Mon.Dec 11, 2023

article thumbnail

Ransomware Group Offline: Have Police Seized Alphv/BlackCat?

Data Breach Today

Prolific Ransomware Operation Tied to Big Hits Claims 'Everything Will Work Soon' Cybercrime underground chatter suggests ransomware group BlackCat - aka Alphv - is being disrupted by law enforcement. Experts warn that disruptions too often remain short-lived, as operators reboot under different names and affiliates go independent or work with a bevy of rival services.

article thumbnail

Apache fixed Critical RCE flaw CVE-2023-50164 in Struts 2

Security Affairs

The Apache Software Foundation addressed a critical remote code execution vulnerability in the Apache Struts 2 open-source framework. The Apache Software Foundation released security updates to address a critical file upload vulnerability in the Struts 2 open-source framework. Successful exploitation of the flaw, tracked as CVE-2023-50164 , could lead to remote code execution.

Security 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kentucky Hospital Chain Notifying 2.5 Million of Data Theft

Data Breach Today

Alphv/BlackCat Claimed Responsibility for May Attack A Kentucky-based hospital chain is notifying millions of individuals that their information was potentially exfiltrated in a May attack. Russian-speaking ransomware-as-a-service group Alphv/BlackCat - which is currently reportedly undergoing its own disruptions - took credit for the data theft.

article thumbnail

Toyota Financial Services discloses a data breach

Security Affairs

Toyota Financial Services (TFS) disclosed a data breach, threat actors had access to sensitive personal and financial data. Toyota Financial Services (TFS) is warning customers it has suffered a data breach that exposed sensitive personal and financial data. “Due to an attack on the systems, unauthorized persons gained access to personal data.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Spain Arrests Alleged Kelvin Security Money Laundering Head

Data Breach Today

Venezuelan National Detained on Mediterranean Coast on Sunday Spanish national police on Sunday arrested an alleged key money laundering figure of the profit-seeking Kelvin Security hacking operation. They detained a Venezuelan national who reportedly entered the country as a tourist. Police said the man is the head of the group's money laundering operation.

Security 298

More Trending

article thumbnail

BlackBerry Cancels IPO, Separates Cybersec and IoT Units

Data Breach Today

Subsidiary IPO Canceled in Announcement, Naming John Giamatteo as CEO BlackBerry reversed plans for an equity carve-out of its internet of things business in a Monday announcement of plans to instead make its cybersecurity and IoT units independently operated entities. The Canadian firm also selected company insider John Giamatteo as its new CEO.

IoT 292
article thumbnail

Ukraine Is Crowdfunding Its Reconstruction

WIRED Threat Level

With its war against Russia raging on, Ukraine has begun raising funds to rebuild homes and structures one by one using its own crowdfunding platform.

IT 138
article thumbnail

Open-Source Oversight: Security Gaps in IoT and OT Devices

Data Breach Today

Dashevskyi and La Spina of Forescout Technologies on IoT and OT Security Practices Previous studies on IoT and OT devices have primarily focused on internal components, neglecting open-source components that are crucial for internet and network connectivity, according to Stanislav Dashevskyi and Francesco La Spina, security researchers at Forescout Technologies.

IoT 289
article thumbnail

CISA adds Qlik Sense flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Below is the list of the issues added to the catalog: CVE-2023-41265 (CVSS score 9.6)- Qlik Sense HTTP Tunneling Vulnerability: Qlik Sense contains an HTTP tunneling vulnerability that allows an atta

IT 137
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

OnDemand | Securing the Core: Cutting-Edge Techniques for SaaS & Web Application Safety

Data Breach Today

This comprehensive session will provide an in-depth exploration of cutting-edge strategies and technologies essential for securing SaaS and web applications and

Security 288
article thumbnail

Facebook Enables Messenger End-to-End Encryption by Default

Schneier on Security

It’s happened. Details here , and tech details here (for messages in transit) and here (for messages in storage) Rollout to everyone will take months, but it’s a good day for both privacy and security. Slashdot thread.

article thumbnail

Europe Prepares for AI Act Enforcement

Data Breach Today

Ban on Prohibited AI Applications to Be Implemented First The European Union will enforce its imminent regulation on artificial intelligence in phases, and bans on the use of prohibited AI are expected to kick in within six months of the regulation's adoption, a European Commission official said on Monday.

article thumbnail

Russian Hackers Indicted for Phishing Attacks Against U.S. and Allies

KnowBe4

The US Justice Department has indicted two individuals for launching spear phishing attacks against the US, the UK, Ukraine and various NATO member countries on behalf of the Russian government.

Phishing 132
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK Sanctions 9 Asians for Crypto Scams, Human Trafficking

Data Breach Today

Sanctioned Individuals Operated Investment Scams in Myanmar, Cambodia and Laos The U.K. government has sanctioned 14 individuals and groups that illegally employed human trafficking victims in online crypto and investment scams. Sanctioned individuals include a Chinese national previously targeted by the U.S. Treasury for running a gambling and trafficking business in Laos.

article thumbnail

WSJ: "A Hidden Risk in the Municipal Bond Market: Hackers"

KnowBe4

December 7, 2023 - The Wall Street Journal has an interesting perspective on K-12 Public schools suffering ransomware attacks. The number doubles between 2021 and 2022 to almost 2,000 a year.

