Wed.Jan 10, 2024

article thumbnail

Here’s Some Bitcoin: Oh, and You’ve Been Served!

Krebs on Security

A California man who lost $100,000 in a 2021 SIM-swapping attack is suing the unknown holder of a cryptocurrency wallet that harbors his stolen funds. The case is thought to be first in which a federal court has recognized the use of information included in a bitcoin transaction — such as a link to a civil claim filed in federal court — as reasonably likely to provide notice of the lawsuit to the defendant.

article thumbnail

HPE to Buy Juniper for $14B to Boost AI and Networking

Data Breach Today

Deal Is 'Major Leap Forward in Our AI and Hybrid Cloud Strategy,' HPE Says Hewlett Packard Enterprise announced a $14 billion acquisition deal with networking equipment maker Juniper Networks and is touting the deal as a way to position the Silicon Valley stalwart for the burgeoning artificial intelligence market. The transaction values Juniper at $40 per share.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco fixed critical Unity Connection vulnerability CVE-2024-20272

Security Affairs

Cisco addressed a critical Unity Connection security flaw that can be exploited by an unauthenticated attacker to get root privileges. Cisco has addressed a critical flaw, tracked as CVE-2024-20272, in its Unity Connection that can be exploited by a remote, unauthenticated attacker to gain root privileges on vulnerable devices. Cisco Unity Connection is a messaging platform and voicemail system that is part of the Cisco Unified Communications suite of products.

article thumbnail

Fidelity National Financial Details LoanCare Breach

Data Breach Today

1.3 Million Customers Notified of Breach; BlackCat Ransomware Group Claimed Credit Financial services giant Fidelity National Financial has confirmed that a November 2023 hack attack compromised personal information pertaining to 1.3 million customers of its LoanCare subsidiary. FNF took multiple systems offline when responding to the attack, disrupting some homebuyers.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Decryptor for Tortilla variant of Babuk ransomware released

Security Affairs

Researchers and the Dutch Police released a decryptor for the Tortilla variant of the Babuk ransomware after the arrest of its operator. Cisco Talos researchers obtained a decryptor for the Babuk Tortilla ransomware variant. The experts were able to extract and share the private decryption key used by the ransomware operators. Talos experts shared the key with Avast that added it to the Avast Babuk decryptor released in 2021.

More Trending

article thumbnail

HMG Healthcare disclosed a data breach

Security Affairs

The Healthcare services provider HMG Healthcare has disclosed a data breach that impacted 40 affiliated nursing facilities. In November 2023, the Healthcare services provider HMG Healthcare discovered a data breach that exposed personal health information related to residents and employees at HMG affiliated nursing facilities. The company immediately launched an investigation into the incident and discovered that threat actors in August gained access to a company server and stolen unencrypted fi

article thumbnail

EU Enhances Cybersecurity Requirements for Agencies

Data Breach Today

Cyber Regulation Requires EU Agencies to Assess Risks and Report Incidents The European Union adopted regulations on cyber hygiene intended to beef up cybersecurity at EU government agencies amid concerns that trading bloc institutions have failed to keep pace with mounting digital threats. European agencies lack "cyber preparedness commensurate with the threat.

article thumbnail

Threat actors hacked the X account of the Securities and Exchange Commission (SEC) and announced fake Bitcoin ETF approval

Security Affairs

Threat actors hacked the X account of the US Securities and Exchange Commission (SEC) and used it to publish the fake news on the Bitcoin ETF approval. Hackers hijacked the X account of the US Securities and Exchange Commission (SEC) and used it to publish fake news on the Bitcoin ETF approval. “Today the SEC grants approval to Bitcoin ETFs for listing on registered national security exchanges,” read the fake massage which was promtly removed. “The approved Bitcoin ETFs will be

Security 128
article thumbnail

EU Commission Examines OpenAI, Microsoft Relationship

Data Breach Today

Commission Says Close Company Connections Make Conditions Ripe for Merger Inquiry The European Commission took preliminary steps toward investigating Microsoft's financial interest in ChatGPT maker OpenAI under the trading bloc's antitrust regulation. The Tuesday announcement marks the second instance of official interest in Microsoft's investments in the generative AI firm.

