Tue.Aug 27, 2024

article thumbnail

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Krebs on Security

Malicious hackers are exploiting a zero-day vulnerability in Versa Director , a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon , a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China.

article thumbnail

Ransomware Hackers Steal Medical Insurance Data of 1M People

Data Breach Today

Young Consulting Says Health Data Exposed; Ransomware Group Leaked Stolen Data Young Consulting, which develops software for the stop-loss insurance market, is notifying 1 million individuals that their personal information was stolen earlier this year in a hack attack. The BlackSuit ransomware group, a rebrand of Royal, subsequently claimed credit and leaked stolen data.

Insurance 304
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Readiness Assessment: Preparing Your Organization's Unstructured Data for the Future

AIIM

I recently had the pleasure of hosting a conversation with Rob Bogue, the core author of AIIM's new resource " Organizational Readiness for Generative AI: Leveraging Unstructured Data for Success." This assessment focuses on how to prepare unstructured data for AI implementation. In this blog post, I'll share key insights from our discussion and highlight the importance of this tool for information management professionals.

article thumbnail

Tech Orgs: UN Cybercrime Treaty Will Worsen Global Security

Data Breach Today

Cybersecurity Tech Accord Urges Nations to Reject the Treaty A coalition of technology organizations says a draft United Nations cybercrime treaty would facilitate crime and is urging nations to reject the treaty. "The best option now is for a majority of the U.N.'s member states to decide not to adopt the convention," said Nick Ashton-Hart.

Security 182
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

China-linked APT group Volt Typhoon exploited a zero-day flaw in Versa Director to upload a custom webshell in target networks. China-linked APT Volt Typhoon exploited a zero-day vulnerability, tracked as CVE-2024-39717 , in Versa Director, to deploy a custom webshell on breached networks. Versa Director is a centralized management and orchestration platform used primarily by Internet Service Providers (ISPs) and Managed Service Providers (MSPs) to manage and monitor Software-Defined Wide Area N

More Trending

article thumbnail

Critical flaw in WPML WordPress plugin impacts 1M websites

Security Affairs

A critical flaw in the WPML WordPress plugin, which is installed on 1 million websites, could allow potential compromise of affected sites. The WPML Multilingual CMS Plugin for WordPress is installed on over 1 million sites. An authenticated (Contributor+) Remote Code Execution (RCE) vulnerability, tracked CVE-2024-6386 (CVSS score of 9.9), in WPML Plugin potentially allows the compromise of impacted websites.

CMS 125
article thumbnail

Patelco Breach Affected 726,000 Customers, Employees

Data Breach Today

Ransomware Attackers Had Access to Data for More Than a Month Hackers stole the data of more 700 million current and former customers and employees of Patelco Credit Union in a monthlong ransomware attack detected in June, the California financial institution said. Not all 726,000 individuals victimized in the breach were equally affected.

article thumbnail

Researchers unmasked the notorious threat actor USDoD

Security Affairs

CrowdStrike researchers have identified the notorious hacker USDoD who is behind several high-profile data leaks. The notorious hacker USDoD (aka EquationCorp), who is known for high-profile data leaks, is a man from Brazil, according to a CrowdStrike investigation. The news was first reported by the Brazilian website TecMundo who received a CrowdStrike report via an anonymous source.

article thumbnail

Check Point to Buy External Risk Management Vendor Cyberint

Data Breach Today

Acquisition Will Enhance Security Operations, Expand Managed Threat Intel Solutions Check Point plans to purchase an external risk management vendor led by an Israeli intelligence veteran to boost its SOC and managed threat intelligence capabilities. The proposed acquisition of Cyberint will make it easier for companies to defend against both internal and external cyberthreats.

Risk 162
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How Does a VPN Work? A Comprehensive Beginner’s Overview

eSecurity Planet

A virtual private network (VPN) does more than just mask your identity—it fundamentally changes how your data moves across the internet. But what’s really going on under the hood when you browse the web using a VPN? Understanding this can be crucial for IT managers and professionals who are keen on maintaining robust cybersecurity practices. In this article, we’ll explain how a VPN works, explore its encryption mechanisms, review common VPN protocols, and discuss its various business appli

article thumbnail

Wipro, AWS Team up to Address Compliance in the Cloud Era

Data Breach Today

Wipro's Siva Vrs on How AI Impacts Regulatory and Compliance Mandates Data integrity, collection, analytics - they all are essential for compliance reporting, and yet each remains a challenge for enterprises across business sectors. Siva Vrs of Wipro discusses the challenge of compliance in the cloud era, including Wipro's partnership with AWS to alleviate cloud compliance challenges.

article thumbnail

Vulnerability Recap 8/27/24 – Wide Range of Vulnerabilities This Week

eSecurity Planet

If you updated Chrome and SolarWinds Web Help Desk in the last couple of weeks due to vulnerabilities, get ready to update them again — each has a new flaw. Additionally, a popular WordPress plugin has a critical issue, and AWS’s Application Load Balancer feature has a configuration vulnerability. As always, the best way to get flaws quickly patched is to scan for vulnerabilities frequently and have a plan for fixing and documenting them.

article thumbnail

Cribl Gets $319M on $3.5B Valuation to Boost Data Management

Data Breach Today

Google Ventures Leads Round as Sales of Cribl's Vendor-Agnostic Data Tools Grow Cribl has completed a $319 million Series E funding round led by Google Ventures. The financing pushes the company’s valuation to $3.5 billion, with backing from prominent investors as Cribl's data engine technology continues to be rapid adoped by enterprises globally.

