Fri.Apr 12, 2024

article thumbnail

Cloned Voice Tech Is Coming for Bank Accounts

Data Breach Today

Experts Warn AI Tools Can Now Compromise Voice Password Systems Used by Many Banks At many financial institutions, your voice is your password. Tiny variations in pitch, tone and timbre make human voices an ideal method for authenticating customers - as long as computers can't be trained to synthesize those pitch, tone and timbre characteristics in real time.

Passwords 306
article thumbnail

House Votes to Extend—and Expand—a Major US Spy Program

WIRED Threat Level

US House of Representatives voted on Friday to extend the Section 702 spy program. It passed without an amendment that would have required the FBI to obtain a warrant to access Americans' information.

Access 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Cyber Command Expanded 'Hunt Forward' Operations in 2023

Data Breach Today

US Cyber Mission Force Led 22 Defensive Cyber Operations in 2023, Commander Says Air Force Gen. Timothy Haugh told the Senate Armed Services Committee the U.S. Cyber Command carried out nearly two dozen defensive cyber operations across the globe in 2023, expanding in size and scope since the "hunt forward" teams were first launched in 2014.

288
288
article thumbnail

LastPass employee targeted via an audio deepfake call

Security Affairs

Crooks targeted a LastPass employee using deepfake technology to impersonate the company’s CEO in a fraudulent scheme. In a fraudulent scheme, criminals used deepfake technology to impersonate LastPass ‘s CEO, targeting an employee of the company. The attack occurred this week, but the employed recognized the attack and the attempt failed.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

PE Firm Accuses Synopsys of Breaching Exclusivity Agreement

Data Breach Today

Sunstone Partners: We Had a Letter of Intent to Buy Synopsys' Security Testing Unit A California private equity firm sued Synopsys and accused the systems design behemoth of breaching an exclusivity agreement by shopping its $525 million software integrity business. Sunstone Partners Management said it signed a letter of intent to acquire Synopsys' security testing services unit.

Security 200

More Trending

article thumbnail

UK Markets Authority Warns of AI Market Capture by Big Tech

Data Breach Today

CMA Says Market Is Becoming more Verticially Integrated The British antitrust authority warned Thursday that the market for foundational models is taking on "winner takes all" dynamics that could entrench a small number of providers. Firms with an outsize presence in offering compute or data resources could restrict access to critical inputs.

Marketing 189
article thumbnail

TA547 targets German organizations with Rhadamanthys malware

Security Affairs

TA547 group is targeting dozens of German organizations with an information stealer called Rhadamanthys, Proofpoint warns. Proofpoint researchers observed a threat actor, tracked as TA547, targeting German organizations with an email campaign delivering the Rhadamanthys malware. TA547 is a financially motivated threat actor that has been active since at least November 2017, it was observed conducting multiple campaigns to deliver a variety of Android and Windows malware, including DanaBot , Goot

Retail 139
article thumbnail

ISMG Editors: Unpacking the Change Healthcare Attack Saga

Data Breach Today

Also: Positive Cyber Market Trends, AI Threats to Supply Chain Security In the latest weekly update, four ISMG editors discussed the unending twists and turns in the Change Healthcare cyberattack, positive signs of economic recovery in the cybersecurity tech market, and how artificial intelligence is shaking up supply chain security.

article thumbnail

Roku disclosed a new security breach impacting 576,000 accounts

Security Affairs

Roku announced that 576,000 accounts were compromised in a new wave of credential stuffing attacks. Roku announced that 576,000 accounts were hacked in new credential stuffing attacks, threat actors used credentials stolen from third-party platforms. “ Credential stuffing is a type of attack in which hackers use automation and lists of compromised usernames and passwords to defeat authentication and authorization mechanisms, with the end goal of account takeover (ATO) and/or data exfiltration.

Security 139
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

American Privacy Rights Bill: Implications for Health Sector

Data Breach Today

How Proposed Data Privacy Law Could Affect the Handling of Health Information The proposed bipartisan, bicameral American Privacy Rights Act poses a variety of potential implications to the healthcare sector and other groups that handle health-related data - if the legislation gains traction in Congress and actually gets signed into law, legal experts say.

