Fri.Jul 19, 2024

article thumbnail

Wanted! An IG Code of Human Ethics

Weissman's World

I recently gave a presentation to ARMA International about the human consequences of what we do, and though you probably can get a copy of it from ARMA itself – and for sure you can from me – I wanted to take a minute to reinforce the criticality of my point. Most of us spend… Read More » Wanted! An IG Code of Human Ethics The post Wanted!

IT 290
article thumbnail

Banks and Airlines Disrupted as Mass Outage Hits Windows PCs

Data Breach Today

CrowdStrike Confirms Faulty Software Update for Falcon Sensor, Is Deploying Fix Banks, airlines, media giants and others are being disrupted by a mass, global IT outage tied to Windows PCs. While CrowdStrike has issued a workaround tied to a Falcon software update that appears to be the culprit, many IT administrators say it so far remains difficult to implement at scale.

IT 301
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How One Bad CrowdStrike Update Crashed the World’s Computers

WIRED Threat Level

A defective CrowdStrike kernel driver sent computers around the globe into a reboot death spiral, taking down air travel, hospitals, banks, and more with it. Here’s how that’s possible.

IT 145
article thumbnail

Ransomware Remains a Major Threat to Energy

Data Breach Today

Median Ransomware Attack Recovery Cost for Critical Infrastructure Is 4X Higher Ransomware remains a major threat to energy, oil/gas and utilities organizations of all sizes around the globe. Our 2024 state of ransomware report reveals that the median recovery costs for two critical infrastructure sectors - energy and water - quadrupled to $3 million over the past year.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Russian nationals plead guilty to participating in the LockBit ransomware group

Security Affairs

Two Russian nationals pleaded guilty to participating in the LockBit ransomware group and carrying out attacks against victims worldwide. Two foreign nationals, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, pleaded guilty in Newark federal court for their roles in the LockBit ransomware operation. The LockBit ransomware operation has been active since January 2020, the group hit over 2,500 victims across 120 countries, including 1,800 in the U.S.

More Trending

article thumbnail

Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

WIRED Threat Level

A software update from cybersecurity company CrowdStrike appears to have inadvertently disrupted IT systems globally.

article thumbnail

CrowdStrike/Microsoft Outage Latest Blow to Healthcare

Data Breach Today

Some EHRs Affected; Hospitals Cancel Patient Care in Latest Vendor Mega Incident As if the healthcare sector doesn't have enough technology problems, the global IT outage caused by a faulty CrowdStrike software update has forced some hospitals and other medical facilities worldwide to resort to manual downtime procedures and cancel patient procedures.

IT 157
article thumbnail

Don't Fall for CrowdStrike Outage Scams

WIRED Threat Level

Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm's catastrophic software update.

Security 122
article thumbnail

ISMG Editors: AT&T's Ransom Payment in Snowflake Breach

Data Breach Today

Also: AI Bots in the Workplace; AI Regulations in the US and EU In the latest weekly update, ISMG editors discussed AT&T's alleged ransom payment to hackers following a breach of its Snowflake account, the challenges of using AI bots in the workplace, and the impact of differences in AI regulations in the E.U. and the U.S.

IT 157
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

CrowdStrike Phishing Attacks Appear in Record Time

KnowBe4

I have been the CEO of an anti-virus software developer. We had a special acronym for catastrophic events like this, a so-called "CEE". As in Company Extinction Event. Within hours of mass IT outages on Friday, a surge of new domains began appearing online, all sharing one common factor: the name CrowdStrike. As the company grapples with a global tech outage that has delayed flights and disrupted emergency services, opportunistic cybercriminals are quick to exploit the chaos.

Phishing 114
article thumbnail

Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape

Data Breach Today

Securing Healthcare, Minimizing Risk, Ever-Changing Threat Landscape.

Risk 157
article thumbnail

MediSecure data breach impacted 12.9 million individuals

Security Affairs

Personal and health information of 12.9 million individuals was exposed in a ransomware attack on Australian digital prescription services provider MediSecure. MediSecure is a company that provides digital health solutions, particularly focusing on secure electronic prescription delivery services in Australia. In May, the company was forced to shut down its website and phone lines following a cyber attack, but it did not mention a ransomware attack.

article thumbnail

The Cost of Underpreparedness to Your Business

Data Breach Today

The Cost of Underpreparedness to Your Business.

Security 157
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

78% of Organizations Are Targets of Ransomware Attacks Two or More Times in Twelve Months

KnowBe4

New data puts the spotlight on the frequency and impact of modern ransomware attacks, highlighting the overconfidence organizations are showing in their ability to defend and respond to attacks.

article thumbnail

Measuring Your Data’s Risk

Data Breach Today

Measuring Your Data’s Risk.

