Fri.Jan 26, 2024

article thumbnail

Microsoft Says Test Account Gave Hackers Keys to the Kingdom

Data Breach Today

Postmortem: Multiple Customers Also Targeted by Russian Nation-State Attackers A nation-state hacking group run by Russian intelligence gained access to a Microsoft "legacy, non-production test tenant account" and used it to authorize malicious Office 365 OAuth applications, access Outlook, and steal Microsoft and customers' emails and attachments, Microsoft said.

Access 338
article thumbnail

Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks

WIRED Threat Level

A California teenager who allegedly used the handle Torswats to carry out a nationwide swatting campaign is being extradited to Florida to face felony charges, WIRED has learned.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Aiming to Improve SBOM Implementation With New Guidance

Data Breach Today

US Cyber Agency Issues Step-by-Step Guide to Build Software Bills of Materials The U.S. Cybersecurity and Infrastructure Security Agency is aiming to improve the implementation of software bills of materials across the public and private sectors as experts warn that a failure to build and use the critical inventory lists could result in "catastrophic security breaches.

article thumbnail

Watch out, experts warn of a critical flaw in Jenkins

Security Affairs

Jenkins maintainers addressed several security vulnerabilities, including a critical remote code execution (RCE) flaw. Jenkins is the most popular open source automation server, it is maintained by CloudBees and the Jenkins community. The automation server supports developers build, test and deploy their applications, it has hundreds of thousands of active installations worldwide with more than 1 million users.

Libraries 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Civil Society Sounds Alarms on UN Cybercrime Treaty

Data Breach Today

Final Round of Negotiations Set to Begin on Monday A draft international cybercrime treaty set to enter a final round of negotiations at the United Nations Monday drew condemnation from civil society groups that said it will criminalize security research and promote indiscriminate police surveillance.

Security 269

More Trending

article thumbnail

Therapy Provider Notifying 4 Million Patients of PJ&A Hack

Data Breach Today

Concentra Health Services Joins List of Those Affected in Transcriber's Data Breach A Texas-based physical and occupational therapy provider is notifying nearly 4 million patients that they have joined the soaring tally of victims of a data theft incident at a Nevada medical transcription vendor last year. The supply chain hack appears to have affected at least 14 million people.

article thumbnail

Pwn2Own Automotive 2024 Day 2 – Tesla hacked again

Security Affairs

Researchers hacked the Tesla infotainment system and found 24 zero-days on day 2 of Pwn2Own Automotive 2024 hacking competition. White hat hackers from the Synacktiv Team ( @Synacktiv ) compromised the Tesla infotainment system on the second day of the Pwn2Own Automotive 2024 hacking competition. The bug hunters chained two vulnerabilities to hack the Tesla infotainment system, they earned $100,000 and 10 Master of Pwn Points.

article thumbnail

ISMG Editors: Emerging AI Tech for Cloud Security in 2024

Data Breach Today

Payments Expert Troy Leach Joins the Panel to Cover AI, Zero Trust and IoT Security In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joins three editors at ISMG to discuss important cybersecurity issues, including how generative AI is enhancing multi-cloud security, AI's influence on authentication processes, and the state of zero trust and IoT security.

Cloud 263
article thumbnail

A TrickBot malware developer sentenced to 64 months in prison

Security Affairs

The Russian national malware developer Vladimir Dunaev was sentenced to more than 5 years in prison for his role in the TrickBot operation. The Russian national Vladimir Dunaev (40) has been sentenced in the US to 64 months in prison for his role in the development and distribution of the TrickBot malware. Vladimir Dunaev was extradited to the U.S. in October 2021.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Chatbots and Human Conversation

Schneier on Security

For most of history, communicating with a computer has not been like communicating with a person. In their earliest years, computers required carefully constructed instructions, delivered through punch cards; then came a command-line interface, followed by menus and options and text boxes. If you wanted results, you needed to learn the computer’s language.

article thumbnail

Houston, We Have a 2024 China Problem

KnowBe4

Russia is not the only global problem that democracy has to deal with. The Chinese regime ran large influence campaigns, attempting mass social engineering in the U.S. 2022 midterm elections, according to a declassified intelligence report and multiple private-sector investigations. We can expect the same in 2024.

122
122
article thumbnail

Collibra is proud to be part of the Snowflake Horizon Partner Ecosystem

Collibra

Snowflake recently announced the launch of Snowflake Horizon, their built-in governance solution that unifies compliance, security, privacy, interoperability and access capabilities in the Snowflake Data Cloud. Collibra is proud to be included in the Snowflake Horizon Partner Ecosystem to help organizations with hybrid and multi-cloud environments simplify and scale their data governance strategy across their disparate data sources.

article thumbnail

Your KnowBe4 Fresh Content Updates from January 2024

KnowBe4

Check out the 37 new pieces of training content added in January, alongside the always fresh content update highlights, events and new features.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Networks unchained: the shift toward intent-based autonomous operations

IBM Big Data Hub

Telecommunications industry, a cornerstone of global connectivity, has been going through a technological renaissance for some time, driven by innovations such as 5G, IoT, cloud computing and AI. As a result, networks have become increasingly hard to manage. There is a need for automation to handle routine tasks, monitor network health and respond to issues in real-time.

