Tue.Sep 17, 2024

article thumbnail

Exploding Hezbollah Pagers Not Likely a Cybersecurity Attack

Data Breach Today

Cybersecurity Experts Say Operatives Probably Intercepted Physical Supply Chain It doesn't appear to be a cyberattack, security experts said of the hundreds of pagers that blew up Tuesday across Lebanon, an apparent salvo against Hezbollah militants by the Israeli government. "The only logical explanation is that explosives and a side channel for detonation was likely used.

article thumbnail

The Rising Importance of Information Management in the Age of AI

AIIM

As the potential of Generative AI (Gen AI) continues to unfold, one resounding theme emerges: better AI starts with better information management. The ability of Gen AI to deliver reliable and valuable outputs is directly contingent upon the quality and curation of the underlying data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can CISA’s Federal Cybersecurity Alignment Plan Really Work?

Data Breach Today

Experts Warn Federal Cyber Strategies Increasingly Lack Accompanying Resources The U.S. Cybersecurity and Infrastructure Security Agency has released a new plan to further align federal cybersecurity operations that experts say will likely face significant implementation roadblocks due to a lack of funding, leadership buy-in and technical resources.

article thumbnail

The Mystery of Hezbollah’s Deadly Exploding Pagers

WIRED Threat Level

At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point toward a supply chain compromise, not a cyberattack.

Security 135
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Apple Moves to Dismiss Suit Against Spyware Firm NSO Group

Data Breach Today

iPhone Maker Seeks Voluntary Dismissal, Citing Concerns Over Sensitive Data Leaking Apple has filed a motion to dismiss its lawsuit against NSO Group, citing concerns over the potential exposure of sensitive threat intelligence information. The tech giant believes continuing the lawsuit could compromise its ability to protect users and lead to the disclosure of sensitive data.

IT 185

More Trending

article thumbnail

UK Orgs Tout Government Help in Ransomware Incidents

Data Breach Today

Former Royal Mail and Manchester University CISOs Talk Ransomware Response Timely notification of ransomware incidents to British law enforcement agencies played a crucial role in understanding the threats and in developing mitigation strategies, the former security heads of Royal Mail and the University of Manchester said.

article thumbnail

Remotely Exploding Pagers

Schneier on Security

Wow. It seems they all exploded simultaneously, which means they were triggered. Were they each tampered with physically, or did someone figure out how to trigger a thermal runaway remotely? Supply chain attack? Malicious code update, or natural vulnerability? I have no idea, but I expect we will all learn over the next few days. EDITED TO ADD: I’m reading nine killed and 2,800 injured.

Security 100
article thumbnail

BlackCloak Raises $17M to Boost Cybersecurity for Executives

Data Breach Today

New Funding Will Help BlackCloak Improve Protection Against Rising Cyberthreats BlackCloak’s $17 million Series B funding round will help the company triple its engineering and product teams, enhancing cybersecurity for executives and high-net-worth individuals. The funding will help BlackCloak address emerging issues such as deepfakes and threat intelligence and modeling.

article thumbnail

Chinese man charged for spear-phishing against NASA and US Government

Security Affairs

US DoJ charged a Chinese national who used spear-phishing emails to obtain sensitive info from NASA, the U.S. Air Force, Navy, Army, and the FAA. The U.S. DoJ charged a Chinese national, Song Wu (39), who used spear-phishing emails to target employees of NASA, the U.S. Air Force, Navy, Army, and the FAA.” The man, who remails at large, used fake email accounts posing as US-based researchers and engineers to target government personnel to obtain software and source code created by the Natio

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Python Developers Targeted with Malware During Fake Job Interviews

Schneier on Security

Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article These particular attacks from North Korean state-funded hacking team Lazarus Group are new, but the overall malware campaign against the Python development community has been running since at least August of 2023, when a number of popular open source Python tools were maliciously duplicated with added malware.

IT 96
article thumbnail

8 Ways to Reduce Your PCI DSS Compliance Burden

IT Governance

How to reduce your PCI DSS scope and CDE The PCI DSS (Payment Card Industry Data Security Standard) – now at v4.0.1 – can appear intimidating, at 360 pages, listing 277 prescriptive sub-requirements. But this robust standard, administered by the PCI SSC (Payment Card Industry Security Standards Council), recognises that not every organisation accepting card payments needs to meet all 277 requirements.

article thumbnail

Taking Control Online: Ensuring Awareness of Data Usage and Consent

Security Affairs

Why do consumers refuse to consent to their data being shared? Ensuring transparency on their usage and consent. In the digital world, trust is essential for the relationships between brands and consumers. However, trust is not a once-off exercise; it’s a continuous process in which each interaction helps build and nurture loyalty over time. This is why it’s crucial to understand the factors contributing to trust, particularly how online brands manage consumers’ personal data.

article thumbnail

This portable monitor has a game-changing feature for remote workers

Collaboration 2.0

Plugable's 15.6-inch portable monitor is a second screen for your laptop, powered by USB-C pass-through for a one-click setup.

