Mon.Jan 15, 2024

article thumbnail

Exclusive: Cloud Vendor Returns Stolen Hospital Data

Data Breach Today

Alliance Had Sued LockBit Gang to Force Cloud Firm to Release Affected Patient Data A cloud services firm has turned over to a New York hospital alliance the patient data stolen in a ransomware attack by LockBit. The hospital group had filed a lawsuit against LockBit as a legal maneuver to force the storage firm to return data the cybercriminals had stashed on the vendor's servers.

Cloud 317
article thumbnail

Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack

Security Affairs

Researchers from Bishop Fox found over 178,000 SonicWall next-generation firewalls (NGFW) publicly exploitable. SonicWall next-generation firewall (NGFW) series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities, tracked as CVE-2022-22274 and CVE-2023-0656 , that could potentially lead to remote code execution. Despite a proof-of-concept exploit for the flaw CVE-2023-0656 was publicly released, the vendor is not aware of attack in the wild exploiting the vulner

IT 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Spot Critical Security Flaw in Bosch Thermostats

Data Breach Today

Bitdefender Finds Vulnerability in Popular IoT Device Thermostats sold across the globe by German multinational engineering company Bosch contained a flaw allowing hackers to cut power to the heating system and override the firmware, warn researchers from cybersecurity firm Bitdefender. Bosch pushed an over-the-air update in October.

IoT 314
article thumbnail

Experts warn of a vulnerability affecting Bosch BCC100 Thermostat

Security Affairs

Researchers warn of high-severity vulnerability affecting Bosch BCC100 thermostats. Researchers from Bitdefender discovered a high-severity vulnerability affecting Bosch BCC100 thermostats. The researchers discovered a vulnerability, tracked as CVE-2023-49722 (CVSS score: 8.3), that can be exploited by an attacker on the same network to replace the device firmware with a rogue version.

IoT 135
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Busted: Cryptojacking; UndeadApes NFT Rug Pull Suspects

Data Breach Today

Ukraine Nabs Suspected Cryptojacker; US Air Force Cyber Analyst Accused of Rug Pull Cryptocurrency schemes continue to generate alleged returns for criminals, as two separate cases highlight. One centers on a Ukrainian accused of earning $2 million via cryptojacking, while another involves a U.S. Air Force cyber analyst charged with perpetrating an UndeadApes NFT rug pull.

287
287

More Trending

article thumbnail

DOD Unveils First-Ever National Defense Industrial Strategy

Data Breach Today

Pentagon Warns Failure to Modernize Defense Industrial Base Will Hinder US Globally The Department of Defense released a 60-page strategy that aims to modernize the defense industrial ecosystem and focuses on four long-term strategic priorities: improving supply chain resilience, enhancing workforce readiness, streamlining acquisitions and refining economic deterrence measures.

282
282
article thumbnail

Attackers target Apache Hadoop and Flink to deliver cryptominers

Security Affairs

Researchers devised a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners. Cybersecurity researchers from cyber security firm Aqua have uncovered a new attack targeting Apache Hadoop and Flink applications. The attacks exploit misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency cryptocurrency miners.

Big data 136
article thumbnail

Mississippi Health System Ransomware Attack Affects 253,000

Data Breach Today

Report to State Regulators Indicates Big Jump in Number of Patients Affected A Mississippi health system is notifying nearly 253,000 individuals that their data was potentially compromised in a "malicious and sophisticated ransomware" attack last August that also took IT systems offline. The cybercriminal gang Rhysida had claimed responsibility for the assault.

article thumbnail

Phemedrone info stealer campaign exploits Windows smartScreen bypass

Security Affairs

Threat actors exploit a recent Windows SmartScreen bypass flaw CVE-2023-36025 to deliver the Phemedrone info stealer. Trend Micro researchers uncovered a malware campaign exploiting the vulnerability CVE-2023-36025 (CVSS score 8.8) to deploy a previously unknown strain of the malware dubbed Phemedrone Stealer. The vulnerability was addressed by Microsoft with the release of Patch Tuesday security updates for November 2023.

Archiving 139
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Generative AI Concerns Grow in Record Election Year

Data Breach Today

Davos Forum Highlights Worries About AI-Enabled Misinformation Artificial intelligence-enabled voter misinformation campaigns and voter database hacking are some of the largest threats to election security in a year when more than half of the world's populace will take to the ballot box in elections ranging from free to flawed.

article thumbnail

Analysis of Phishing Emails Shows High Likelihood They Were Written By AI

KnowBe4

It’s no longer theoretical; phishing attacks and email scams are leveraging AI-generated content based on testing with anti-AI content solutions.

