Tue.Jul 09, 2024

article thumbnail

US Busts Russian AI-Driven Disinformation Operation

Data Breach Today

Meliorator Software Generates Social Media Bots U.S. federal authorities seized two web domains they said supported an artificial intelligence-driven disinformation network run by the Russian domestic intelligence agency and affiliates of a state-run propaganda broadcaster. Authorities searched nearly 1,000 accounts on social media platform X.

article thumbnail

Microsoft Patch Tuesday, July 2024 Edition

Krebs on Security

Microsoft Corp. today issued software updates to plug at least 139 security holes in various flavors of Windows and other Microsoft products. Redmond says attackers are already exploiting at least two of the vulnerabilities in active attacks against Windows users. The first Microsoft zero-day this month is CVE-2024-38080 , a bug in the Windows Hyper-V component that affects Windows 11 and Windows Server 2022 systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Million People Affected by Debt Collector Data Theft Hack

Data Breach Today

Stolen Data Includes Patient Medical Information, According to Breach Notification A Pennsylvania-based debt collector originally told regulators in April that a hacker compromised the personal identifiable information of 1.9 million people. Now the company says the data breach affected more than 4 million people and included patient medical information.

article thumbnail

AI and Information Management: Navigating the Intersection of Human Input and Technology

AIIM

As a former Jeopardy Champion, I've experienced firsthand the importance of memorizing and recalling vast amounts of information. This skill set has not only served me well on the game show but has also informed my perspective on the relationship between human input and artificial intelligence (AI) in the realm of information management.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cryptocurrency Theft Haul Surges Alongside Crypto Value

Data Breach Today

Private Key and Seed Phrase Compromise Remains Top Attack Vector, TRM Labs Reports Heists perpetrated by cryptocurrency-targeting hackers netted twice as much in stolen proceeds in the first half of 2024 as they did in the first half of 2023, as the overall rise in crypto's value appears to be drawing increased hacker focus, said blockchain intelligence platform TRM Labs.

More Trending

article thumbnail

Evolve Discloses That Hackers Stole Data of 7.6M Individuals

Data Breach Today

Stolen Data Includes Names, Social Security and Bank Account Numbers, Contact Info Evolve Bank & Trust disclosed that hackers stole the data of more than 7.6 million individuals in an incident detected in May. The Arkansas firm has been in incident disclosure mode for weeks now, following Evolve's listing on the LockBit leak site in late June.

Security 189
article thumbnail

Avast released a decryptor for DoNex Ransomware and its predecessors

Security Affairs

Avast developed and released a decryptor for the DoNex ransomware family that allows victims to recover their files for free. Avast researchers identified a cryptographic flaw in the DoNex ransomware and its predecessors that allowed them to develop a decryptor. The experts revealed the weakness during the Recon 2024 conference. Avast also released a decryptor that allows victims to recover their files for free since March 2024. “All brands of the DoNex ransomware are supported by the decr

article thumbnail

What Kind of People Do Cybersecurity for a Living?

Data Breach Today

What kind of people do cybersecurity for a living? In the past, there was a formula potential practitioners followed, but today there are many ways to get into the field and having people from diverse backgrounds is valued. The Curry brothers discuss the cybersecurity profession.

article thumbnail

Amazon-Related Scams Spike Ahead of Prime Day

KnowBe4

Researchers at Check Point observed more than a thousand newly registered malicious or suspicious web domains related to Amazon last month. The criminals are likely gearing up to target users during Amazon Prime Day next week.

Phishing 122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Senate NDAA 2025 Boosts Military Cyber and AI Initiatives

Data Breach Today

Military Omnibus Bill Includes Focus on Cybersecurity, Countering Drone Technology The Senate Armed Services Committee's fiscal year 2025 National Defense Authorization Act includes a significant focus on military cyber preparedness, with plans to develop capabilities to prevent threats from drones, as well as investments in quantum and artificial intelligence research.

Military 182
article thumbnail

Travelers Beware: Booking.com Warns of Increases in AI-Enabled Travel Scams

KnowBe4

In an interview at the Collision technology conference in Toronto, Booking.com’s CISO sounds the alarm on what she calls “supercharged artificial intelligence (AI) scams.

article thumbnail

What Will Drive the Use of Faster Payments in the US?

Data Breach Today

Faster Payments Council's Reed Luhtanen on the Importance of Well-Defined Practices Awareness of instant payments has grown significantly in the U.S. payments ecosystem since the launch of FedNow last July. Many banks have signed up for FedNow, but transaction volumes remain low because only the receive mode was activated, said Reed Luhtanen of the U.S.

