Thu.Feb 01, 2024

article thumbnail

FTC Blasts Blackbaud's 'Shoddy' Practices in Ransomware Hack

Data Breach Today

FTC Is Latest Agency to Rebuke Fundraising Firm for Lax Security in 2020 Attack The Federal Trade Commission is the latest regulatory agency taking action against fundraising and customer relationship management software provider Blackbaud in the aftermath of a 2020 ransomware incident that compromised the data of tens of thousands of clients and millions of consumers.

article thumbnail

Arrests in $400M SIM-Swap Tied to Heist at FTX?

Krebs on Security

Three Americans were charged this week with stealing more than $400 million in a November 2022 SIM-swapping attack. The U.S. government did not name the victim organization, but there is every indication that the money was stolen from the now-defunct cryptocurrency exchange FTX , which had just filed for bankruptcy on that same day. A graphic illustrating the flow of more than $400 million in cryptocurrencies stolen from FTX on Nov. 11-12, 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: CIA Hacking Tool Leaker Gets 40 Years

Data Breach Today

Also: Cloudflare Was Hacked With Stolen Okta Token This week, former CIA programmer gets 40-year sentence, zero trust prevents widespread damage, possible ransomware attack in Georgia, alleged hacker detained in Ukraine, USB-spread malware in Italy, LockBit attack on non-bank home mortgage lender, and Ukrainian critical infrastructure disrupted.

article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Despite solid cybersecurity defenses within her enterprise, the reliance on age-old passwords left it vulnerable. Their own employees, even with their best efforts, remained the weakest link.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cryptohack Roundup: 2024's Biggest Heist - So Far

Data Breach Today

Also: US Courts Announce Guilty Pleas and Hand Out Sentences in Crypto-Linked Cases This week, a Ripple co-founder and a karaoke platform were hacked, Mexican crypto banks were targeted, authorities seized crypto in the U.S. and Germany, the DOJ made charges in crypto cases, people pleaded guilty to money laundering and SIM swapping, monero was traced, and FTX will not restart.

278
278

More Trending

article thumbnail

How Long Will FBI's 'Volt Tycoon' Router Interdiction Stick?

Data Breach Today

Volume of Poorly Secured, Legacy IoT That Can Be Turned Against Us Keeps Growing The FBI announcing that it has forcibly removed "KV Botnet" Chinese nation-state malware from "hundreds" of poorly secured SOHO routers across America highlights the risk posed by the growing volume of outdated IoT devices. The FBI's fix is temporary, and we need a more permanent solution.

IoT 278
article thumbnail

Man sentenced to six years in prison for stealing millions in cryptocurrency via SIM swapping

Security Affairs

A US man has been sentenced to federal prison for his role in a fraudulent scheme that resulted in the theft of millions of dollars through SIM swapping. Daniel James Junk (22) of Portland was sentenced to 72 months in federal prison for his role in a scheme that resulted in the theft of millions of dollars of cryptocurrency using a SIM swapping. The man conducted SIM swapping attacks to take control of victims’ phone numbers tricking the mobile operator employees into porting them to SIMs under

article thumbnail

Palo Alto Told to Pay Centripetal $150M for Patent Theft

Data Breach Today

Federal Court Says Palo Alto Networks Violated Centripetal's Patent Rights A federal jury said Wednesday that Palo Alto Networks directly violated another cybersecurity firm's patent rights for a "threat intelligence gateway" network security technology and awarded Centripetal Networks more than $150 million in the verdict.

article thumbnail

Multiple malware used in attacks exploiting Ivanti VPN flaws

Security Affairs

Mandiant spotted new malware used by a China-linked threat actor UNC5221 targeting Ivanti Connect Secure VPN and Policy Secure devices. Mandiant researchers discovered new malware employed by a China-linked APT group known as UNC5221 and other threat groups targeting Ivanti Connect Secure VPN and Policy Secure devices. The attackers were observed exploiting CVE-2023-46805 and CVE-2024-21887 to execute arbitrary commands on the unpatched Ivanti devices.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Okta Lays Off 400 Employees in Second Round of Dismissals

Data Breach Today

The Identity Provider Experienced a String of Embarrassing Cybersecurity Incidents Okta announced layoffs amounting to 7% of its workforce in a restructuring that will cost 400 employees their jobs. Thursday's disclosure is the second round of layoffs the company has undergone in the past 12 months. CEO Todd McKinnon said the cuts are needed to run Okta with "greater efficiency.

article thumbnail

CISA orders federal agencies to disconnect Ivanti VPN instances by February 2

Security Affairs

CISA is ordering federal agencies to disconnect Ivanti Connect Secure and Ivanti Policy Secure products within 48 hours. For the first time since its establishment, CISA is ordering federal agencies to disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products within 48 hours. The CISA’s emergency directive orders to disconnect all instances no later than 11:59PM on Friday February 2, 2024. “As soon as possible and no later than 11:59PM on Friday February 2,

article thumbnail

Uber Fined 10 Million Euros by Dutch Data Regulator

Data Breach Today

Ride-Hailing Company Fined for Inadequate Data Transparency Practices Under GDPR Uber must pay a fine of 10 million euros to the Dutch data protection authority after the agency found the ride-hailing app maker had not been transparent about how long it kept driver data and which employees outside of Europe had access to the data.

GDPR 277
article thumbnail

A Startup Allegedly ‘Hacked the World.’ Then Came the Censorship—and Now the Backlash

WIRED Threat Level

A loose coalition of anti-censorship voices is working to highlight reports of one Indian company’s hacker-for-hire past—and the legal threats aimed at making them disappear.

