Thu.May 16, 2024

article thumbnail

Santander: a data breach at a third-party provider impacted customers and employees

Security Affairs

The Spanish bank Santander disclosed a data breach at a third-party provider that impacted customers in Chile, Spain, and Uruguay. The Spanish financial institution Santander revealed a data breach involving a third-party provider that affected customers in Chile, Spain, and Uruguay. The bank recently became aware of unauthorized access to one of its databases hosted by a third-party provider.

article thumbnail

US FBI Busts North Korean IT Worker Employment Scams

Data Breach Today

Law Enforcment Arrests an Arizona Woman and a Ukrainian National U.S. law enforcement swept up two people and possibly hundreds of laptops used in scams by North Korean IT workers to obtain remote employment, including as contractors for an unnamed U.S. cybersecurity company. Prosecutors say one scam run by an Arizona woman netted Pyongyang at least $6.8 million.

IT 277
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Electronic prescription provider MediSecure impacted by a ransomware attack

Security Affairs

Electronic prescription provider MediSecure in Australia suffered a ransomware attack likely originate from a third-party vendor. MediSecure is a company that provides digital health solutions, particularly focusing on secure electronic prescription delivery services in Australia. The company was forced to shut down its website and phone lines following a cyber attack, but it did not mention a ransomware attack.

article thumbnail

Breach Roundup: Kimsuky Serves Linux Trojan

Data Breach Today

Also: Turla Targets European Missions and Google Patches Chrome Zero-Days This week, hackers used a Linus backdoor and a Microsoft client management tool; Santander Bank, the Helsinki Education Division, an Australian energy provider and auction house Christie's were breached; hackers targeted European missions in the Middle East; and Google patched a zero-day flaw.

Education 200
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Google fixes seventh actively exploited Chrome zero-day this year, the third in a week

Security Affairs

Google released security updates to address a new actively exploited Chrome zero-day vulnerability, the third in a week. Google has released a new emergency security update to address a new vulnerability, tracked as CVE-2024-4947, in the Chrome browser, it is the third zero-day exploited in attacks that was disclosed this week. The vulnerability CVE-2024-4947 is a type confusion that resides in V8 JavaScript engine.

Access 314

More Trending

article thumbnail

RSAC Fireside Chat: Flexxon advances hardware-level security with its ‘Server Defender’ module

The Last Watchdog

Hardware-based cybersecurity solutions are needed to help defend company networks in a tumultuous operating environment. Related: World’s largest bank hit by ransomware attack While software solutions dominated RSA Conference 2024 and are essential for multi-layered defense of an expanding network attack surface, hardware security solutions can serve as a last line of defense against unauthorized access to sensitive data and tampering with systems.

Security 147
article thumbnail

Cryptohack Roundup: Thieves Steal $45M; Hacker Returns $71M

Data Breach Today

Also: Crypto King Indicted in Canada This week, $25M in ethereum was stolen, Sonne Finance was hacked, a thief returned stolen crypto, Canada indicted its crypto king, the U.S. blocked a purchase by a Chinese crypto mining firm, Canada took regulatory action against Binance, and two senators were concerned about cryptomixer policy.

Mining 173
article thumbnail

Scam Service Attempts to Bypass Multi-factor Authentication

KnowBe4

A scam operation called “Estate” has attempted to trick nearly a hundred thousand people into handing over multi-factor authentication codes over the past year, according to Zack Whittaker at TechCrunch.

article thumbnail

Judge Denies Class Certification in Blackbaud Hack Lawsuit

Data Breach Today

2020 Attack Affected 13,000 Blackbaud Clients, 1.5 Billion of Their 'Constituents' A federal judge has denied class certification in consolidated proposed class action litigation against Blackbaud stemming from the fundraising software vendor's 2020 ransomware attack that affected 13,000 clients and compromised data of about 1.5 million donors, patients and other individuals.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Zero-Trust DNS

Schneier on Security

Microsoft is working on a promising-looking protocol to lock down DNS. ZTDNS aims to solve this decades-old problem by integrating the Windows DNS engine with the Windows Filtering Platform—the core component of the Windows Firewall—directly into client devices. Jake Williams, VP of research and development at consultancy Hunter Strategy, said the union of these previously disparate engines would allow updates to be made to the Windows firewall on a per-domain name basis.

Security 128
article thumbnail

Australia Investigating Large-Scale Medical Billing Hack

Data Breach Today

e-Prescription Provider Brings in Government on Ransomware Response Australian e-prescription firm MediSecure said it is dealing with a large-scale cyberattack that could affect the personal and health information of millions of patients. The company says it is working with the Australian government on a "whole-of-government response" to the ransomware attack.

article thumbnail

Black Basta Ransomware Uses Phishing Flood to Compromise Orgs

KnowBe4

Rapid7 reports an interesting social engineering scheme that easily bypasses content filtering defenses and creatively uses a fake help desk to supposedly “help” users put down the attack.

