Mon.Apr 08, 2024

article thumbnail

Police Probe Honeytrap Sexting Scam Targeting British MPs

Data Breach Today

Warning: Low-Tech, Deceptive Social Engineering Attacks Remain Difficult to Detect British police are investigating attempts to target Members of Parliament, their advisers and other Conservative and Labour insiders via spear-phishing messages as part of an apparent honeytrap sexting scam. Experts say low-tech attacks based on social engineering remain difficult to detect.

article thumbnail

Best Practices Q&A: Guidance about what directors need to hear from CISOs — from a board member

The Last Watchdog

CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. Related: The ‘cyber’ case for D&O insurance Vanessa Pegueros knows this all too well. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. I recently attended an IoActive-sponsored event in Seattle at which Pegueros gave a presentation titled: “Merging Cybersecurity, the Board & Executive Team” Peguero

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meta Will Label AI-Generated Content Starting In May

Data Breach Today

Tech Giant Asks Creators to Declare Content with 'Made with AI' Label Meta will slap a "made with AI" label on generative artificial intelligence contest posted onto its social media sites starting in May, a change the social media giant says will result in more content carrying a warning for users. The company will look for "industry standard AI image indicators.

article thumbnail

AI Scam Calls: How to Protect Yourself, How to Detect

WIRED Threat Level

AI tools are getting better at cloning people's voices, and scammers are using these new capabilities to commit fraud. Avoid getting swindled by following these expert tips.

Security 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Second Gang Shakes Down UnitedHealth Group for Ransom

Data Breach Today

RansomHub Claims It Has 4TBs of Data Stolen by BlackCat in Change Healthcare Attack A second cybercriminal gang - RansomHub - is trying to shake down Change Healthcare's parent company, UnitedHealth Group, and have it pay another ransom for data that an affiliate of ransomware-as-a-service group BlackCat claims to have stolen in February. Is this the latest ruse in a messy attack?

More Trending

article thumbnail

Hugging Face Vulnerabilities Highlight AI-as-a-Service Risks

Data Breach Today

Researchers Say Illegal Access to Private AI models Can Enable Cross-Tenant Attacks Security researchers have discovered two critical vulnerabilities in the Hugging Face AI platform that exposed potential gaps for attackers seeking unauthorized access and manipulation of customer data and models. The risks highlight the security concerns about AI-as-a-service offerings.

Risk 182
article thumbnail

U.S. Department of Health warns of attacks against IT help desks

Security Affairs

The U.S. Department of Health and Human Services (HHS) warns of attacks against IT help desks across the Healthcare and Public Health (HPH) sector. The U.S. Department of Health and Human Services (HHS) reported that threat actors are carrying out attacks against IT help desks across the Healthcare and Public Health (HPH) sector. The Health Sector Cybersecurity Coordination Center (HC3) recently observed threat actors using sophisticated social engineering tactics to target IT help desks in the

IT 142
article thumbnail

Open-Source Foundations Join Forces on Digital Supply Chain

Data Breach Today

Europe's Cyber Resilience Act Pressures Open-Source Foundations and Manufacturers Foundations housing seven large open-source projects are banding together ahead of what they say is a nearly impossible 2027 deadline created by Europe's Cyber Resilience Act - the world's first digital supply chain regulation. European Union lawmakers approved the act in March.

article thumbnail

Crowdfense is offering a larger 30M USD exploit acquisition program

Security Affairs

Zero-day broker firm Crowdfense announced a 30 million USD offer as part of its Exploit Acquisition Program. Crowdfense is a world-leading research hub and acquisition platform focused on high-quality zero-day exploits and advanced vulnerability research. In 2019 the company made the headlines for its 10M USD bug bounty program along with its unique “ Vulnerability Research Hub ” (VRH) online platform.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

US EPA Investigates Alleged Data Breach by Government Hacker

Data Breach Today

Hacker Claims to Leak Trove of Records Belonging to Environmental Protection Agency The U.S. Environmental Protection Agency is investigating claims that a notorious government hacker leaked a trove of contact information from the agency's database of critical infrastructure contractors. A spokesperson said the agency conducted a "preliminary analysis" of the allegedly leaked data.

article thumbnail

From Marco Polo to Modern Mayhem: Why Identity Management Matters

Thales Cloud Protection & Licensing

From Marco Polo to Modern Mayhem: Why Identity Management Matters madhav Tue, 04/09/2024 - 05:20 Imagine yourself as Marco Polo, the Venetian merchant traversing dangerous trade routes. Every border crossing meant proving your identity – who you were, where you came from, your purpose. Misrepresenting yourself could mean imprisonment or worse. Today's identity struggles aren't about camel caravans and silk, but that same core battle remains: proving who you are and protecting that identity from

Passwords 138
article thumbnail

RSA Conference 2024 Preview: 'The Art of Possible'

Data Breach Today

Linda Gray Martin and Britta Glade on What to Expect and What's New This Year "The Art of Possible" is the theme of RSA Conference 2024, and event organizers Linda Gray Martin and Britta Glade say they may have put together the best agenda yet - featuring sessions and speakers on red-hot topics such as identity security, cloud, gen AI and operational technology.

Cloud 182
article thumbnail

Security Vulnerability of HTML Emails

Schneier on Security

This is a newly discovered email vulnerability: The email your manager received and forwarded to you was something completely innocent, such as a potential customer asking a few questions. All that email was supposed to achieve was being forwarded to you. However, the moment the email appeared in your inbox, it changed. The innocent pretext disappeared and the real phishing email became visible.

