Tue.Jan 16, 2024

article thumbnail

White House Says Agencies On Track to Meet January AI Goals

Data Breach Today

Official Says Administration Taking ‘Aggressive Set of Actions’ to Meet Deadlines Federal agencies are making significant headway in achieving a series of critical cybersecurity milestones included in a sweeping executive order on artificial intelligence the president signed in October 2023, according to White House Special Advisor on AI Ben Buchanan.

article thumbnail

A Flaw in Millions of Apple, AMD, and Qualcomm GPUs Could Expose AI Data

WIRED Threat Level

Patching every device affected by the LeftoverLocals vulnerability—which includes some iPhones, iPads, and Macs—may prove difficult.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NC Health System Agrees to Pay $6.6M in Web Tracking Case

Data Breach Today

Novant Health Is Among Latest Organizations Opting to Settle Patient Privacy Claims A North Carolina healthcare system has agreed to pay $6.6 million to settle a consolidated class action lawsuit involving its use of tracking tools in its websites and patient portals. The suit alleges the website trackers sent sensitive patient information to third parties without their consent.

Privacy 303
article thumbnail

Google fixed the first actively exploited Chrome zero-day of 2024

Security Affairs

Google has addressed the first Chrome zero-day vulnerability of the year that is actively being exploited in the wild. Google has released security updates to address the first Chrome zero-day vulnerability of the year that is actively being exploited in the wild. The high-serverity vulnerability, tracked as CVE-2024-0519 , is an out of bounds memory access in the Chrome JavaScript engine.

Security 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Crypto-Seeking Drainer Scam-as-a-Service Operations Thrive

Data Breach Today

$295 Million in Digital Assets Lost Last Year to Wallet Drainers, Researchers Warn Cryptocurrency phishing scams designed to send crypto owners to fake versions of legitimate sites, recently disseminated via hijacked high-profile social media accounts, highlight the ongoing use of drainer scam-as-a-service offerings, which researchers say last year led to $295 million in losses.

Phishing 301

More Trending

article thumbnail

UK Privacy Watchdog Probes GenAI Privacy Concerns

Data Breach Today

ICO Call for Evidence to Focus on Legal Basis for Scrapped Training Data The British data regulator is set to analyze the privacy implications of processing scrapped data used for training generative artificial intelligence algorithms. The Information Commissioners' Office is soliciting comments from AI developers, legal experts, and other industry stakeholders.

Privacy 298
article thumbnail

VMware fixed a critical flaw in Aria Automation. Patch it now!

Security Affairs

VMware warns customers of a critical vulnerability impacting its Aria Automation multi-cloud infrastructure automation platform. VMware Aria Automation (formerly vRealize Automation ) is a modern cloud automation platform that simplifies and streamlines the deployment, management, and governance of cloud infrastructure and applications. It provides a unified platform for automating tasks across multiple cloud environments, including VMware Cloud on AWS, VMware Cloud on Azure, and VMware Cloud Fo

IT 140
article thumbnail

Money Launderers, Fraudsters Flocking to Tether: UN Report

Data Breach Today

Cryptocurrency Has 'Supercharged' Organized Crime in Southeast Asia Digital money is energizing Southeast Asian organized crime as a method for money laundering and as a way of reaping new revenue, warn experts who say the Tether plays a heavy role in the rapidly evolving state of law-breaking in Myanmar, Thailand and elsewhere.

289
289
article thumbnail

Experts warn of mass exploitation of Ivanti Connect Secure VPN flaws

Security Affairs

Experts warn that recently disclosed Ivanti Connect Secure VPN and Policy Secure vulnerabilities are massively exploited in the wild. Last week, software firm Ivanti reported that threat actors are exploiting two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Connect Secure (ICS) and Policy Secure to remotely execute arbitrary commands on targeted gateways.

Security 134
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Mimecast Appoints Marc van Zadelhoff as New CEO

Data Breach Today

Leadership Transition Comes After 21 Years Under Peter Bauer as CEO Mimecast, the cloud security firm specializing in email and cyber resilience, appointed a new CEO after co-founder Peter Bauer served in the chief executive role since its inception in 2003. The leadership transition comes less than two years after the company went private.

Cloud 270
article thumbnail

The Sad Truth of the FTC's Location Data Privacy Settlement

WIRED Threat Level

The FTC forced a data broker to stop selling “sensitive location data.” But most companies can avoid such scrutiny by doing the bare minimum, exposing the lack of protections Americans truly have.

article thumbnail

Beyond Hacktivism: Akamai CTO on Shifting Threat Landscape

Data Breach Today

Robert Blumofe on DDoS Attacks, API Security, Zero Trust and FIDO2-MFA Robert Blumofe, executive vice president and CTO at Akamai, expects social engineering, phishing, extortion and AI-driven attacks to dominate the threat landscape. He advised enterprises to use FIDO2-based MFA, zero trust, microsegmentation and API security to reduce risks.

Phishing 182
article thumbnail

Malicious APKs Drain Bank Accounts

KnowBe4

A phishing campaign is targeting Chinese users in an attempt to distribute malicious apps, according to researchers at Palo Alto Networks’s Unit 42.

Phishing 119
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Story of the Mirai Botnet

Schneier on Security

Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet.

Security 118
article thumbnail

Cryptocurrency Drainer Distributed Through Phishing

KnowBe4

Mandiant has published a report on “CLINKSINK,” a cryptocurrency Drainer-as-a-Service (DaaS) that’s targeting users of the Solana currency.

