Thu.Mar 21, 2024

article thumbnail

Water Sector Lacks Support to Meet White House Cyber Demands

Data Breach Today

Experts Say Water Sector Lacks Technical Resources to Comply With Federal Requests The White House convened state environmental, health and homeland security agencies Thursday as experts told ISMG water utilities across the country - particularly those in small, under-resourced communities - lack the funding and technical skills to implement federal cybersecurity recommendations.

article thumbnail

Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds

WIRED Threat Level

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

IT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Flipper Pushes Back on Proposed Canada Ban

Data Breach Today

Also: UnitedHealth Group, Nemesis Market, Phishing Tricks and AceCryptor This week, Flipper Devices petitioned Canada, UnitedHealth Group dealt with its attack, Nemesis Market was seized, phishers fooled ML, AceCryptor returned to Europe, Brazil and Ukraine made arrests, another Ivanti flaw, London rebuked for possible data exposure, and Fujitsu reported malware attack.

Phishing 297
article thumbnail

Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild

Security Affairs

Researchers released a PoC exploit for a critical flaw in Fortinet’s FortiClient Enterprise Management Server (EMS) software, which is actively exploited. Security researchers at Horizon3 have released a proof-of-concept (PoC) exploit for a critical vulnerability, tracked as CVE-2023-48788 (CVSS score 9.3), in Fortinet’s FortiClient Enterprise Management Server (EMS) software.

IT 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cryptohack Roundup: Ray Eviscerates Bankman-Fried

Data Breach Today

Also: CryptoFX Ponzi Scheme, North Korean Hackers Gonna Hack This week, FTX emergency CEO John Ray filleted previous CEO Sam Bankman-Fried, the SEC charged 17 members in a $300 million Ponzi scheme, Hong Kong warned against Bybit, reports said North Korea made half of its revenue from cyberattacks, and police rescued hundreds from a pig-butchering scam center.

IT 290

More Trending

article thumbnail

Revenue Cycle Firm Settles GitHub PHI Breach Lawsuit for $7M

Data Breach Today

Class Action Settlement Also Calls for MedData to Enhance Its Security Program Revenue cycle management firm MedData has agreed to a $7 million settlement in a class action lawsuit filed after an employee inadvertently uploaded and exposed the health and personal information of about 136,000 individuals on the public-facing part of GitHub for more than a year.

Security 289
article thumbnail

Pwn2Own Vancouver 2024 Day 1 – team Synacktiv hacked a Tesla

Security Affairs

Participants earned $732,500 on the first day of the Pwn2Own Vancouver 2024 hacking competition, a team demonstrated a Tesla hack. Participants earned $732,000 on the first day of the Pwn2Own Vancouver 2024 hacking competition for demonstrating 19 unique zero-days, announced Trend Micro’s Zero Day Initiative (ZDI). The experts successfully demonstrated exploits against a Tesla car, Linux and Windows operating systems, and more.

Security 137
article thumbnail

Denial-of-Service Attack Could Put Servers in Perpetual Loop

Data Breach Today

Researchers Spot Vulnerability in Application-Layer Communication Protocol A new type of denial-of-service threat can disrupt an estimated 300,000 internet hosts that are at risk of exploitation. Researchers at the CISPA Helmholtz Center for Information Security say attackers are using IP spoofing to entangle two servers in a perpetual communication loop.

article thumbnail

Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution

Security Affairs

Ivanti urges customers to address a critical remote code execution vulnerability impacting the Standalone Sentry solution. Ivanti addressed a critical remote code execution vulnerability, tracked as CVE-2023-41724 (CVSS score of 9.6), impacting Standalone Sentry solution. An unauthenticated attacker can exploit this vulnerability to execute arbitrary commands on the underlying operating system of the appliance within the same physical or logical network. “An unauthenticated threat actor c

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AI Is Making Payment Fraud Better, Faster and Easier

Data Breach Today

AI Is Also Making Traditional Scams More Convincing, Warns Visa Artificial intelligence technologies such as generative AI are not helping fraudsters create new types of scams. They are doing just fine relying on the traditional scams, but the advent of AI is helping them scale up attacks and snare more victims, according to researchers at Visa.

article thumbnail

Apple's iMessage Encryption Puts Its Security Practices in the DOJ's Crosshairs

WIRED Threat Level

Privacy and security are an Apple selling point. But the DOJ's new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users.

article thumbnail

UN Adopts US-Led International AI Safety Resolution

Data Breach Today

The Non-Binding Resolution Calls for 'Safe, Secure, and Trustworthy AI Systems' The United Nations on Thursday unanimously adopted a U.S.-brokered first-ever international resolution promoting the safe use of artificial intelligence. The adoption of the resolution comes at a time when governments are vying to exert influence and lead global governance in the nascent technology.

article thumbnail

Ransomware Group “RA World” Changes Its’ Name and Begins Targeting Countries Around the Globe

KnowBe4

The threat group "RA World" (formerly RA Group) has shifted from country-specific ransomware attacks to include specific industries via a new - not previously seen - method of extortion.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Apple Sued for Prioritizing Market Dominance Over Security

Data Breach Today

Lawsuit Says Apple Stifles Innovation, Degrades Security, Suppresses Protections The U.S. Department of Justice in a lawsuit filed Thursday is accusing Apple of discarding user security and privacy protections as part of a broader effort to maintain dominance in the national smartphone market. A spokesperson for the tech giant told ISMG the lawsuit threatens the entire company.