Phishing 122
article thumbnail

Palo Alto to Acquire IBM QRadar SIEM Business

Data Breach Today

IBM Leans Ever More Heavily on Palo Alto for Tech Palo Alto Networks is set to intertwine even more tightly with IBM following a postmarket close announcement Wednesday that the cybersecurity firm will purchase IBM's SIEM business. "We already partner well with Palo Alto on firewalls, on SASE, and other products," said IBM CEO Arvind Krishna.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Collibra’s new UI: Empowering data teams with even more intuitive, effective UX

Collibra

A great user experience (UX) can be a giant accelerator for data governance adoption and effectiveness — and it all starts with the user interface (UI). In case you missed it, one of Collibra’s many innovations announced at Data Citizens ‘24: The Data Intelligence Conference was the new UI design. Collibra recognizes that exceptional UX is all about creating a positive, efficient and satisfying experience for the user.

Analytics 104
article thumbnail

UK Government Publishes AI Cybersecurity Guidance

Data Breach Today

Guidance Is First Step to Global Standard, Says Minister for AI The U.K. government released voluntary guidance intended to help artificial intelligence developers and vendors protect models from hacking and potential sabotage. Companies should strengthen supply chain security and decrease risks from vulnerable AI systems to customers, such as data loss.

article thumbnail

GUEST ESSAY: Turning to cloud services can help SMBs scale to meet growth needs

The Last Watchdog

Meeting the demands of the modern-day SMB is one of the challenges facing many business leaders and IT operators today. Traditional, office-based infrastructure was fine up until the point where greater capacity was needed than those servers could deliver, vendor support became an issue, or the needs of a hybrid workforce weren’t being met. Related: SMB brand spoofing In the highly competitive SMB space, maintaining and investing in a robust and efficient IT infrastructure can be one of the ways

Cloud 100
article thumbnail

White House Unveils AI Safety Framework for US Workers

Data Breach Today

Labor Department Publishes Set of Key Principles for Deploying AI in the Workplace The Labor Department published a set of key principles on Thursday that aim to establish a framework for organizations to responsibly develop and deploy artificial intelligence systems in the workplace, prioritizing workers' rights, health and safety.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

RETSim: Resilient and Efficient Text Similarity

Elie

RETSim (Resilient and Efficient Text Similarity) is a lightweight, multilingual robust metric embeddings suitable for near-duplicate text retrieval, clustering, and dataset deduplication tasks

83
article thumbnail

FCC FINES AT&T, SPRINT, T-MOBILE, AND VERIZON NEARLY $200 MILLION FOR ILLEGALLY SHARING ACCESS TO CUSTOMERS’ LOCATION DATA

IG Guru

Check out the press release here. The post FCC FINES AT&T, SPRINT, T-MOBILE, AND VERIZON NEARLY $200 MILLION FOR ILLEGALLY SHARING ACCESS TO CUSTOMERS’ LOCATION DATA first appeared on IG GURU.

Access 75
article thumbnail

From Berlin’s highs to Shanghai’s horizons: Join the Virtual Garage Tour at the next Formula E showdown

OpenText Information Management

Hello, fans and tech enthusiasts, and welcome to Round 11 and 12 of the 2024 ABB FIA Formula E World Championship! As the electrifying 2024 competition heads to a showdown in Shanghai, we invite you to be part of an unparalleled racing experience. Coming off a sensational victory in Berlin, the Jaguar TCS Racing team is poised to continue their championship quest, and you can witness it all from the front row with our exclusive Virtual Garage Tour on May 23rd.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. The post Spotlight Podcast: CSO Chris Walcutt on. Read the whole entry. » Click the icon below to listen.

Risk 59
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Enhancing data security and compliance in the XaaS Era 

IBM Big Data Hub

Recent research from IDC found that 85% of CEOs who were surveyed cited digital capabilities as strategic differentiators that are crucial to accelerating revenue growth. However, IT decision makers remain concerned about the risks associated with their digital infrastructure and the impact they might have on business outcomes, with data breaches and security concerns being the biggest threats.

article thumbnail

Will PSD3 revolutionize European payments?

CGI

This CGI blog post discusses the impact of PSD3 on European payments.

52
article thumbnail

Living “the future of our past”: Celebrating the 30th Anniversary of Archives II

Unwritten Record

This post was created in collaboration with Phillip Wong, Archives Technician in the Still Picture Branch. On October 17, 1989, the ground shook as a 6.9 magnitude earthquake hit San Francisco, interrupting game 3 of the World Series between the San Francisco Giants and the Oakland Athletics. Across the country, the ground was also shifting. Politicians and Archives staff were breaking ground on Archives II, the new DC-area National Archives building that would ease the storage issues that had b

article thumbnail

Preserving Korean American History in Chicago

Archive-It

Guest post by Julie Lynch (she/her), Northside Neighborhood History Collection, Chicago Public Library This post is part of a series written by members of the Community Webs program. Community Webs advances the capacity for community-focused memory organizations to build web and digital archives documenting local histories and underrepresented voices.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.