289
289
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ShinyHunters member sentenced to three years in prison

Security Affairs

A U.S. District Court sentenced ShinyHunters hacker Sebastien Raoult to three years in prison and ordered him to pay more than $5 million in restitution. The member of the ShinyHunters hacker group Sebastien Raoult was sentenced in U.S. District Court in Seattle to three years in prison and more than $5 million in restitution for conspiracy to commit wire fraud and aggravated identity theft.

Sales 125
article thumbnail

US Securities and Exchange Commission Probes X Account Hack

Data Breach Today

Value of Bitcoin Rocketed Following Fake Post Claiming Spot Bitcoin ETFs Approved The U.S. Securities and Exchange Commission said it is probing the "compromise" of its X - formerly known as Twitter - social media accounts after a hacker broadcast a fake post claiming the agency had approved spot bitcoin exchange-traded funds, which sent the value of bitcoin rocketing.

Security 288
article thumbnail

[Security Masterminds] Revolutionizing Cybersecurity Training: How AI Is Changing the Game

KnowBe4

Artificial intelligence (AI) in the cybersecurity realm is a nuanced topic. On the one hand, it has the potential to enhance our abilities to detect and prevent cyber threats significantly.

article thumbnail

How Our Own Insecurity Fuels Global Threats

Data Breach Today

Professor John Walker on Need for Organizational Introspection, Global Perspective Criminals have built highly successful business models by hacking into a wide range of organizations at will. University professor John Walker warned that the world is witnessing the unintended consequences of our collective inability to secure assets - kinetic threats to global stability.

Security 269
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Facial Scanning by Burger King in Brazil

Schneier on Security

In 2000, I wrote : “If McDonald’s offered three free Big Macs for a DNA sample, there would be lines around the block.” Burger King in Brazil is almost there , offering discounts in exchange for a facial scan. From a marketing video: “At the end of the year, it’s Friday every day, and the hangover kicks in,” a vaguely robotic voice says as images of cheeseburgers glitch in and out over fake computer code. “BK presents Hangover Whopper, a technology that

Marketing 110
article thumbnail

Pikabot Malware Spreading Through Phishing Campaigns

KnowBe4

Researchers at Trend Micro warn that a threat actor known as “Water Curupira” is distributing the Pikabot malware loader via widespread phishing campaigns.

Phishing 112
article thumbnail

Navigating the EU-US Data Protection Framework

Thales Cloud Protection & Licensing

Navigating the EU-US Data Protection Framework sparsh Thu, 01/11/2024 - 05:26 On 10 July 2023, the European Commission adopted a new adequacy decision regarding the Data Privacy Framework (“DPF”). This follows the invalidation of the EU-US Privacy Shield, by the Court of Justice of the European Union on 16 July 2020. That decision of adequacy provides in substance that there is an adequate level of protection—comparable to that in the EU—for personal data transferred from the EU to US companies

article thumbnail

Beyond the Scams: Unraveling the Dark Tactics of Real-World Kidnapping Scams and Virtual Extortion

KnowBe4

The world can be a scary and dangerous place. Its unethical scammers have no problem doing almost anything to make a buck, but sometimes, their plots seem to be extra messed up.

IT 99
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Lawmakers Are Out for Blood After a Hack of the SEC’s X Account Causes Bitcoin Chaos

WIRED Threat Level

The US Securities and Exchange Commission is under pressure to explain itself after its X account was compromised, leading to wild swings in the bitcoin market.