Marketing 256
article thumbnail

[Heads-Up] Phishing Campaign Delivers VCURMS RAT

KnowBe4

Researchers at Fortinet are tracking a phishing campaign that’s distributing a new version of the VCURMS remote access Trojan (RAT).

Phishing 122
article thumbnail

Synopsys Greenlights Sale of $525M Application Security Unit

Data Breach Today

Software Integrity Business Could Fetch More Than $3B, Attract Private Equity Firms Synopsys' board of directors signed off Wednesday on selling the company's $525 million application security testing business to focus exclusively on design automation and IP. The systems design behemoth began exploring strategic alternatives for its software integrity group in November.

Sales 256
article thumbnail

CISA Recommends Continuous Cybersecurity Training

KnowBe4

In an age when 70% - 90% of successful data breaches involve social engineering (which gets past all other defenses), sufficient training is needed to best reduce human-side cybersecurity risk. Everyone should be trained in how to recognize social engineering attempts, how to mitigate (i.e., delete, ignore, etc.) them, and how to appropriately report them if in a business scenario.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Proof of Concept: Opening Up the AI 'Black Box'

Data Breach Today

Panelists Make Case for Explainability, Trust in Areas Such as Healthcare, Banking In the latest "Proof of Concept," panelists Sam Curry of Zscaler and Heather West of Venable LLP discuss the crucial role of explainability and transparency in artificial intelligence, especially in areas such as healthcare and finance, where AI decisions can significantly affect people's lives.

article thumbnail

Social Engineering The #1 Root Cause Behind Most Cyber Crimes In FBI Report

KnowBe4

The following paragraphs were cited directly from my recent article highlighting social engineering. " Social engineering and phishing are involved in 70% to 90% of all successful cybersecurity attacks. No other initial root hacking cause comes close.

Phishing 122
article thumbnail

UK Official: AI in Defense Sector Is Not About Killer Robots

Data Breach Today

It Will Do Low-Level Tasks to Free Up Pros to Make Decisions, Say Researchers The current use of artificial intelligence in the U.K. defense sector is not about creating killer robots. It is focused on optimizing resources and increasing the efficiency of military operations, experts speaking at the Alan Turing Institute's AI UK conference told attendees.

article thumbnail

The Mainframe Turns 60: A Milestone in Computing History  

OpenText Information Management

60 years can really fly by! On April 7, 2024, the Mainframe will turn 60. At this milestone, we should all reflect on what the mainframe has done to the computing industry. What would the world look like without it? What is the current state of the mainframe? And what is its future? This post will touch on these points and give us all a chance to celebrate the mainframe at 60 years.

Cloud 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

EU Formally Adopts World’s First AI Law

Data Matters

On March 13, 2024, the European Parliament formally adopted the EU Artificial Intelligence Act (“ AI Act ”) with a large majority of 523-46 votes in favor of the legislation. The AI Act is the world’s first horizontal and standalone law governing AI, and a landmark piece of legislation for the EU. The post EU Formally Adopts World’s First AI Law appeared first on Data Matters Privacy Blog.

article thumbnail

Types of 5G: Which one is right for your organization?

IBM Big Data Hub

5G technology isn’t a one-size-fits-all solution that can enable digital transformation at the touch of a button. There are three kinds of 5G, each with its own specific use cases and capabilities, that business leaders need to understand. 5G wireless is broken down into three types—low, mid and high band—named for the spectrum of radio frequencies they support.

article thumbnail

Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild

Security Affairs

Researchers released a PoC exploit for a critical flaw in Fortinet’s FortiClient Enterprise Management Server (EMS) software, which is actively exploited. Security researchers at Horizon3 have released a proof-of-concept (PoC) exploit for a critical vulnerability, tracked as CVE-2023-48788 (CVSS score 9.3), in Fortinet’s FortiClient Enterprise Management Server (EMS) software.

IT 66
article thumbnail

Unleashing the potential: 7 ways to optimize Infrastructure for AI workloads 

IBM Big Data Hub

Artificial intelligence (AI) is revolutionizing industries by enabling advanced analytics, automation and personalized experiences. Enterprises have reported a 30% productivity gain in application modernization after implementing Gen AI. However, the success of AI initiatives heavily depends on the underlying infrastructure’s ability to support demanding workloads efficiently.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Prerequisites for an ROI-led data and AI strategy

CGI

As organizations pursue next-generation data and artificial intelligence (AI) technologies to improve business outcomes, what’s getting in their way?

article thumbnail

HHS updates online tracker guidance

Data Protection Report

On March 18, 2024, the U.S. Department of Health and Human Services (HHS) issued an updated, 17-page Bulletin titled “Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates (the “Bulletin”). Our readers may recall that HHS had originally issued the Bulletin in December of 2002, which we summarized here. HHS’ changes are generally clarifications and additional examples.

Privacy 45
article thumbnail

Archive-It Partner News, March 2024

Archive-It

Community News Community Webs welcomes new members The Internet Archive’s community history archiving program, Community Webs , is pleased to welcome new members. Amistad Research Center Black Lunch Table The Go-Go Museum Historic Takoma, Inc. Miami-Dade Public Library System University of Alaska Fairbanks Rasmuson Library Oral History Program – Project Jukebox Public libraries, local and community archives, and other cultural heritage organizations are encouraged to apply to receive fre