Fri.Apr 19, 2024

article thumbnail

Mitre Says Hackers Breached Unclassified R&D Network

Data Breach Today

Threat Actor Exploited Ivanti Zero-Day Vulnerabilities in Cyberattack A nation-state threat actor gained access into an unclassified research and development network operated by MITRE, a non-profit that oversees key federal funded research and development centers for the U.S. government, the organization confirmed on Friday.

article thumbnail

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

Security Affairs

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by exploiting Ivanti VPN zero-days. In April 2024, MITRE disclosed a security breach in one of its research and prototyping networks. The security team at the organization promptly launched an investigation, logged out the threat actor, and engaged third-party forensics Incident Response teams to conduct independent analysis in collaboration with internal experts.

IT 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Threatens to Expose Sensitive World-Check Database

Data Breach Today

'GhostR' Claims to Have 5.3 Million Records from Major Screening Database A seemingly financially-driven hacker known as GhostR claimed to have stolen millions of highly-sensitive records from a "know-your-customer" database used by the London Stock Exchange Group to combat financial crimes and enforce global sanctions.

182
182
article thumbnail

FBI chief says China is preparing to attack US critical infrastructure

Security Affairs

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher Wray. FBI Director Christopher Wray warned this week that China-linked threat actors are preparing an attack against U.S. critical infrastructure, Reuters reported. According to the FBI chief, the Chinese hackers are waiting “for just the right moment to deal a devastating blow.” In February, US CISA, the NSA, the FBI, along with partner Five Eyes agencies, publ

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

UK ICO Weighs Role of 'Accuracy' in Generative AI

Data Breach Today

But Accurate Data Doesn't Always Result In Accurate Outcomes The U.K. data protection agency says generative artificial intelligence developers should take steps to filter out inaccurate training data so long as their models disseminate information about people. How accurate a model must be depends on its use, the Information Commissioner's Office said.

More Trending

article thumbnail

CEO Andre Durand on Why Ping, ForgeRock Are Better Together

Data Breach Today

How Ping-ForgeRock Merger Provides Enhanced Deployment Flexibility, More Services Ping Identity CEO Andre Durand elaborated on the merger with ForgeRock, highlighting the synergy between the two companies. Durand noted the enhanced deployment options and service capabilities now available to global enterprises, which he said is unique in the market.

Marketing 162
article thumbnail

Russian Threat Actor FIN7 Targeting the Automotive Industry with Spear Phishing Attacks

KnowBe4

The cybercriminal threat actor FIN7 is launching spear phishing attacks against the automotive industry in the United States, according to researchers at BlackBerry.

Phishing 122
article thumbnail

Suspected Attack Shuts Down US Blood Plasma Donation Centers

Data Breach Today

Swiss-Based Octapharma Plasma Says Co. is Dealing with 'Network Issues' The U.S. operations of a Swiss pharmaceutical maker has shut down nearly 200 blood plasma donation centers while the company responds to "network issues" that started earlier this week and have reportedly been caused by a suspected Blacksuit ransomware gang attack.

article thumbnail

Machine vs. machine

OpenText Information Management

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind. Every technology has dual usage and Mav is here to keep us all informed. You: How has AI evolved the landscape of security? MAV: Unfortunately, the amount and frequency of fake information has skyrocketed.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ISMG Editors: Global Fallout From Leaked LockBit Ransomware

Data Breach Today

Also: Congress Weighs in on Change Healthcare Saga; Hot Topics at ISMG’s AI Summit In the latest weekly update, ISMG editors discussed the rise of criminal groups using leaked LockBit ransomware for global cyberattacks, Congress's recent hearing on the cyberattack targeting Change Healthcare and takeaways from ISMG’s Cybersecurity Implications of AI Summit

article thumbnail

The journey to a mature asset management system

IBM Big Data Hub

This blog series discusses the complex tasks energy utility companies face as they shift to holistic grid asset management to manage through the energy transition. Earlier posts in this series addressed the challenges of the energy transition with holistic grid asset management, the integrated asset management platform and data exchange, and merging traditional top-down and bottom-up planning processes.

article thumbnail

Novel Android Malware Targets South Korean Banking Users

Data Breach Today

New Malware SoumniBot Exploiting Legitimate Android Process A new banking Trojan is targeting Korean users using obfuscation techniques that target the Android manifest, exploit vulnerabilities and take advantage of weaknesses in how Android apps interpret this file. SoumniBot stands out for its approach to camouflaging its malicious intent.