Marketing 100
article thumbnail

KnowBe4 Named a Leader in the Winter 2024 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

Breaking down the advantages and disadvantages of artificial intelligence

IBM Big Data Hub

Artificial intelligence (AI) refers to the convergent fields of computer and data science focused on building machines with human intelligence to perform tasks that would previously have required a human being. For example, learning, reasoning, problem-solving, perception, language understanding and more. Instead of relying on explicit instructions from a programmer, AI systems can learn from data, allowing them to handle complex problems (as well as simple-but-repetitive tasks) and improve over

article thumbnail

FTC Issues Proposed Order Against Data Broker X-Mode for Processing of Sensitive Location Information

Hunton Privacy

On January 9, 2024, in its first settlement with a data broker concerning the collection and sale of sensitive location information, the Federal Trade Commission announced a proposed order against data broker X-Mode Social, Inc. and its successor Outlogic, LLC (“X-Mode”) for unfair and deceptive acts or practices in violation of Section 5 of the FTC Act.

Sales 67
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Six eDiscovery Trends for 2024

eDiscovery Daily

By Rick Clark and Jacob Hesse 2023 was an eventful year in the world of legal technology, with new technology emerging to address both traditional and new challenges legal teams face when collecting, processing, and reviewing data for litigation, investigations, or public access requests. What will 2024 hold, especially in the world of eDiscovery? We’ve captured the top trends for the year based on the conversations we’ve had in recent months with customers and industry experts.

article thumbnail

Confidential Containers with Red Hat OpenShift Container Platform and IBM® Secure Execution for Linux

IBM Big Data Hub

Hybrid cloud has become the dominant approach for enterprise cloud strategies , but it comes with complexity and concerns over integration, security and skills. To address these concerns the industry is embracing container runtime environments to abstract away infrastructure. Red Hat OpenShift Container Platform (RH OCP) has emerged as a leading solution for supporting the application development lifecycle, provisioning and managing container images and workloads into a platform for containerize

article thumbnail

FTC Reminds AI Companies to Uphold Privacy Commitments

Hunton Privacy

On January 9, 2024, the Federal Trade Commission published a blog post reminding artificial intelligence (“AI”) “model-as-a-service” companies to uphold the privacy commitments they make to customers, including promises made in Terms of Service agreements, promotional materials and online marketplaces. “Model-as-a-service” companies develop AI products and make them available to customers via end-user interfaces or application programming interfaces (“APIs”).

Privacy 61
article thumbnail

The battle of the personas in the world of enterprise applications—how IBM Hybrid Cloud Mesh and Red Hat Services Interconnect unify them

IBM Big Data Hub

Navigating the intricate realm of modern enterprise applications requires collaboration among diverse personas to effectively manage complexity. This helps with continuous business support through applications automating essential workflows. Traditionally, applications and their hosting infrastructure align with DevOps and CloudOps. However, rising costs due to diverse IT environments led to the emergence of FinOps, focusing on expense monitoring and control.

Cloud 63
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Ask-AI raises $11M in Series A funding to launch AI-powered enterprise productivity tool

Information Matters

Enterprise artificial intelligence start-up Ask-AI has raised $11 million in a Series A funding round to launch a new “generative AI sidekick” aimed at boosting employee productivity. The round was Read more The post Ask-AI raises $11M in Series A funding to launch AI-powered enterprise productivity tool appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Unlocking the potential of digitalization within the pharmacy market

CGI

Digitalization across the pharmacy industry is evolving quickly. It’s crucial for organizations to consider how to keep pace with up-and-coming pure players and how their IT landscape is facilitating their ability to compete in a modern market.

article thumbnail

Microsoft Aims to Extend Its AI Platform With ‘Copilot’ Key for Windows Laptops

Information Matters

Microsoft is making a substantial wager on artificial intelligence by requiring PC manufacturers to include a dedicated ‘Copilot’ key on Windows laptop keyboards. The key will provide direct access to Read more The post Microsoft Aims to Extend Its AI Platform With ‘Copilot’ Key for Windows Laptops appeared first on Information Matters - Where AI Meets Knowledge Management.