Privacy 173
article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Data loss prevention (DLP) best practices are principles that help prevent intentional or unintentional data erasure. By following these guidelines, organizations can reduce the detrimental impact of data loss and quickly resume operations after an incident. This also protects sensitive data and minimizes legal and reputational issues. Explore some real-world instances below and discover when and how to use DLP procedures for optimal data security.

article thumbnail

State-Sponsored Disinformation Campaigns Targeting Africa Driving Instability And Violence

KnowBe4

A shocking report shows how email-based disinformation campaigns can have material real-world impacts to the citizens in the targeted countries.

Phishing 120
article thumbnail

Smuggling Gold by Disguising it as Machine Parts

Schneier on Security

Someone got caught trying to smuggle 322 pounds of gold (that’s about 1/4 of a cubic foot) out of Hong Kong. It was disguised as machine parts: On March 27, customs officials x-rayed two air compressors and discovered that they contained gold that had been “concealed in the integral parts” of the compressors. Those gold parts had also been painted silver to match the other components in an attempt to throw customs off the trail.

IT 115
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK Councils Under Cyber Attack: The Urgent Need for a Culture of Cybersecurity and Resilience

KnowBe4

The very fabric that stitches our society together — our councils and local governing bodies — is under a silent siege from cyber attacks. The recent ransomware assault on Leicester Council is another real life cybercrime added to a growing list of attacks in the UK.

article thumbnail

The Future of Data Archiving 

Record Nations

Data archiving is the process of storing and preserving electronic data to ensure your information is safe and protected over time. The goal of data archiving is to simplify data management, reduce costs, maintain regulatory compliance, and improve operational efficiency. The process of data archiving involves moving data from active storage systems, which are.

article thumbnail

U.S. Department of Health Alert: Hackers are Targeting IT Help Desks at Healthcare Organizations

KnowBe4

A new sector alert published by the U.S. Department of Health and Human Services outlines new attacks in which social engineering is used to obtain credentials for online fraud.

IT 118
article thumbnail

Merging top-down and bottom-up planning approaches

IBM Big Data Hub

This blog series discusses the complex tasks energy utility companies face as they shift to holistic grid asset management to manage through the energy transition. The first post of this series addressed the challenges of the energy transition with holistic grid asset management. The second post in this series addressed the integrated asset management platform and data exchange that unite business disciplines in different domains in one network.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cyber Attacks Could Cause Global Bank Runs

KnowBe4

The International Monetary Fund (IMF) has warned that severe cyber attacks against financial institutions could lead to major bank runs and market selloffs. While this hasn’t happened yet, the IMF has observed these effects on a smaller scale after a cyber attack hits a bank.

Marketing 118
article thumbnail

Teachers are using AI to grade essays. But some experts are raising ethical concerns via CNN

IG Guru

Check out the article here. The post Teachers are using AI to grade essays. But some experts are raising ethical concerns via CNN first appeared on IG GURU.

article thumbnail

Mitigate mercenary spyware attacks for iPhone with Jamf Executive Threat Protection

Jamf

Explore a comprehensive mobile security strategy that defends against the most sophisticated attacks impacting users.

article thumbnail

Release of Non-Fungible Tokens (NFTs) Briefing Paper

National Archives Records Express

We are pleased to announce the release of a briefing paper on the records management implications of Non-Fungible Tokens (NFTs). In 2019, NARA issued a white paper on Blockchain , describing how the technology works, how it is being used in the federal government, and the potential implications for records management. Blockchain or distributed ledger technology (DLT) is being used for applications such as non-fungible tokens (NFT), cryptocurrency, and smart contracts.

Paper 52
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Strategic Finance: The Evolution of the Finance Function

Docuware

Strategic finance supports a company’s growth and long-term vision rather than taking a more limited tactical approach. This blog post explores how it can elevate the role of the CFO and finance team. It pinpoints a common barrier to this change of perspective -- slow manual processes that cause overwhelming workloads. The post also explains how digitizing workflow comes into play to free up time for CFOs and their teams.

IT 51
article thumbnail

JNUC 2024 Diversity Sponsorship

Jamf

Join us for the Jamf Nation User Conference (JNUC) 2024, in Nashville, Tennessee, October 1- October 3. Jamf is offering JNUC sponsorships to 10 people from underrepresented groups within the technology sector.

40
article thumbnail

Friday Squid Blogging: The Awfulness of Squid Fishing Boats

Schneier on Security

It’s a pretty awful story. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 111
article thumbnail

What is threat detection?

Jamf

Discover what threat detection is and why it's crucial for cybersecurity. Learn about the methods and technologies for detecting security threats.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.