Risk 157
article thumbnail

Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users

Security Affairs

Cisco has addressed a critical vulnerability that could allow attackers to add new root users to Security Email Gateway (SEG) appliances. Cisco fixed a critical vulnerability, tracked as CVE-2024-20401 (CVSS score 9.8), that could allow unauthenticated, remote attackers to add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances.

article thumbnail

Brett Solomon on Digital Rights

Schneier on Security

Brett Solomon is retiring from AccessNow after fifteen years as its Executive Director. He’s written a blog post about what he’s learned and what comes next.

IT 96
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Samsung halts sales of Galaxy Buds 3 Pro because of quality problems

Collaboration 2.0

Just a week after the wearable's Unpacked launch, multiple customers reported issues with the earbud tips tearing - and Samsung has pulled the devices from shelves.

Sales 89
article thumbnail

MediSecure data breach impacted 12.9 million individuals

Security Affairs

Personal and health information of 12.9 million individuals was exposed in a ransomware attack on Australian digital prescription services provider MediSecure. MediSecure is a company that provides digital health solutions, particularly focusing on secure electronic prescription delivery services in Australia. In May, the company was forced to shut down its website and phone lines following a cyber attack, but it did not mention a ransomware attack.

article thumbnail

This iPhone thermal camera accessory is one of my favorite tools

Collaboration 2.0

The industrial-grade Topdon TC002 gives your iPhone a cool superpower and you can get it for much less than a dedicated thermal imaging camera.

IT 94
article thumbnail

Russian nationals plead guilty to participating in the LockBit ransomware group

Security Affairs

Two Russian nationals pleaded guilty to participating in the LockBit ransomware group and carrying out attacks against victims worldwide. Two foreign nationals, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, pleaded guilty in Newark federal court for their roles in the LockBit ransomware operation. The LockBit ransomware operation has been active since January 2020, the group hit over 2,500 victims across 120 countries, including 1,800 in the U.S.

article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

CISA’s Red Team Exercise Shows Value of Phishing, but Misses the Best Recommendation

KnowBe4

Phishing is used to completely compromise the victim’s environment after other repeated methods failed.

Phishing 109
article thumbnail

This ultra-thin power bank is a must-have travel gadget

Collaboration 2.0

The Auskang 5,000mAh power bank is only about as thick as a few credit cards, but it has enough power to reliably charge your smartphone or other USB-C device.

IT 86
article thumbnail

Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users

Security Affairs

Cisco has addressed a critical vulnerability that could allow attackers to add new root users to Security Email Gateway (SEG) appliances. Cisco fixed a critical vulnerability, tracked as CVE-2024-20401 (CVSS score 9.8), that could allow unauthenticated, remote attackers to add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances.

article thumbnail

Grab a portable LG speaker for up to 40% off right now

Collaboration 2.0

LG's Black Friday in July sale is happening now, and you can save up to $200 on LG speakers, earbuds, and more.

Sales 88
article thumbnail

Thinking About Investing in an XDR? Learn How to Cut Through the Hype

Cybersecurity Detection and Response tools are showing promise in helping reduce an attacker’s dwell time in your network. With reduced dwell time before detection, defenders have time to respond in containing the threat before significant damage can be done to your systems and confidential data. But cutting through the acronym soup and marketing hype can be a daunting task.

article thumbnail

Enhancing Security Operations with OpenText Cybersecurity Services

OpenText Information Management

In today's hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to cause $10.5 trillion a year in damage by 2025. Security Operations Centers (SOC) are at the forefront of defending organizations against these threats, but they often face overwhelming challenges.

article thumbnail

Final hours: The Ninja Creami Ice Cream Maker is still $30 off after Prime Day

Collaboration 2.0

Last chance: Craving a summer treat? The Ninja Creami can make all your frozen desserts and smoothies, comes with two pint-sized containers, and is still available for $30 after Amazon Prime Day.

72
article thumbnail

Ensuring compliance with the NIS2 Directive 

OpenText Information Management

In an increasingly digital world, the security of network and information systems is paramount. The European Union's NIS2 Directive , a successor to the original NIS Directive, aims to strengthen cybersecurity across the EU by enhancing the resilience and incident response capacities of public and private sectors. As organizations prepare to meet the stringent requirements of NIS2, leverage OpenText™ Cybersecurity Services to navigate the new directive’s coverage and requirements.