98
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

From Dreams to Reality: The Magic of 3D Printing, with Elle Hunt

Troy Hunt

I was in my mid-30s before I felt comfortable standing up in front of an audience and talking about technology. Come to think of it, "comfortable" isn't really the right word, as, frankly, it was nerve-racking. This, with my obvious bias as her father, makes it all the more remarkable that Elle was able to do it at NDC Oslo when she was just 11 years old.

IT 80
article thumbnail

Qilin ransomware attack on Synnovis impacted over 900,000 patients

Security Affairs

The personal information of a million individuals was published online following a ransomware attack that in June disrupted NHS hospitals in London. In June, a ransomware attack on pathology and diagnostic services provider Synnovis has severely impacted the operations at several major NHS hospitals in London. The attack forced the impacted hospitals to cancel some healthcare procedures, in some cases, patients were redirected to other hospitals.

article thumbnail

How to create IFTTT automations on Android - and why you should

Collaboration 2.0

Have you ever wished Android had the built-in ability to automate daily tasks? If so, you might want to look into IFTTT.

91
article thumbnail

CyberheistNews Vol 14 #38 [CODE RED] A Must-See New Webinar: How To Block North Korean Infiltrators

KnowBe4

Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection. [4-Minute Survey] Share Your Thoughts on AI in InfoSec With Me? Email not displaying? | View Knowbe4 Blog CyberheistNews Vol 14 #38 | September 17th, 2024 [CODE RED] A Must-See New Webinar: How To Block North Korean Infiltrators I don't often ask you to change your plans, but please take an hour today for a critical on-demand "Lunch & Learn.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

The best SSH clients for Android - including my two favorites

Collaboration 2.0

Connecting to an SSH-enabled machine from Android doesn't have to be hard - and these apps prove it.

IT 95
article thumbnail

Cost of Cybercrime Estimated 15.6 Trillion in 2029

KnowBe4

Statista projects that the total cost of cybercrime will increase from $6.4 trillion between 2024 and 2029, reaching a staggering $15.63 trillion by the end of this period.

63
article thumbnail

Equipping threat hunters: Advanced analytics and AI part 1

OpenText Information Management

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The shortage of cybersecurity expertise and the sheer volume of data to analyze has led organizations to seek a balanced approach to threat detection. This approach integrates the precision of rule-based detection, the adaptability of AI/ML models, and the critical thinking of humans.

article thumbnail

These Linux distributions are best for developers - here's why

Collaboration 2.0

Sure, Linux is a great OS for all sorts of users. But developers need just the right tools to do their jobs - and these 5 distros deliver.

75
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

WordPress To Require Two-Factor Authentication for Plugin Developers

eSecurity Planet

With over 40% of the world’s websites powered by WordPress, its vast ecosystem of plugins and themes offers flexibility and customization on a global scale. However, this popularity also makes it a prime target for cyberattacks. WordPress is introducing mandatory two-factor authentication (2FA) for all plugin and theme developers to tackle rising security threats, effective October 1, 2024.

article thumbnail

Get a Microsoft Office for Windows license for $35 - the lowest price so far

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 84% off right now (there's a deal for a Mac version, too).

84
article thumbnail

[Cybersecurity Awareness Month] Prepare for All Manner of Cyber Threats Like the Heroes of ‘The Inside Man’

KnowBe4

KnowBe4's Data-Driven Defense Evangelist Roger A.

article thumbnail

I made these 3 changes to my projector setup for the best viewing experience

Collaboration 2.0

Projectors are becoming increasingly popular for creating a theatre-like experience in your home. Here are some considerations for casting the best picture quality onto your wall or screen.

84
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

What is Engineering Data Management

Synergis Software

Engineering Data & Document Management Systems (EDMS) are foundational to modern industrial operations. They are software solutions for the turnkey management of all engineering asset information as used in industries such as energy, utilities, chemicals, oil & gas, pharmaceuticals, manufacturing, and mining. These solutions provide organizations with fast, centralized access to their most important designs, documents, and data in a secure, collaborative platform.

article thumbnail

My favorite USB-C accessory of all time scores a magnetic upgrade (and it's 30% off)

Collaboration 2.0

USB-C ports can be fragile, and a ripped cord can seriously damage your laptop. This clever MagSafe-like gadget keeps your laptop safe.

IT 72
article thumbnail

Staying Professional in a storm

CILIP

Staying Professional in a storm What happens when a library is attacked by far-right rioters? Denise Jones, Acting Customer Services Manager, Liverpool Central Library, explains how the library service and the community reacted to events at the Spellow Library Hub in Liverpool. The mass stabbings and deaths of three children in Southport led to online speculation and misinformation about the identity of their killer and then to riots, with premises being attacked and looted.