IT 162
article thumbnail

ISPs must display labels with price, speeds, and data caps via ars Technica

IG Guru

Check out the post here. The post ISPs must display labels with price, speeds, and data caps via ars Technica first appeared on IG GURU.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Breach Roundup: LabHost Phishing-as-a-Service Site Goes Down

Data Breach Today

Also: Omni Hack Exposed Customer Data; More Ivanti Vulnerabilities Come to Light This week, police disrupted the LabHost phishing-as-a-service site, customer data compromised in Omni Hotels hack, more Ivanti vulnerabilities found, Moldovan botnet operator faces U.S. charges, Cisco warned of a data breach in Duo and a Spanish Guardia Civil contractor suffered a ransomware attack.

Phishing 162
article thumbnail

IoT: Living at the edge  

OpenText Information Management

Greetings from Viper, trusted partner for your AI journey. This AI-generated hummingbird has been busy buzzing around in the clouds, figuring out how companies can best manage data and devices at the edge. Good thing there is more nectar to fuel her up, she’s going to need it! You: What is IoT? VIPER: Well, if IoT was an emoji or an expression, it would be: (1) a cloud with legs, (2) a tornado of devices, or (3) an air-tag tracking anything (keys, dog, purse, avocado).

IoT 69
article thumbnail

FIN7 Targeted US Automotive Giant In Failed Attack

Data Breach Today

Spear Phishing Messages Sent to Emplpyees With Admin Rights A Russia-based cybercriminal group targeted a large American auto manufacturer, more evidence of its shift to deep-pocketed victims the gang hopes will deliver a major payday. FIN7 - also known as Carbon Spider and Sangria Tempest - targeted employees with “high levels of administrative rights.

article thumbnail

Next-gen developer experience

OpenText Information Management

Greetings from Goose, a trusted partner for your AI journey. This AI-generated goose has been the champion of seven-star experiences, and over the last few months he’s focused in on the needs and wants of the next generation of developers. You: How many lines of code do you think it takes to run a modern car or an airplane? GOOSE: Probably more than 100 million lines of code.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

The original MusicPlasma interface. Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. Most of my first book was written to a series of CDs I purchased from Amazon and ripped to my Mac – early turn of the century electronica, for the most part – Prodigy, Moby, Fat Boy Slim and the like.

Mining 52
article thumbnail

Autonomous cloud operations

OpenText Information Management

Greetings from Skye, a trusted partner for your AI journey. This AI-generated llama has been living in the clouds, creating her own cloud trails to follow. Skye has spent the last six months working with IT departments to better understand current and future needs for cloud operations. You: What is going on in IT departments around the globe? SKYE: Limited resources, too many priorities, AI creating new parameters and needs.

Cloud 59
article thumbnail

Rising Ransomware Issue: English-Speaking Western Affiliates

Data Breach Today

Domestic Teen Groups Demand 'Nip the Bud' and 'Alternative Pathways,' Experts Say Western law enforcement agencies are battling a rise in domestic ransomware attackers. Given the "significant" resources being poured into combating ransomware, signing up for a ransomware crew from your home in the U.S., Canada or the U.K. might seem foolhardy in the extreme.

article thumbnail

The Biggest Deepfake Porn Website Is Now Blocked in the UK

WIRED Threat Level

The world's most-visited deepfake website and another large competing site are stopping people in the UK from accessing them, days after the UK government announced a crackdown.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Friday Squid Blogging: Squid Trackers

Schneier on Security

A new bioadhesive makes it easier to attach trackers to squid. Note: the article does not discuss squid privacy rights. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Privacy 102