Thu.Jan 25, 2024

article thumbnail

ITRC Report: Breaches Up 78% in 2023, Breaking 2021 Record

Data Breach Today

Identity Theft Resource Center's James E. Lee Calls for Uniform Breach Reporting Supply chain attacks and zero-day exploits surged in 2023, helping to set yet another record for data breaches tracked by the Identity Theft Resource Center. James E. Lee, COO of the group, explained why the number of compromises grew so dramatically - from 1,801 incidents in 2022 to 3,205 in 2023.

article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.

IT 301
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Hacker Sentenced to Over 5 Years in US Prison

Data Breach Today

Vladimir Dunaev Acknowledged Acting 'Recklessly' in Working for Cybercriminal Group A U.S. federal judge sentenced a Russian national to five years and four months in prison for his role in developing TrickBot malware. Vladimir Dunaev, 40, pleaded guilty in December. Dunaev helped develop the malware "while hiding behind his computer," U.S. Attorney Rebecca Lutzko said.

298
298
article thumbnail

How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar

WIRED Threat Level

From repeatedly crippling thousands of gas stations to setting a steel mill on fire, Predatory Sparrow’s offensive hacking has now targeted Iranians with some of history's most aggressive cyberattacks.

Security 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Weasel Words Rule Too Many Data Breach Notifications

Data Breach Today

'The Security of Our Customers' Data Is Our Top Priority' - Really? Does a day ever go by without a fresh set of data breach notifications? Some organizations' breach notifications at least signal respect for the recipient. But others play it shadier, by resorting to marketing spin, minimizing the blame, and in some cases, even indulging in corporate cheerleading.

More Trending

article thumbnail

Breach Roundup: EquiLend Faces Cyberattack, Systems Offline

Data Breach Today

Also: Ivanti Exploitation Continues; Apple Fixes First Zero-Day of 2024 This week, U.S. short seller lender EquiLend Holdings was hacked, the Ivanti exploitation continued, Apple addressed the first zero-day of 2024, Ukraine said hackers had hit a Russian research center, Kasseika ransomware evolved, North Korean hackers were active, and Trello experienced a data leak.

article thumbnail

Yearly Intel Trend Review: The 2023 RedSense report

Security Affairs

The 2023 RedSense report covers long-term observations we have made regarding intel trends and interconnectivity. These observations were made by analyzing numerous 2023 threat findings and discoveries, and include references to case studies that were reported on by RedSense throughout the year. Trend Analysis Ghost Group Operations: A notable increase in covert ‘ghost groups’ like Zeon/ Ryuk /Conti1, providing backend support to groups such as BlackCat , Akira , and LockBit 3.0.

article thumbnail

US FTC Launches Investigation Into Tech Giants' AI Influence

Data Breach Today

Chair Lina Khan Says Probe Will Look for Potential 'Undue Influence' The Federal Trade Commission is investigating whether five artificial intelligence technology giants are exerting undue influence or gaining privileged access "in ways that undermine fair competition" across the generative AI sector, said Chairwoman Lina Khan.

article thumbnail

Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

WIRED Threat Level

Newly disclosed breaches of Microsoft and Hewlett-Packard Enterprise highlight the persistent threat posed by Midnight Blizzard, a notorious Russian cyber-espionage group.

Security 130
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Resilience: The New Priority for Your Security Model

Data Breach Today

Security leaders focus on protection and detection, but the new priority is resilience. A resilience strategy should "get the real 'ground truth' of what has happened" in the attack, said Brian Dye, CEO of Corelight, in this episode of "Cybersecurity Insights.

Security 271
article thumbnail

The Number of Ransomware Attack Victims Surge in 2023 to over 4000

KnowBe4

The surge in Ransomware -as-a-Service affiliates is likely the reason behind the dramatic increase in the number of victimized organizations, with all indicators suggesting that this trend will persist into 2024.

article thumbnail

OnDemand Panel | Mitigating Risks in Pharmacy Environments: Effective Tactics Unveiled

Data Breach Today

Strengthening OT Security with HCLTech and Microsoft In an age reliant on operational technology, ensuring robust security for diverse industries is crucial. Join us as we discuss operational challenges, highlighting specific threats faced by businesses today. Explore how the powerful alliance between HCLTech and Microsoft empowers organizations to safeguard critical assets and enhance resilience against evolving threats.

Risk 271
article thumbnail

New Deepfake Video Scam has “Taylor Swift” Offering Free French Cookware

KnowBe4

A new wave of ads utilizing video of well-known celebrities seemingly promoting video games, fake giveaways, and more are starting to popup, and fans are falling for this trap.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Feds Warn Healthcare Sector of ScreenConnect Threats

Data Breach Today

HHS: Compromise at Large Pharma Software and Services Firm Puts Entities at Risk Federal authorities are warning of attacks on healthcare sector firms that use ConnectWise's remote access tool ScreenConnect. Hackers compromised a locally hosted version of the tool used by a large national pharmacy supply chain and managed services provider in 2023.

Risk 265
article thumbnail

Social Engineering Attacks Rising in the Trucking Industry

KnowBe4

Spear phishing and voice phishing (vishing) are on the rise in the trucking industry, according to a new report from the National Motor Freight Traffic Association (NMFTA).

