Fri.Mar 22, 2024

article thumbnail

Mozilla Drops Onerep After CEO Admits to Running People-Search Networks

Krebs on Security

The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep , an identity protection service recently bundled with Firefox that offers to remove users from hundreds of people-search sites. The move comes just days after a report by KrebsOnSecurity forced Onerep’s CEO to admit that he has founded dozens of people-search networks over the years.

article thumbnail

Nursing Home Declares Bankruptcy, Blames Recent Cyberattacks

Data Breach Today

Also, Senate Bill Proposes Payment Relief for Firms Meeting Cyber 'Standards' A nursing home operator is seeking bankruptcy protection, citing the effects of a ransomware attack last fall and fallout from the recent Change Healthcare outage as factors that contributed to its financial woes. Also, a Senate bill aims to address cash flows for some health firms hit by an attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pwn2Own Vancouver 2024: participants earned $1,132,500 for 29 unique 0-days

Security Affairs

Pwn2Own Vancouver 2024 hacking competition has ended, and participants earned $1,132,500 for demonstrating 29 unique zero-days. Trend Micro’s Zero Day Initiative (ZDI) announced that participants earned $1,132,500 on the Pwn2Own Vancouver 2024 hacking competition for demonstrating 29 unique zero-days. On day one , the Team Synacktiv successfully demonstrated exploits against a Tesla car.

article thumbnail

Russian Nation-State Hacker Targets German Political Parties

Data Breach Today

Latest APT29 Campaign Uses a Previously Unseen Malware Backdoor A Russian hacking group is targeting German political parties as part of a Moscow-backed espionage campaign. The latest APT29 campaign marks the first time the group has been seen targeting political organizations, according to researchers at Mandiant.

306
306
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Unsaflok flaws allow to open millions of doors using Dormakaba Saflok electronic locks

Security Affairs

A flaw in Dormakaba Saflok electronic locks, dubbed Unsaflok, can allow threat actors to open millions of doors worldwide. Researchers Lennert Wouters , Ian Carroll , rqu , BusesCanFly , Sam Curry , sshell , and Will Caruana discovered a series of vulnerabilities, collectively named Unsaflok, in Dormakaba Saflok electronic RFID locks. The researchers explained that the issues be chained to forge keycards.

More Trending

article thumbnail

Google Pays $10M in Bug Bounties in 2023

Schneier on Security

BleepingComputer has the details. It’s $2M less than in 2022, but it’s still a lot. The highest reward for a vulnerability report in 2023 was $113,337, while the total tally since the program’s launch in 2010 has reached $59 million. For Android, the world’s most popular and widely used mobile operating system, the program awarded over $3.4 million.

Security 112
article thumbnail

Likely Chinese Hacking Contractor Is Quick to Exploit N-Days

Data Breach Today

UNC5174 Exploited F5 BIG-IP and ScreenConnect Vulnerabilities A likely Chinese hacker-for-hire used high-profile vulnerabilities in a campaign targeting a slew of Southeast Asian and U.S. governmental and research organizations, says threat intel firm Mandiant. Rapid exploitation of newly patched flaws has become a hallmark of Chinese threat actors.

283
283
article thumbnail

Navigating change: Why managed services make sense for insurance carriers

CGI

The property and casualty insurance industry continues to face economic pressures, talent shortages, and the need to adapt quickly in a climate of rapid change. According to our latest Voice of Our Clients research, difficulty hiring IT talent continues to be a top challenge across the industry. Many carriers struggle to train talent fast enough to keep pace with digital modernization requirements and changing customer expectations.

article thumbnail

CISOs: Make Sure Your Team Members Fit Your Company Culture

Data Breach Today

Why? Because 'Culture Eats Strategy for Breakfast,' as the Saying Goes Chief information security officers are challenged with building high-functioning cybersecurity teams amid an impossible labor and skills market. Here are strategies they can use to assemble teams capable of defending their organizations against the myriad of cyberthreats they face daily.