Marketing 126
article thumbnail

Analytics and AI predictions for 2024: Exploring the future

OpenText Information Management

The world of data analytics and artificial intelligence (AI) continues to evolve at an unprecedented rate. Over the next four years, analytics, AI, and machine learning developments promise to revolutionize how we interact with technology, unlocking a range of new possibilities. Analytics and AI trend #1: The integration of generative AI and business intelligence Traditional … The post Analytics and AI predictions for 2024: Exploring the future appeared first on OpenText Blogs.

Analytics 116
article thumbnail

Deepfakes: The New Face of Fraud

KnowBe4

Security analysts at identity vendor Sumsub are seeing a massive rise in the use of deepfake fraud in their Identity Fraud Report 2023. And one country may be to blame.

Security 126
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

CISA and ENISA signed a Working Arrangement to enhance cooperation

Security Affairs

ENISA has signed a Working Arrangement with the US CISA to enhance capacity-building, best practices exchange and awareness. The European Union Agency for Cybersecurity (ENISA) has signed a Working Arrangement with the Cybersecurity and Infrastructure Security Agency (CISA) to enhance cooperation on capacity-building, best practices exchange, and situational awareness.

article thumbnail

2024 IT Spending Surge: Surprising Insights from Piper Sandler's CIO Survey

KnowBe4

Industry analysts Piper Sandler do a yearly 'Industry Note' where they survey CIOs about their next year budget expectations. For 2024 there is a noticeable improvement regarding enterprise IT spending.

IT 122
article thumbnail

The advantages and disadvantages of hybrid cloud

IBM Big Data Hub

With the rapid advancements in cloud computing, data management and artificial intelligence (AI) , hybrid cloud plays an integral role in next-generation IT infrastructure. Enterprise-level businesses rely on hybrid cloud solutions to run critical workloads from anywhere by combining and unifying on-premises, private cloud and public cloud environments.

Cloud 101
article thumbnail

European Lawmakers Reach a Political Agreement on the AI Act

Hunton Privacy

On December 8, 2023, the European Parliament and the Council reached a political agreement on the EU’s Regulation laying down harmonized rules on Artificial Intelligence (the “AI Act”). The AI Act will introduce a risk-based legal framework for AI. Specifically, the AI Act will state that: (1) certain AI systems are prohibited as they present unacceptable risks ( e.g. , AI used for social scoring based on social behavior or personal characteristics, untargeted scraping of facial images from the

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification madhav Tue, 12/12/2023 - 05:21 Given the pace of data growth and the complexity of hybrid IT environments, the discovery and classification of sensitive data is no simple task. In a recent study , IDC predicted the global datasphere will more than double in size from 2022 to 2026, and that 80% of that data will be unstructured.

article thumbnail

IBM App Connect: The sustainability tool you didn’t know you needed

IBM Big Data Hub

Data is one of the key drivers to an effective sustainability agenda. When data flows freely across your enterprise, you can gain transparency into your operations to enable informed and effective sustainability efforts. As the saying goes, information is power. Integrating your key applications can help harness valuable data and foster the high-level communication across business functions necessary to operationalize sustainability in your enterprise.

article thumbnail

Webinar: Virtual Coffee with Consulting: Identifying and Breaking Down Privacy Requirements for Your Program on January 30, 2023 at 11am EST via Zasio

IG Guru

Register here. The post Webinar: Virtual Coffee with Consulting: Identifying and Breaking Down Privacy Requirements for Your Program on January 30, 2023 at 11am EST via Zasio first appeared on IG GURU.

Privacy 62
article thumbnail

Top 5 predictions for manufacturing in 2024

OpenText Information Management

In recent years, the manufacturing sector has experienced notable disruptions – including supply chain instability, product demand fluctuations, transportation issues, and workforce shortages. However, amidst these challenges, a crucial lesson emerged that highlighted how harnessing information effectively can yield a distinct competitive edge and enhance overall profitability.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Advertising Is Coming To Threads. What Happens Next?

John Battelle's Searchblog

With thanks to Scott Monty I stopped using Twitter over a year ago, as soon as Elon Musk took control of the place. I don’t miss it – it was already a pretty toxic place, and my tenure at The Recount , a political media company, ensured I had to engage with most of Twitter’s worst attributes. But when Meta launched Threads , its Twitter clone, I figured I’d give the new service a try.

article thumbnail

Finding the treasure in governement information management

CILIP

Finding the treasure in Government information managaement David Smith From helping shape government guidance on WhatsApp information management to maintaining collections of sunken treasure maps, -David Smith, Deputy Director, Knowledge and Information Management, at Department for Levelling Up, Housing and Communities, and head of the Government KIM Profession, discusses the challenges facing KIM in the Civil Service.

article thumbnail

Burlington Food Pantry Gets Boost from Daymark Employee Donations

Daymark

It’s a priority for Daymark and its employees to give back to the local community. The food pantry in Burlington, Massachusetts, espouses “People Helping People,” and that’s exactly what Daymark employees did last month to assist in making sure the families in Burlington have enough food and essential supplies as winter arrives. The employee-driven Daymark food drive resulted in multiple carloads of food being donated to those with the greatest needs.

IT 40