Phishing 123
article thumbnail

Quantum Computing Skeptics

Schneier on Security

Interesting article. I am also skeptical that we are going to see useful quantum computers anytime soon. Since at least 2019, I have been saying that this is hard. And that we don’t know if it’s “land a person on the surface of the moon” hard, or “land a person on the surface of the sun” hard. They’re both hard, but very different.

IT 116
article thumbnail

Browser-based Phishing Attacks Increase By 198% Over Six Months

KnowBe4

Researchers at Menlo Security observed a 198% increase in browser-based phishing attacks over the past six months.

Phishing 122
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How Belgian MP turned sleuth to solve London Ulez fine mystery

The Guardian Data Protection

Politician tells of trips to city to secure key evidence on thousands of potential data breaches by TfL collection agents My surprising journey began two years ago when friends and acquaintances who had visited London received hefty fines, some amounting to thousands of euros, for allegedly contravening London’s emissions zone regulations. The letters accompanying the penalties accused them of entering the city’s low emissions zone (Lez) without paying the daily charge.

article thumbnail

HP Enterprise Reveals It was hacked by the same Russians that broke into Microsoft

KnowBe4

In a new SEC disclosure, Hewlett Packard Enterprise (HPE) announced on Wednesday that it fell prey to the same Russian intelligence group, known as Midnight Blizzard or Cozy Bear, that recently breached Microsoft's email system. This disclosure comes just a week after Microsoft reported a similar intrusion, putting the spotlight back on this notorious hacking group.

IT 118
article thumbnail

Balancing AI: Do good and avoid harm

IBM Big Data Hub

Growing up, my father always said, “do good.” As a child, I thought it was cringeworthy grammar and I would correct him, insisting it should be “do well.” Even my children tease me when they hear his “do good” advice and I’ll admit I let him have a pass on the grammar front. In the case of responsible artificial intelligence (AI), organizations should prioritize the ability to avoid harm as a central focus.

article thumbnail

Supercharge your business with Copilot for Microsoft 365

OpenText Information Management

Previously only available through Enterprise Agreements for a minimum of 300 users, Copilot for Microsoft 365 now brings an entirely new way of working for small to medium-sized businesses (SMBs). For OpenText™ Cybersecurity partners, Copilot for Microsoft 365 is an opportunity to supercharge their Microsoft Cloud Solution Provider (CSP) businesses by helping customers take full … The post Supercharge your business with Copilot for Microsoft 365 appeared first on OpenText Blogs.

Cloud 64
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The importance of diversity in AI isn’t opinion, it’s math

IBM Big Data Hub

We all want to see our ideal human values reflected in our technologies. We expect technologies such as artificial intelligence (AI) to not lie to us, to not discriminate, and to be safe for us and our children to use. Yet many AI creators are currently facing backlash for the biases, inaccuracies and problematic data practices being exposed in their models.

article thumbnail

Join the Inaugural ICRM Virtual Mixer to Leap into RIM Month

IG Guru

Members, Candidates, and Prospects, Join us for the Inaugural ICRM Virtual Mixer to Leap into RIM Month on Thursday, February 29, from 2:00 – 3:00 pm ET. Take advantage of Leap Day this year and get a jump on RIM Month. Join the ICRM for our first virtual mixer for all members, candidates, and prospects. We will focus on […] The post Join the Inaugural ICRM Virtual Mixer to Leap into RIM Month first appeared on IG GURU.

article thumbnail

MRO spare parts optimization

IBM Big Data Hub

Many managers in asset-intensive industries like energy, utilities or process manufacturing, perform a delicate high-wire act when managing inventory. Finding the right balance becomes crucial for helping ensure the success of maintenance, repair and operations (MRO) initiatives, specifically the spare parts that support them. What’s at stake?

article thumbnail

Adapture Appointed Cloudflare Authorized Service Delivery Partner

Adapture

Atlanta-Based IT Consultancy achieves multi-discipline ASDP status for Application Services, Zero Trust Services and Migration Services ATLANTA, Jan. 25, 2023 – Adapture, a leader in networking, security and infrastructure consulting, has been appointed as a Cloudflare Authorized Service Delivery Partner (ASDP) for Application Services, Zero Trust Services and Migration Services.

Cloud 52
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Customer experience examples that drive value

IBM Big Data Hub

Organizations that provide an excellent customer experience (CX) can improve sales revenues by 2 to 7 percent and profitability by 1 to 2 percent, according to McKinsey. It’s no surprise. Focusing on good CX can increase customer satisfaction and drive more meaningful customer interactions, ultimately increasing sales and customer retention. As such, more organizations are increasing their dedication to CX strategy and looking towards successful customer experience examples for inspiration

article thumbnail

Upcoming RMS Coffee Chat: From Chaos to Control: Building a Strong Records Management Program From Scratch 

The Schedule

Join us February 5th, 2024, at 3pm EST, for “From Chaos to Control: Building a Strong Records Management Program From Scratch.” Ryan Leimkuehler, University Archivist at Kansas State University, and Daria Labinsky, Records and Information Management Specialist for the U.S. Fish and Wildlife Service, will share what they have learned from helping to start records management programs and will discuss how their organizations approached it.

article thumbnail

Banks to Ramp Up Spending on Generative AI Tenfold by 2030

Information Matters

A new report published by Juniper Research predicts that global spending by banks on generative artificial intelligence will increase exponentially over the next decade. Generative AI platforms, which can create Read more The post Banks to Ramp Up Spending on Generative AI Tenfold by 2030 appeared first on Information Matters - Where AI Meets Knowledge Management.