Security 136
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Large-Scale StrelaStealer Campaign Impacts Over 100 Organizations Within the E.U. and U.S.

KnowBe4

A new campaign of StrelaStealer attacks identified by security analysts at Unit42 has been spotted targeting E.U. and U.S. organizations. This somewhat new infostealer has evolved to be even better at evading detection in a new string of campaigns aimed at stealing email credentials from well-known email clients.

Security 128
article thumbnail

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Jamf

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

Access 111
article thumbnail

Tokyo Police Department Warns of Phishing Scam That Uses Phony Arrest Warrants

KnowBe4

The Tokyo Metropolitan Police Department has warned of a phishing scam that’s attempting to trick individuals with phony arrest warrants, the Japan Times reports.

Phishing 124
article thumbnail

Sparking 25,000 Career Conversations

OpenText Information Management

"Careers — not jobs — are purposeful. You navigate the opportunities and obstacles along the way, and you almost never move in a straight line.” — Mark J. Barrenechea, CEO & CTO This quote comes from Mark Barrenechea’s recently published book Versant: Decoding the OpenVerse. Regardless of where you are in your career journey, different opportunities and obstacles will inevitably present themselves.

Sales 105
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Australian Government Commits to Become a World-Leader in Cybersecurity by 2030

KnowBe4

The Australian Government has leveraged insight from cybersecurity experts to create a new six-part plan to combat cybersecurity over the coming decade.

article thumbnail

CILIP Appoints Louis Coiffait-Gunn as new CEO

CILIP

CILIP Appoints Louis Coiffait-Gunn as new CEO The CILIP Board has appointed Louis Coiffait-Gunn as the charity's new CEO, and Louis will be starting in the new role on Wednesday 8th May 2024. Louis' career has been guided by his interest in evidence-informed policy, mainly in education. His work in a range of settings including government, thinktanks, professional associations, universities, and the press.

article thumbnail

The Cyber Achilles' Heel: Why World Leaders and High-Profile Individuals Must Prioritise Cybersecurity

KnowBe4

Social media has become an indispensable tool for communication, outreach, and engagement. From world leaders to high-profile individuals, these platforms offer an unparalleled opportunity to connect with the masses.

article thumbnail

Top 20 most-asked questions about Amazon RDS for Db2 answered

IBM Big Data Hub

The new Amazon Relational Database Service (Amazon RDS) for Db2 offering allows customers to migrate their existing, self-managed Db2 databases to the cloud and accelerate strategic modernization initiatives. In our recent  webcast , IBM, AWS, customers and partners came together for an interactive session. In this session:   IBM and AWS discussed the benefits and features of this new fully managed offering spanning availability, security, backups, migration and more.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

OpenText InfoArchive named a top player in Radicati 2024 Information Archiving Market Quadrant

OpenText Information Management

Migration to the cloud has become a financial and operational necessity for a growing number of organizations. A critical first phase in cloud migrations for many applications and datasets is information archiving to simplify and consolidate data, reducing the cost of long-term compliance and migration costs for legacy data. Organizations can reduce costs, improve performance, and ensure compliance with regulatory and legal requirements by moving inactive or legacy data from primary systems to a

article thumbnail

Why CHROs are the key to unlocking the potential of AI for the workforce 

IBM Big Data Hub

It’s no longer a question of whether AI will transform business and the workforce, but how it will happen. A study by the IBM® Institute for Business Value revealed that up to three-quarters of CEOs believe that competitive advantage will depend on who has the most advanced generative AI. With so many leaders now embracing the technology for business transformation, some wonder which C-Suite leader will be in the driver’s seat to orchestrate and accelerate that change.

article thumbnail

Impact of agent experience management on customer success and service

OpenText Information Management

Customer success and customer service are two interconnected functions inside a business. Both are focused on ensuring customer satisfaction and loyalty but they have some key distinctions. Let's dive into the differences between the two while discussing the impact that agent experience management has on both. For businesses, customer success revolves around understanding their customers’ goals helping them achieve those objectives with the product or service they acquired to ensure long-term va

article thumbnail

Webinar: RIM Program: Considerations and Avoiding Nightmares via ARMA Maryland on April 10th at 6pm Eastern

IG Guru

April 10, 2024 | 6:00 PM to 7:00 PM Zoom (Online) Add to CalendarRIM programs, when done properly, can save the day. Unfortunately, a lack of awareness, complacency, bureaucracy, threats, directives, and untimely events can impact our RIM program successes. Andrew will discuss the critical and operational elements of a RIM program we should all […] The post Webinar: RIM Program: Considerations and Avoiding Nightmares via ARMA Maryland on April 10th at 6pm Eastern first appeared on

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Product lifecycle management for data-driven organizations 

IBM Big Data Hub

In a world where every company is now a technology company, all enterprises must become well-versed in managing their digital products to remain competitive. In other words, they need a robust digital product lifecycle management (PLM) strategy. PLM delivers value by standardizing product-related processes, from ideation to product development to go-to-market to enhancements and maintenance.

article thumbnail

Onboarding Exceptional Experiences: How Biometric Self-Boarding Gates Are Transforming Air Travel

HID Global

Transform air travel with biometric self-boarding gates. Seamless and secure, learn how HID's facial recognition technology is improving the passenger journey.

article thumbnail

Why DMARC is So Important

Daymark

DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication, policy, and reporting protocol. It builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders to improve and monitor the domain’s protection from fraudulent email.