Sales 162
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The best Labor Day 2024 deals: Shop Amazon, Walmart, Best Buy, and more

Collaboration 2.0

Labor Day weekend is almost here, and there are already tons of great deals on headphones, TVs, smart home devices, and more that you can grab across major retailers.

Retail 98
article thumbnail

More Carrots and Fewer Sticks

KnowBe4

This blog was co-written by Perry Carpenter and Roger A. Grimes. As I sit in the 2024 Seattle Convene conference this week and listen to speaker after speaker talk about their successful security awareness training programs, one thing is perfectly clear. They all prefer carrots and fewer sticks.

article thumbnail

I thought I knew about rugged tablets, until I tested a Getac running Windows

Collaboration 2.0

Getac has launched its latest rugged tablet with upgraded internal components, making it one of the best options if you work in challenging environments.

IT 98
article thumbnail

The Present and Future of TV Surveillance

Schneier on Security

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

Privacy 109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Pixel 9 Pro XL users report charging problems and a strange camera tilt

Collaboration 2.0

Google says 'a known bug' is preventing some Pixel 9 Pro XL devices from supporting wireless charging. Here's what you can do while you wait for a patch.

98
article thumbnail

Ransomware Recovery Costs Have Doubled for State and Local Governments

KnowBe4

Thirty-four percent of state and local government entities were hit by ransomware in 2024, a new report from Sophos has found. While this is a decrease compared to the attack rate in 2023, the mean cost of recovery for these entities has more than doubled to $2.83 million.

article thumbnail

Amazon Echo Studio review: My buying advice after testing with the Sonos Era

Collaboration 2.0

Amazon's flagship Echo device is one of the best smart speakers we've tested, and the $200 price tag can still be justified two years after release.

98
article thumbnail

How to support threat hunters

OpenText Information Management

Threat hunting is a critical aspect of cybersecurity, involving the proactive search for threats and vulnerabilities within an organization's network. For threat hunters to be effective, they need robust support from their managers and teams. This post will explore three ways that managers and leadership, including CISOs, can best support their threat hunting teams: Address workplace challenges.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Grab this Microsoft Office Pro and Windows 11 Pro bundle for $50 - the lowest price of the year

Collaboration 2.0

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro at 88% off for a limited time.

Access 98
article thumbnail

6 reasons to attend OpenText World 2024

OpenText Information Management

A transformation is underway that will redefine how we perceive, process, and use information. It leverages advanced information management technologies— artificial intelligence (AI), cybersecurity , and cloud —to enhance the way we work. And it creates dynamic, context-aware systems that don’t merely organize facts but adapt to users’ needs, provide personalized insights, and facilitate more efficient decision-making.

article thumbnail

I gave away my Kindle and iPad within hours of testing this tablet

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G is my new favorite e-reader for its versatile display and value.

IT 98
article thumbnail

Tips for Environmental Sustainability at Work and How ISO 14001 Can Help

IT Governance

Creating a sustainable work environment is crucial – not just to reduce our ecological footprint, but also to foster a culture of responsibility and long-term success. With mounting concerns about environmental impact, integrating sustainability practices into workplace operations has become increasingly vital. We’re already suffering the consequences of climate change.

Paper 52
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

I supersized my Surface Pro storage in 7 easy steps - and saved hundreds of dollars

Collaboration 2.0

Double? Quadruple? Nah, I OCTUPLED my Surface Pro storage. If you can use a screwdriver, you can do it, too. Here's how.

IT 98
article thumbnail

VC firm redalpine plans London office as it closes largest fund to date

Information Matters

European venture capital firm redalpine has announced the closing of its largest fund to date, redalpine capital VII (RAC VII), at $200 million. The firm, founded in Zurich in 2006, Read more The post VC firm redalpine plans London office as it closes largest fund to date appeared first on Information Matters - AI in the UK.

IT 52
article thumbnail

I've tested dozens of power banks, but I haven't seen one quite like this

Collaboration 2.0

The Cuktech P-series power bank may look like something out of a sci-fi movie, but its efficiency, premium build, and durability are very real. And right now, it's on sale on Amazon for $89.

Sales 75