Thu.Sep 12, 2024

article thumbnail

Breach Roundup: Mexico in Hacker Spotlight

Data Breach Today

Also: Critical WHOIS Vulnerability Exposes Internet Security Flaw in.mobi Domains This week, cyberthreats rising in Mexico; FBI warned of BEC scams; U.K. police arrested hacking suspect; Avis, Slim CD, Medicare and Fortinet disclosed breaches; Highline public schools reopened after cyberattack; a critical flaw was found in WHOIS; and Konni upped attacks on Russia, South Korea.

Security 297
article thumbnail

Cybersecurity giant Fortinet discloses a data breach

Security Affairs

Fortinet disclosed a data breach after a threat actor claimed the theft of 440GB of files from the company’s Microsoft Sharepoint server. Today, Fortinet told Cyber Daily that a threat actor gained unauthorized access to a third-party service it used. “An individual gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive, which included limited data related to a small number of Fortinet customers, and

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cryptohack Roundup: $20.5M Indodax Theft

Data Breach Today

Also: Angel Drainer Resurfaces; Russia's Sanctions Evasion Ploy This week, Indodax was hacked, Angel Drainer resurfaced, Russia developed Infra crypto, GS Partners settled with U.S. states, Caroline Ellison to be sentenced Sept. 24, FCA prosecuted first unregistered crypto case, Nigeria set new crypto regulations, and India may approve offshore crypto firms.

288
288
article thumbnail

Apple Vision Pro’s Eye Tracking Exposed What People Type

WIRED Threat Level

The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.

Passwords 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Kernel Mode Under the Microscope at Windows Security Summit

Data Breach Today

Company Focused on Safe Deployment Practices, Reducing Kernel Mode Dependencies Cutting kernel mode dependencies and adopting safe deployment practices will make endpoint systems more resilient and secure for Windows customers. Tuesday's meeting came two months after a faulty CrowdStrike update disrupted 8.5 million Windows machines and caused $5.4 billion in direct losses.

Security 189

More Trending

article thumbnail

Mastercard Buys Threat Intel Firm Recorded Future for $2.65B

Data Breach Today

Deal Will Help Mastercard Offer Greater Protection, Trust for Digital Transactions Mastercard plans to buy threat intelligence firm Recorded Future for $2.65 billion to enhance cyber resilience and offer greater protection and trust around digital transactions. The deal will enhance Mastercard's identity, fraud prevention services by helping businesses identify and mitigate risk.

Risk 182
article thumbnail

Microsoft Is Adding New Cryptography Algorithms

Schneier on Security

Microsoft is updating SymCrypt , its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article : The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards formalized last month by the National Institute of Standards and Technology (NIST).

Libraries 129
article thumbnail

UK Labels Data Centers as Critical National Infrastructure

Data Breach Today

British Government Says Data Centers Are 'Essential for Functioning of Society' The U.K. government on Thursday designated data centers as part of its critical national infrastructure in a move intended to prevent the loss of sensitive user data during disruptive cyberattacks. A newly announced data center security team will monitor and anticipate potential cyberthreats.

article thumbnail

Singapore Police arrest six men allegedly involved in a cybercrime syndicate

Security Affairs

The Singapore Police Force (SPF) has arrested six individuals for their role in the operations of a cybercrime ring in the country. The Singapore Police Force (SPF) arrested five Chinese nationals, aged 32 to 42, and a 34-year-old Singaporean man for the alleged involvement in illegal cyber activities in the country. On 9 September 2024, around 160 officers from various Singapore Police Force units conducted raids across the island, leading to the arrests and the seizure of electronic devices an

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

GPS Modernization Stalls as Pentagon Faces Chip Shortages

Data Breach Today

New Report Warns of Continued Delays and Deficiencies in Federal GPS Modernization The Space Force is suffering from years of delays, setbacks and shortcomings in its Global Positioning System modernization program, according to a Government Accountability Office report, which found major deficiencies and testing issues that could hinder the United States competitiveness in space.

article thumbnail

UK NCA arrested a teenager linked to the attack on Transport for London

Security Affairs

U.K. police arrested a 17-year-old teenager allegedly linked to the cyberattack on London’s public transportation agency, Transport for London. U.K.’s National Crime Agency announced the arrest of a 17-year-old teenager from Walsall who is allegedly linked to the cyberattack that recently hit Transport for London. “The 17-year-old male was detained on suspicion of Computer Misuse Act offences in relation to the attack, which was launched on TfL on 1 September.” states the

article thumbnail

How digital twins of Earth are spinning up safer decisions for the planet

Collaboration 2.0

Creating a digital twin of the Earth ignites innovation in science, business, and other sectors.