Phishing 119
article thumbnail

Beyond data silos: Bridging the context gap with process-aware cataloging

Collibra

People. Process. Tooling. This is the trifecta; the ‘secret sauce’ that critically defines and underpins any successful digital transformation project, at any scale. This isn’t to say you must have all three in equal parts to be successful. Rather you have to have an understanding of how all three fit into the new world that you’re building for your organization to thrive, grow and adapt.

Metadata 105
article thumbnail

LinkedIn is Being Used for *Dating* – It’s a Recipe for Disaster

KnowBe4

A new article explains how business professionals are beginning to be not-so-professional and seeking to make personal connections. It’s only a matter of time before cybercriminals jump in.

Phishing 116
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

VulnRecap 1/16/24 – Major Firewall Issues Persist

eSecurity Planet

The past week and the long weekend have had plenty of vulnerabilities to keep your IT and security teams busy. Both SonicWall and Juniper Networks have seen vulnerabilities that allow remote code execution and denial-of service attacks. Keep an eye out for security announcements from your firewall vendors; it’s possible additional similar vulnerabilities will come to light.

IoT 105
article thumbnail

CyberheistNews Vol 14 #03 Red Flags for Phishing: Verizon Outlines Latest Scams to Watch Out For

KnowBe4

Red Flags for Phishing: Verizon Outlines Latest Scams to Watch Out For

Phishing 114
article thumbnail

Join us at the forefront of AI for business: Think 2024

IBM Big Data Hub

You want to use AI to accelerate productivity and innovation for your business. You need to move beyond experimentation to scale. You have to move fast. Join us in Boston for Think 2024, a unique and engaging experience that will guide you on your AI for business journey, no matter where you are on the road. From building AI readiness with a thoughtful hybrid cloud approach, to scaling AI across core business functions and industry needs, to embedding AI into the heart of your enterprise strateg

Cloud 96
article thumbnail

CILIP welcomes publication of Sanderson Review of Public Libraries

CILIP

CILIP welcomes publication of Sanderson Review of Public Libraries CILIP has welcomed the publication of the findings of Baroness Sanderson of Welton’s Independent Review of Public Libraries, announced today at an event at the House of Lords attended by our CEO, Nick Poole. The Independent Review was commissioned at the request of Lord Parkinson of Whitley Bay as part of his remit as Minister for Culture, Communications and Creative Industries within the Department for Culture, Media and Sport (

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Accelerating sustainable modernization with Green IT Analyzer on AWS

IBM Big Data Hub

Businesses are increasingly embracing data-intensive workloads, including high-performance computing, artificial intelligence (AI) and machine learning (ML). These technologies drive innovation on their hybrid, multicloud journeys while focusing on resilience, performance, security and compliance. Companies are also striving to balance this innovation with growing environmental, social and governance (ESG) regulations.

article thumbnail

DORA: 1 year to go! Key recommendations for Financial Services to improve cybersecurity and resilience in multi-clouds

Thales Cloud Protection & Licensing

DORA: 1 year to go! Key recommendations for Financial Services to improve cybersecurity and resilience in multi-clouds madhav Wed, 01/17/2024 - 05:46 The Digital Operational Resilience Act (DORA) will apply to the EU financial sector from 17 January 2025. This new regulation ( EU 2022/2554 ) requires financial entities, and their critical Information and Communication Technology (ICT) suppliers, to implement contractual, organisational and technical measures to improve the level of digital opera

article thumbnail

The advantages of holistic facilities management

IBM Big Data Hub

Beyond the traditional challenges of today’s markets, many organizations must also address the challenges of real estate and facilities management. These issues include managing rising real estate costs, increasing lease rates, new sustainability goals and under-utilized hybrid work environments. Successfully managing your facilities can directly impact employee productivity and customer satisfaction.

article thumbnail

Reaching new markets in Europe and beyond

OpenText Information Management

How information management specialists at One Fox slashed time to market for innovative products with OpenText Cloud Platform Services At One Fox, we’ve driven some remarkable transformations for our clients. By applying our expertise in business process management, collaboration, and information management (IM), we empower organizations to streamline and automate their workflows—so they can focus … The post Reaching new markets in Europe and beyond appeared first on OpenText Blogs.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

How to build a successful product development strategy

IBM Big Data Hub

To remain competitive in today’s relentlessly paced and ever-expanding marketplace, companies must think carefully about what products they’re developing and how they’re developing them, continuously iterating their processes to maintain a competitive edge. A finely tuned product development strategy is a holistic, cross-collaborative endeavor with the capacity to help any organization weather unforeseen events or market changes.

article thumbnail

Innovation with a Canadian accent

OpenText Information Management

As the new year begins, it’s a great time to look ahead. If your 2024 plans include finding new ways to drive your organization forward, we hope you’ll look no further than your friendly neighborhood software giant to deliver Canadian-born innovation and a partnership that goes the distance. But before looking forward, let’s take a … The post Innovation with a Canadian accent appeared first on OpenText Blogs.

article thumbnail

Thailand – The Regulation with respect to Cross-border Transfer of Personal Data

Data Protection Report

On 25 December 2023, the Personal Data Protection Committee ( PDPC ) published two notifications detailing regulations for cross-border transfers of personal data under Sections 28 and 29 ( Notifications ) of the Personal Data Protection Act B.E. 2562 (2019) ( PDPA ). These Notifications are the Adequacy Country Notification and the Appropriate Safeguard Notificationrespectively.