Fri.Sep 20, 2024

article thumbnail

ENISA Warns About Hacktivist, Ransomware Crossover

Data Breach Today

Hacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says Ransomware hacks and self-declared hacktivist denial-of-services attacks were the most prolific threat to European Union members over the 12-month period ending in June, the EU cyber agency warned, adding that the nexus between nation-state hackers and hacktivist groups poses an emerging threat.

article thumbnail

Tor Project responded to claims that law enforcement can de-anonymize Tor users

Security Affairs

The maintainers of the Tor Project have responded to claims that German police have devised a technique to deanonymize users. The maintainers of the Tor Project have responded to claims that German law enforcement has devised a technique to deanonymize its users. According to German media, law enforcement has infiltrated the anonymizing network and in at least one case they unmasked a criminal.

Privacy 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Training AI on Social Media: What Could Go Wrong?

Data Breach Today

Unfiltered Training Data Can Cause Safety Issues, Spread Misinformation LinkedIn this week joined its peers in using social media posts as training data for AI models, raising concerns of trustworthiness and safety. The question for AI developers is not whether companies use the data or even whether it is fair to do so - it is whether the data is reliable or not.

IT 275
article thumbnail

U.S. CISA adds new Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Ivanti Cloud Services Appliance a path traversal vulnerability CVE-2024-8190 (CVSS score of 9.4) to its Known Exploited Vulnerabilities (KEV) catalog.

Cloud 128
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Quantum Risks Pose New Threats for US Federal Cybersecurity

Data Breach Today

Experts Say Feds May Face Cost and Timeline Challenges in Quantum Readiness The United States is preparing for an age of quantum computing as federal agencies roll out initiatives designed to boost "quantum readiness," and as experts warn the government may face issues that delay its ability to defend against a future of advanced threats enabled by the emerging technology.

Risk 272

More Trending

article thumbnail

Protecting Your Data and Company From Cyberthreats

Data Breach Today

Why Cybersecurity Is a Public Imperative Data is one of the most valuable assets in today's digital age. Cyberthreats come in many forms, such as phishing attacks, ransomware, data breaches and malware infections, and failing to protect your data can cause severe financial, reputational and operational damage.

article thumbnail

UNC1860 provides Iran-linked APTs with access to Middle Eastern networks

Security Affairs

Iran-linked APT group UNC1860 is operating as an initial access facilitator that provides remote access to Middle Eastern Networks. Mandiant researchers warn that an Iran-linked APT group, tracked as UNC1860, is operating as an initial access facilitator that provides remote access to target networks in the Middle East. UNC1860 is linked to Iran’s Ministry of Intelligence and Security (MOIS), the APT specializes in using customized tools and passive backdoors to gain persistent access to h

Access 126
article thumbnail

ISMG Editors: How to Survive a Major Ransomware Attack

Data Breach Today

CyberEdBoard Members and ISMG Editors on Incident Response, AI and Defense Trends This week, CyberEdBoard members Jon Staniforth and Helmut Spöcker joined ISMG editors to unpack the hot topics at ISMG's London Cybersecurity Summit 2024, including ransomware lessons learned, AI trends and the growing importance of continuous learning and resilience in the cybersecurity industry.

article thumbnail

Ukraine bans Telegram for government agencies, military, and critical infrastructure

Security Affairs

Ukraine’s NCCC banned the Telegram app for government agencies, military, and critical infrastructure, due to national security concerns. Ukraine’s National Coordination Centre for Cybersecurity (NCCC) has banned the Telegram messaging app on government agencies, military, and critical infrastructure, due to national security concerns. The ban does not affect Ukrainian citizens.

Military 137
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Who Will Take the Lead in Setting Healthcare AI Regulations?

Data Breach Today

It's yet to be determined whether a handful of states or the federal government will lead the charge in adopting comprehensive regulations involving the use of artificial intelligence in healthcare, said regulatory attorney Betsy Hodge, a partner in law firm Akerman.

article thumbnail

The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

Security Affairs

Microsoft warns that financially motivated threat actor Vanilla Tempest is using INC ransomware in attacks aimed at the healthcare sector in the U.S. Microsoft Threat Intelligence team revealed that a financially motivated threat actor, tracked as Vanilla Tempest (formerly DEV-0832 ) is using the INC ransomware for the first time to target the U.S. healthcare sector.

article thumbnail

London Cybersecurity Summit: Building Cyber Resilience

Data Breach Today

Security Leaders Explored Trends in Identity Threats, Post-Brexit Compliance and AI At the annual Cybersecurity Summit: London, Information Security Media Group recently brought together top cybersecurity professionals, executives and thought leaders to find solutions to the latest threats, identity-related weaknesses and emerging risks posed by AI technology.

article thumbnail

Clever Social Engineering Attack Using Captchas

Schneier on Security

This is really interesting. It’s a phishing attack targeting GitHub users, tricking them to solve a fake Captcha that actually runs a script that is copied to the command line. Clever.