Marketing 284
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Driving quality assurance through the IBM Ignite Quality Platform

IBM Big Data Hub

Quality Assurance (QA) is a critical component of the software development lifecycle, aiming to ensure that software products meet specified quality standards before release. QA encompasses a systematic and strategic approach to identifying, preventing and resolving issues throughout the development process. However, various challenges arise in the QA domain that affect test case inventory, test case automation and defect volume.

article thumbnail

Iranian TA450 Group Tries Out New Tactics on Israelis

Data Breach Today

Proofpoint Researchers Say Beware of Phishing Emails, Embedded Links in PDFs Iran-aligned threat actor TA450, also called MuddyWater, is using fake salary, compensation and financial incentive emails to trick Israeli employees at multi-national organizations into clicking malicious links, according to researchers at security firm Proofpoint.

Phishing 268
article thumbnail

Hackers use pirated software to hijack Mac, Android and Windows devices via Fox News

IG Guru

Check out the link here. The post Hackers use pirated software to hijack Mac, Android and Windows devices via Fox News first appeared on IG GURU.

article thumbnail

GitLab Acquires Oxeye to Bolster SAST in DevSecOps Workflow

Data Breach Today

Acquisition Promises Enhanced Application Security and Reduced False Positives The integration of Oxeye into GitLab’s suite marks a significant leap in the accuracy and efficiency of security scans, directly addressing the challenge of false positives in static application security testing and enhancing software security across development stages, according to GitLab.

Security 257
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

OpenText Summit | Houston Energy 2024 summary & key takeaways

OpenText Information Management

Hello from Alaska! Last week industry leaders, experts, and innovators gathered at the Houston Aquarium for the OpenText Energy Summit in Houston , a pivotal event driving conversations on the intersection of artificial intelligence, information management, and energy sector dynamics. The summit provided valuable insights into the future of energy operations with AI.

article thumbnail

Identity Security Clinic

Data Breach Today

See Also: When Every Identity is at Risk, Where Do You Begin? Introducing CyberArk’s Identity Security Clinic.

Security 262
article thumbnail

e-Invoicing mandates and updates: Germany

OpenText Information Management

March 2024 German Federal Council officially approves law driving the e-Invoicing mandate On 22nd March 2024 The German Bundesrat - the Federal Council - officially approved the Federal Government's Growth Opportunities Act, which is the legal instrument that includes the provisions for the planned e-Invoicing mandate. The law had undergone criticism and review but was finally passed with a clear majority.

article thumbnail

The history of Apple device management: where we started

Jamf

The future of Apple Mobile Device Management (MDM) is declarative device management. But how did we get here?

MDM 81
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Navigating the integration of AI with anti-money laundering

CGI

This CGI blog post covers key considerations in navigating the integration of artificial intelligence with anti-money laundering.

article thumbnail

Zero Trust vs Least Privilege

Jamf

Explore the critical differences and synergies between Zero Trust and Least Privilege models in cybersecurity. Learn how to enhance your security posture.

article thumbnail

The 2024 California CIO Academy: Musings From an eDiscovery Guy

eDiscovery Daily

Spending the past 20+ years in forensics, eDiscovery, and investigations has kept me in a legal conference circuit lane, but this week I stepped into a new and interesting adjacent world: information technology leadership in public service. This conference is formally called the California Public Sector CIO Academy and its organizer, e.republic, hosted over 800 attendees from all over the state.

article thumbnail

Friday Squid Blogging: New Species of Squid Discovered

Schneier on Security

A new species of squid was discovered , along with about a hundred other species. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Biden's Economic Team Warns of AI Risks and Job Displacement

Data Breach Today

US Council of Economic Advisers Includes AI Section in Newly Released Report The 2024 Economic Report of the President includes a chapter on artificial intelligence that warns of the risks associated with AI-fueled job displacement and discrimination. The report also highlights the benefits associated with the federal government harnessing AI tools.