate time-consuming tasks, access information seamlessly through simple inquiries, and tackle complex projects within a single, streamlined application? What if customers had access to an intelligent, friendly virtual agent to provide answers and enable self-service experiences around the clock? This technological revolution is now possible, thanks to the innovative capabilities of generative AI powered automation.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Upcoming Webinars via Informata

IG Guru

Upcoming Industry Meetings and Webinars – January 16-February 15, 2024 The post Upcoming Webinars via Informata first appeared on IG GURU.

article thumbnail

Business continuity vs. disaster recovery: Which plan is right for you?

IBM Big Data Hub

Business continuity and disaster recovery plans are risk management strategies that businesses rely on to prepare for unexpected incidents. While the terms are closely related, there are some key differences worth considering when choosing which is right for you: Business continuity plan (BCP): A BCP is a detailed plan that outlines the steps an organization will take to return to normal business functions in the event of a disaster.

article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

How 5G Operators Can Prepare for The Quantum Era madhav Tue, 01/30/2024 - 05:25 The Quantum State of Play in 5G Quantum computing has found theoretical application in modern computation systems, including cellular networks like 5G. However, privacy and data security concerns are set to play a vital role as new vendors and technologies emerge to capitalize on 5G capabilities.

Risk 71
article thumbnail

Digital transformation examples

IBM Big Data Hub

A digital transformation is an overhauled, digital-first approach to how a business is run. The digital world is evolving quickly with new products and digital technologies that require vigorous digital transformation initiatives. The main goal of a digital transformation is to use new digital technologies throughout all aspects of a business and improve business processes.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

What’s new in OpenText Business Network Cloud

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes exciting updates to the OpenText™ Business Network Cloud. Check out the latest updates below. January 2024: What’s new in OpenText Business Network Cloud Edition 24.1? AI-Assisted Process Automation for Trading Partner Set-up OpenText is the leader in information management. OpenText Cloud Editions (CE) equips organizations with … The post What’s new in OpenText Business Network Cloud appeared first on OpenText Blogs.

Cloud 64
article thumbnail

The blueprint for a modern data center 

IBM Big Data Hub

Part one of this series examined the dynamic forces behind data center retransformation. Now, we’ll look at designing the modern data center, exploring the role of advanced technologies, such as AI and containerization, in the quest for resiliency and sustainability. Strategize and plan for differentiation As a leader, you need to know where you want to take the business—understanding the trajectory of your organization is nonnegotiable.

Cloud 64
article thumbnail

California EDD Prepaid Debit Card SMISHING Scam

PerezBox

This morning I received a text message informing me that my California EDD Prepaid Debit Card was being suspended with a deposit of $6,390 until I verified my Bank of America credit card: If you don’t live in California, this screams scam; but if you live in California and work with the CA EDD this… The post California EDD Prepaid Debit Card SMISHING Scam appeared first on PerezBox.