173
173
article thumbnail

New Phishing Platform Targets Microsoft 365 Accounts at Financial Firms

KnowBe4

Analysis of the latest phishing-as-a-service (PhaaS) platform - called ONNX Store – highlights just how intricate - and successful.

Phishing 118
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Reverse-Engineering Ticketmaster’s Barcode System

Schneier on Security

Interesting : By reverse-engineering how Ticketmaster and AXS actually make their electronic tickets, scalpers have essentially figured out how to regenerate specific, genuine tickets that they have legally purchased from scratch onto infrastructure that they control. In doing so, they are removing the anti-scalping restrictions put on the tickets by Ticketmaster and AXS.

109
109
article thumbnail

Phishing Attacks Target High Profile YouTube Accounts

KnowBe4

Researchers at ESET warn of phishing attacks that are attempting to hack high-profile YouTube channels in order to spread scams or malware.

Phishing 117
article thumbnail

Samsung Galaxy Ring: Features, price, launch date, and everything else we know

Collaboration 2.0

As we expect Samsung to launch its Galaxy Ring during its summer Unpacked event, new details about the device emerge. Here's everything we know so far.

IT 98
article thumbnail

The Importance of Security Culture: When Telecom Giants Resort to Malware

KnowBe4

I recently read a story about a South Korean telecom company that pushed out malware to over 600,000 of its customers who were using torrents to share files, in a bid to limit their file-sharing capabilities.

Security 113
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Samsung Galaxy Watch Ultra: The best specs, features, and everything else we know

Collaboration 2.0

The Galaxy Watch Ultra is expected to follow in Apple's footsteps as a premium wearable with a rugged build, tailored for extreme sports.

98
article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

GDPR Article 28 Contracts: What You Need to Know

IT Governance

An overlooked GDPR requirement AND a business enabler Andy Snow has trained thousands of people on the GDPR (General Data Protection Regulation). So, he’s a good person to ask about what areas people find challenging. His response? “The data-sharing aspects of contracts.” As a trainer , Andy regularly receives praise for his engaging delivery style, bringing the subject matter to life with real-world examples.

GDPR 91
article thumbnail

CyberheistNews Vol 14 #28 [Urgent Alert] 5 Critical Steps to Shield Your Teens from Rising Sextortion

KnowBe4

[Urgent Alert] 5 Critical Steps to Shield Your Teens from Rising Sextortion

87
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CILIP writes to Secretary of State, Lisa Nandy

CILIP

CILIP writes to new Secretary of State, Lisa Nandy Image of Lisa Nandy, Secretary of State. CILIP Chief Executive Louis Coiffait-Gunn has written to Secretary of State Lisa Nandy MP to highlight the vital role libraries play in our democracy. Louis is writing on behalf of CILIP to relevant appointees in the new government, as well as to all incoming MPs as they settle into their roles.

article thumbnail

The best tablets of 2024: Expert tested and reviewed

Collaboration 2.0

We reviewed the top tablets from Apple, Samsung, Amazon, and more to help you choose the best one for your needs.

76
article thumbnail

Text Mining Frees Customer Insights Trapped in Unstructured Content

OpenText Information Management

In a perfect world, every customer would fill out a monthly survey so businesses could easily quantify their experiences. In the real world, things are decidedly messier. Text conveys nuance that numbers simply can’t Customers are constantly dropping clues as to how they are feeling about the brands they do business with, sharing sentiment, emotion, opinions, and intent in emails, chatbots, social media posts, online review sites, and other hard-to-analyze places.

Mining 72
article thumbnail

The best smart rings of 2024: Expert tested and reviewed

Collaboration 2.0

Samsung is releasing its Galaxy Ring this week, but before the new ring gets all the buzz, we've tested the best smart rings you can buy right now.

IT 76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

No more chasing paper trails – capture all your financial fax with digital precision

OpenText Information Management

The financial services sector, long rooted in traditional methods and complex operations, is experiencing a dramatic transformation. As paper-based processes give way to digital solutions, one area seeing remarkable change is digital fax and capture. Forget the outdated image of clunky fax machines—today’s digital fax and capture offer a sleek, efficient, and secure way to manage information in the modern financial world.

Paper 64
article thumbnail

How to use Copilot Pro to write, edit, and analyze your Word documents

Collaboration 2.0

Here's how to call on Microsoft's Copilot Pro to assist you with your Microsoft Word documents.

75
article thumbnail

Series intro – The rise of the threat hunter

OpenText Information Management

In the ever-evolving landscape of cyber threats, where automated systems and AI stand as the first line of defense, there exists a critical yet often underappreciated layer of security: the human threat hunter. These vigilant guardians delve deep into device logs and theoretical attacks to uncover hidden dangers and fortify our defenses against relentless threats.