Security 111
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How 2023 Broke Long-Running Records for Health Data Breaches

Data Breach Today

What Will 2024 Be Like If the Healthcare Sector Doesn't Step Up? Thanks to the massive Anthem hack, for nearly a decade 2015 has been the record year for U.S. health data breaches - with 112.5 million people affected. But 2023 shattered that record, big-time. Will 2024 be another banner year for health data compromises?

article thumbnail

New Future Libraries project supports resilience and strategy in Public Libraries

CILIP

New Future Libraries project to support resilience and strategic growth in Public Libraries Future Libraries is a two-part initiative from CILIP to challenge and engage librarians and library leaders to reimagine libraries in a world of evolving living and working patterns in the context of a rapidly changing world. Part 1 is 'Come Rain or Shine: Preparing public libraries for the future in an age of uncertainty' that envisions the challenges and demands that public libraries will face from now

article thumbnail

Microsoft Teams: The New Phishing Battlefront - How Attackers Are Exploiting Trusted Platforms

KnowBe4

Attackers are abusing Microsoft Teams to send phishing messages, according to researchers at AT&T Cybersecurity.

Phishing 121
article thumbnail

Forging a framework for central bank digital currencies and tokenization of other financial assets

IBM Big Data Hub

Ever since the COVID-19 pandemic, cash usage has been decreasing worldwide and digital payments based on cryptocurrencies or legacy digital payment systems have prevailed. As a result, new forms of centrally managed digital currencies are emerging alongside cryptocurrencies like Bitcoin, the notorious volatility of which has challenged their acceptance worldwide.

Retail 90
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Mystery of the $400 Million FTX Heist May Have Been Solved

WIRED Threat Level

An indictment against three Americans suggests that at least some of the culprits behind the theft of an FTX crypto fortune may be in custody.

article thumbnail

Top concerns industry leaders have about cyberattacks in 2024 and beyond

IBM Big Data Hub

Cyberattacks are becoming increasingly sophisticated. Read about the concerns that industry leaders have for the future and three approaches organizations can take to build up their defenses. Cyber workforce shortage There are over four million unfilled cybersecurity jobs in the world today. Filling these vacancies has become a security imperative, and several global compliance mandates have been established to tackle the issue.

article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

ManagePlus—your journey before, with and beyond RISE with SAP

IBM Big Data Hub

RISE with SAP has not only been a major cloud player in recent years, it’s also become the standard cloud offering from SAP across different products. But when assessing what it takes to onboard into RISE with SAP, there are multiple points to consider. Especially important is a good understanding of the RACI split around Standard, Additional and Optional Services, along with relevant CAS (Cloud Application Service) packages.

Cloud 84
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Associated Press: "Grave peril of digital conspiracy theories."

KnowBe4

The AP published a great article. This is your executive summary: Conspiracy theories have always been part of American culture, but advanced technology is making them more persuasive and dangerous than ever before. This was evident after the devastating Maui wildfires last August, when doctored videos and images spread rapidly on social media platforms like TikTok and YouTube claiming the fires were deliberately set by the U.S. government using advanced energy weapons.

article thumbnail

Should large enterprises self-host their authoritative DNS?

IBM Big Data Hub

In a recent post , we outlined the pitfalls of self-hosted authoritative Domain Name System (DNS) from the perspective of a start-up or midsize company piecing together a DIY system using BIND DNS or other open source tools. The main idea was that every company gets to a point where they outgrow their self-hosted, home-grown authoritative DNS systems.

article thumbnail

81% of Underwriters Expect Cyber Insurance Premiums to Increase as Risk is Expected to Soar

KnowBe4

New outlook data from cyber insurance underwriters shows where they think the biggest threats will be in 2024… and what they think organizations.

article thumbnail

Unofficial Final Text of EU AI Act Released

Data Matters

On 22 January 2024, an unofficial version of the (presumed) final EU Artificial Intelligence Act (“ AI Act ”) was released. The AI Act reached political agreement early December 2023 (see our blog post here ) and had undergone technical discussions to finalize the text since. It was reported that the document was shared with EU Member State Representatives on 21 January 2024, ahead of a discussion within the Telecom Working Party, a technical body of the EU Council on 24 January 2024, and that f

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

NYC first to designate social media as environmental toxin via Axios

IG Guru

Check out the article here. The post NYC first to designate social media as environmental toxin via Axios first appeared on IG GURU.

Risk 79
article thumbnail

How to safeguard your data in a changing privacy landscape

OpenText Information Management

Data privacy is not a static concept. It evolves with the changing needs and expectations of consumers, businesses, and regulators. In 2023, we witnessed some major shifts in the data privacy landscape, such as the introduction of new laws and standards, the emergence of new technologies and threats, and the increased awareness and demand for … The post How to safeguard your data in a changing privacy landscape appeared first on OpenText Blogs.

Privacy 64
article thumbnail

The Messenger Deserved Its Demise. Its Staff? Not So Much

John Battelle's Searchblog

Well that didn’t go well. I predicted the death of Jimmy Finkelstein’s The Messenger as soon as I read about its impending launch back in March of last year. At the time I had just soft-landed The Recount and was licking three decades of wounds related to launching, running, selling and shuttering digital media startups. And lo! Here was a guy claiming he was going to solve all of digital media’s woes with…what exactly?

IT 59