98
article thumbnail

How to Address AI Security Risks With ISO 27001

IT Governance

AI penetration tests, user education, and more Artificial intelligence is taking the world by storm. But for all its potential, there are legitimate concerns around, among other things, data security. Bridget Kenyon is the CISO (chief information security officer) for SSCL, a member of the UK Advisory Council for (ISC) 2 , and a Fellow of the Chartered Institute of Information Security.

Risk 89
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

I ditched my Kindle and iPad just hours after testing this Android tablet

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G is my new favorite e-reader for its versatile display and value.

IT 98
article thumbnail

System extension changes in macOS Sequoia

Jamf

With the release of macOS Sequoia, admins will see changes to system extensions on managed devices. Find out what this means for your device fleet.

81
article thumbnail

Every iPhone 16 model compared: Should you buy the standard, Plus, Pro, or Max?

Collaboration 2.0

Apple unveiled the new iPhone 16 series with camera improvements and larger displays, but which one is right for you? Here's how each model compares.

98
article thumbnail

UK datacentres to be designated critical infrastructure

The Guardian Data Protection

Facilities to receive greater protection in attempt to reduce potential impact of adverse incidents or attacks Datacentres in the UK are to be designated as critical national infrastructure in an effort to protect them from cyber-attacks and IT blackouts, the government has said. The buildings store much of the data generated in the UK, including photos taken on smartphones, financial information and NHS records.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

iPhone 16 Pro vs. iPhone 14 Pro: Is the latest model worth the upgrade?

Collaboration 2.0

Apple's new iPhone 16 Pro has some notable improvements, but do they warrant upgrading from the now two-year-old iPhone 14 Pro? Here's how to decide.

98
article thumbnail

Dobeles dzirnavnieks finds the perfect recipe for growth success

OpenText Information Management

At Dobeles dzirnavnieks , we provide flour, pasta, cereal flakes and many more food products to millions of consumers across more than 70 countries. Based in Latvia, we operate production facilities that cover over 21 hectares. Dobeles dzirnavnieks is already the largest pasta producer in Northern Europe—and we continue to grow. Driving one of the largest food production businesses in Baltics is no simple task.

Paper 59
article thumbnail

Oura Ring vs. Apple Watch: Which health tracker should you buy?

Collaboration 2.0

These two wearables might look like they track the same metrics, but they are vastly different devices.

98
article thumbnail

UK NCA arrested a teenager linked to the attack on Transport for London

Security Affairs

U.K. police arrested a 17-year-old teenager allegedly linked to the cyberattack on London’s public transportation agency, Transport for London. U.K.’s National Crime Agency announced the arrest of a 17-year-old teenager from Walsall who is allegedly linked to the cyberattack that recently hit Transport for London. “The 17-year-old male was detained on suspicion of Computer Misuse Act offences in relation to the attack, which was launched on TfL on 1 September.” states the

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Microsoft 365 is down for thousands of users

Collaboration 2.0

UPDATED: The web version of Microsoft's software suite is currently inaccessible for a large number of people, and other services seem to be down as well.

98
article thumbnail

Singapore Police arrest six men allegedly involved in a cybercrime syndicate

Security Affairs

The Singapore Police Force (SPF) has arrested six individuals for their role in the operations of a cybercrime ring in the country. The Singapore Police Force (SPF) arrested five Chinese nationals, aged 32 to 42, and a 34-year-old Singaporean man for the alleged involvement in illegal cyber activities in the country. On 9 September 2024, around 160 officers from various Singapore Police Force units conducted raids across the island, leading to the arrests and the seizure of electronic devices an

article thumbnail

Have a global audience? This AI video platform translates your content in one click

Collaboration 2.0

Synthesia is adding new features to its AI video generation platform for seamless, culturally relevant translations. Here's how it works.

IT 97
article thumbnail

Report Finds Lack of Talent, Tools Frustrates Cyber Investigations

The Security Ledger

Firms face challenges in combating sophisticated cyber attacks due to a shortage of skilled workers and complex, costly investigative tools. A report by Command Zero highlights the acute need for cybersecurity talent, especially for cloud platforms. Organizations struggle with tool integration and lack standardized processes, complicating cyber. Read the whole entry.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Linux and open-source documentation is a mess: Here's the solution

Collaboration 2.0

Simply telling someone to RTFM is not an answer when the manual is outdated, unreadable, or nonexistent. We need to improve the quality of our documentation, and the way to do that is simple.

76
article thumbnail

Davies Appoints First Group Chief AI Officer

Information Matters

Davies, the professional services and technology company, has named Paul O’Brien as its first Group Chief AI Officer, signalling a significant push into artificial intelligence, the company announced on Thursday. Read more The post Davies Appoints First Group Chief AI Officer appeared first on Information Matters - AI in the UK.

article thumbnail

5 top Linux text editors that aren't vi or Emacs (and why they are my favorite)

Collaboration 2.0

Name your desktop distro - I've got great and easy-to-use text editors to recommend.

76