Phishing 101
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Delay Upgrading to macOS Sequoia, Security Experts Recommend

Data Breach Today

Not Yet Compatible: Many Third-Party Endpoint Security, Authentication, VPN Tools Multiple makers of third-party Apple security tools, including CrowdStrike and SentinelOne, are warning users not to upgrade to the new macOS 15 Sequoia, pending needed OS bug fixes. Users have also reported seeing problems with third-party VPNs crashing and single sign-on tools failing.

Security 162
article thumbnail

California and artificial intelligence watermarking law

Data Protection Report

On September 19, 2024, California enacted another law relating to artificial intelligence, this time relating to watermarking. The new law ( SB 942 ) requires making certain AI detection tools available at no cost to users. The new law does not take effect until January 1, 2026. AI Detection Tools (SB 942) This bill, the California AI Transparency Act, will impose a series of obligations on GenAI providers related to the creation of AI content utilizing their systems.

article thumbnail

iPhone 16 Pro: Upgrading from iPhone 13 Pro or earlier? Your list of new features is impressive

Collaboration 2.0

The average iPhone upgrader has at least a 3 year-old phone. If you're coming from an iPhone 13 Pro or earlier, here's your list of upgrades for 2024.

98
article thumbnail

Phishing Attacks Abuse Content Creation and Collaboration Platforms

KnowBe4

Researchers at Barracuda have observed an increase in phishing attacks that abuse popular content creation and collaboration platforms. These include online graphic design platforms and document-sharing services widely used by educational institutions and businesses.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

I changed these 5 soundbar settings for a better TV viewing (and audio) experience

Collaboration 2.0

By adding a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are some ways to take your audio experience up a notch.

98
article thumbnail

How to use Jamf Teacher to restrict the Calculator app

Jamf

Learn how Jamf Teacher helps educators manage the new Calculator app in iPadOS 18 by restricting access during lessons to keep students focused on learning.

article thumbnail

Where's your BitLocker recovery key? How and why to save a copy before the next Windows meltdown

Collaboration 2.0

BitLocker encryption is a tremendous way to stop a thief from accessing your business and personal secrets. But don't let the tool lock you out of your PC. Here's how to save a secure backup copy of your encryption key for panic-free recovery.

article thumbnail

Online Scams Are Shortening Their Cycles and Making More Money

KnowBe4

New analysis of blockchain activity shows scammers are needing less time to be successful at obtaining crypto payments, and are seeing higher payoffs.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Where's your BitLocker recovery key? How to save a copy before the next Windows meltdown

Collaboration 2.0

BitLocker encryption is a tremendous way to stop a thief from accessing your business and personal secrets. But don't let the tool lock you out of your PC. Here's how to save a secure backup copy of your encryption key for panic-free recovery.

article thumbnail

OpenText Documentum: Trusted by industry behemoths and niche players alike

OpenText Information Management

OpenTextâ„¢ Documentumâ„¢ customers are a force. They are leaders and innovators in their industries, spanning banks, utilities, hospitals, life sciences organizations, transportation companies, retailers and more. They are organizations with massive and complex volumes of content, running some of the largest document management systems in the world. And we mean massive.

article thumbnail

5 Linux commands I use to keep my device running smoothly

Collaboration 2.0

Knowing what's going on under the hood of your Linux OS is essential for optimizing performance. These commands will give you insight into system resources and processes.

98
article thumbnail

Jamf After Dark: creativity with Jamf mobility

Jamf

Tim Knox and Jonathan Yuresko, Senior Consulting Engineers at Jamf, join Kat and Sean to discuss the creative solutions they’ve built for customers’ unique use cases.

45
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Upgrading to MacOS Sequoia? Here's why you may want to hold off

Collaboration 2.0

The new version of Apple's MacOS is breaking the functionality of security products from Microsoft, CrowdStrike, SentinelOne, and other vendors. But that's not all.

article thumbnail

Re-provision mobile devices with the Jamf Return to Service app

Jamf

The Return to Service app allows frontline staff to erase and reenroll an iPhone or iPad without intervention from IT admins. This blog discusses the Return to Service feature and outlines the Return to Service app available with Jamf Pro.

IT 40
article thumbnail

Thoughts control Alexa while OpenAI's o1-preview 'excels'

Collaboration 2.0

It was a somewhat practical week for the Innovation Index, with advancements in accessibility, reasoning, and digital protections for teens topping the leaderboard.

Access 75