IoT 95
article thumbnail

From ancient sands to AI innovations: OpenText at the Formula E Diriyah E-Prix

OpenText Information Management

Rounds 2 and 3 of the 2024 ABB FIA Formula E Championship are taking place around the historic town walls of Diriyah, Saudia Arabia—a UNESCO World Heritage site—at night under the lights on January 26 and 27. During these night races, the track is lit with the latest low-consumption LED technology lights. And the energy … The post From ancient sands to AI innovations: OpenText at the Formula E Diriyah E-Prix appeared first on OpenText Blogs.

article thumbnail

Instana 2023: Recapping our latest innovation

IBM Big Data Hub

You asked, and we delivered! At Instana, addressing our customers’ needs and creating a simple tool that is easy to use is fundamental to helping our DevOps and SRE teams reduce burnout rates, allowing them to excel in what they do best. Taking all your feedback and market insights into perspective and careful consideration, we are thrilled to announce that in 2023.

Cloud 84
article thumbnail

Data Privacy Week Resources via FPC.gov

IG Guru

Check out the link here. The post Data Privacy Week Resources via FPC.gov first appeared on IG GURU.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

IBM and business partner bring intelligent equipment maintenance to automotive company with IBM Maximo

IBM Big Data Hub

IBM® recently announced that it has worked with its business partner, Beijing Shuto Technology Co., Ltd. (hereafter as Shuto Technology) to help a joint venture Original Equipment Manufacturer (OEM) in China to obtain information in an accurate and cost-effective way for on-site technicians. This makes the client’s equipment repair work more efficient and improves the reliability of its equipment.

article thumbnail

International Data Privacy Day: Unpacking recent significant ECJ decisions

Data Protection Report

A flurry of significant European Court of Justice judgments relating to data protection were published in the final few months of 2023.

article thumbnail

The different types of renewable energy 

IBM Big Data Hub

Renewable energy , also known as clean energy, is produced from natural resources that are generated and replenished faster than they are consumed—such as the sun, water and wind. Most renewable energy sources produce zero carbon emissions and minimal air pollutants. Fossil fuels (oil, coal and natural gas) on the other hand, are finite resources and release harmful greenhouse gas emissions (GHGs), including carbon dioxide (CO2) and methane, when burned.

article thumbnail

10 Biometric Trends to Watch in 2024

HID Global

Explore the top 10 biometric trends to watch out for in 2024 as this technology continues to advance and reliable identity assurance remains a top priority.

52
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

What is vegetation management? 

IBM Big Data Hub

When North America suffered its largest blackout , it cost upwards of USD 6 billion and left 50 million people without power for up to two days. What caused the blackout? Overgrown trees that came into contact with a power line. Beyond causing blackouts, overgrown vegetation can also cause soil erosion and water quality problems, disrupting both our economy and the environment.

article thumbnail

Generative AI Interest Skyrockets Over 3,500%, Signaling New Era of Technology

Information Matters

Interest in generative artificial intelligence (AI) tools like GPT has increased a staggering 3,600% over the past year, according to the 2024 Technology Trends report released today by O’Reilly Media. Read more The post Generative AI Interest Skyrockets Over 3,500%, Signaling New Era of Technology appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Decoding the future: unravelling the intricacies of Hybrid Cloud Mesh versus service mesh 

IBM Big Data Hub

Hybrid Cloud Mesh, which is generally available now, is revolutionizing application connectivity across hybrid multicloud environments. Let’s draw a comparison between Hybrid Cloud Mesh and a typical service mesh to better understand the nuances of these essential components in the realm of modern enterprise connectivity. This comparison deserves merit because both the solutions are focused on application-centric connectivity albeit in a different manner.

Cloud 60
article thumbnail

Webinar (Virtual): IG and Artifical Intelligence on February 15, 2024 at 12pm Eastern via ARMA Michigan

IG Guru

Check out the link here to register. The post Webinar (Virtual): IG and Artifical Intelligence on February 15, 2024 at 12pm Eastern via ARMA Michigan first appeared on IG GURU.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The EU AI Act: What obligations will apply to your business?

Data Protection Report

Political agreement was achieved at the beginning of December in relation to the EU’s AI Act (AIA) – the first major step in the regulation of artificial intelligence. Although the final texts are not yet available, the key elements are clear, with the “risk-based” approach at the heart of the AIA. Working from the last available texts, we will provide insights into which activities will likely be caught as prohibited, high-risk and transparent – the essential first step for understanding the le

article thumbnail

Instana 2023: Recapping our latest innovation

IBM Big Data Hub

You asked, and we delivered! At Instana, addressing our customers’ needs and creating a simple tool that is easy to use is fundamental to helping our DevOps and SRE teams reduce burnout rates, allowing them to excel in what they do best. Taking all your feedback and market insights into perspective and careful consideration, we are thrilled to announce that in 2023.

Cloud 43
article thumbnail

Who is Alleged Medibank Hacker Aleksandr Ermakov?

Krebs on Security

Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33-year-old Aleksandr Ermakov allegedly stole and leaked the Medibank data while working with one of Russia’s most destructive ransomware groups, but little more is shared about the accused.