Phishing 118
article thumbnail

Voice Cloning with Very Short Samples

Schneier on Security

New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds. Research paper.

Paper 113
article thumbnail

Three-Quarters of Organizations Have Experienced Phishing Attack in the Last 12 Months

KnowBe4

Regardless of whether your environment remains on-premise, resides in the cloud, or is a hybrid configuration, new data makes it clear that your biggest risk is phishing attacks.

Phishing 100
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Weekly Update 382

Troy Hunt

Geez it's nice to be back in Oslo! This city has such a special place in my heart for so many reasons, not least of which by virtue of being Charlotte's home town we have so many friends and family here. Add in NDC Security this week with so many more mutual connections, beautiful snowy weather, snowboarding, sledging and even curling, it's just an awesome time.

Access 78
article thumbnail

Financial Supervision in a Digital World

Thales Cloud Protection & Licensing

Financial Supervision in a Digital World madhav Tue, 01/16/2024 - 05:44 If you’ve been working in the finance sector over the past few years, you will have noticed some big changes in the world of financial supervision. A new generation of Fintech players, as well as major regulatory changes regarding GDPR, KYC and AML have meant that Financial Supervision continues to evolve in our increasingly digitalised world.

article thumbnail

Unlocking value: Top digital transformation trends

IBM Big Data Hub

While digital transformation has been a trend for some years, emerging technologies have made this movement even more important. Companies are rethinking their business models to become more digital and competitive. They face an ever-increasing cadre of startups and established organizations, all of whom are also trying to keep up to date on digital transformation trends to achieve a competitive edge.

article thumbnail

The Enduring Legacy of Martin Luther King Jr.: A Beacon of Hope and History

Hanzo Learning Center

As we observe Martin Luther King Jr. Day, it's more than a commemoration of a great leader; it's a vital reminder of our ongoing journey toward equality and justice. This reflection explores the importance of this holiday in the context of our collective history and the imperative of civil rights as a foundational element of society.

IT 62
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How IBM process mining unleashed new efficiencies in BoB-Cardif Life

IBM Big Data Hub

Enterprises now recognize the importance of leveraging innovative technologies to drive digital transformation and achieve cost efficiency. However, a lack of precise top-level planning and a narrow focus on technology without integration with business needs led to significant investments with suboptimal results for many companies. The path of digital transformation is fraught with challenges.

Mining 66
article thumbnail

Jo Cornish to become Interim CEO of CILIP

CILIP

Jo Cornish to become Interim CEO of CILIP Jo Cornish will be stepping into the position of Interim CEO on 1st February 2024, and work with current CEO Nick Poole before he leaves at the end of March. The CILIP Board has requested Jo Cornish, Chief Development Officer at CILIP, to step in as interim Chief Executive, following CILIP's Chief Executive, Nick Poole's announcement that he will leave CILIP at at the end of March for a new role.

article thumbnail

5 key areas for governments to responsibly deploy generative AI

IBM Big Data Hub

In 2024, the ongoing process of digitalization further enhances the efficiency of government programs and the effectiveness of policies, as detailed in a previous white paper. Two critical elements driving this digital transformation are data and artificial intelligence (AI). AI plays a pivotal role in unlocking value from data and gaining deeper insights into the extensive information that governments collect to serve their citizens.

article thumbnail

CILIP welcomes new members to Board of Trustees

CILIP

CILIP welcomes new members to Board of Trustees Portraits from top left: Jonathan Waterfield, Cornelia Andersson, Corin Peacock, Surash Patel, Andrew Praeter, Kate Robinson Five new members will join the CILIP Board on 25 January 2024, with a new Chair and a presidential team reshuffle. Together they bring a unique and diverse skillset from libraries, finance, and brand management, that will help steer the direction of CILIP as we implement our We are CILIP strategy and action plan , during this

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

SymphonyAI Teams Up With Microsoft to Bring AI-Powered Solutions to Retailers

Information Matters

New York – SymphonyAI, a leader in enterprise AI software, announced an expanded collaboration with Microsoft at the National Retail Federation’s annual conference. The partnership aims to provide retailers and Read more The post SymphonyAI Teams Up With Microsoft to Bring AI-Powered Solutions to Retailers appeared first on Information Matters - Where AI Meets Knowledge Management.

Retail 52
article thumbnail

Women CyberSecurity Society Targeted by Smishing Campaign

KnowBe4

The Canada-based Women CyberSecurity Society (WCS2) has warned that its leadership, members, and volunteers are being targeted by an SMS phishing (smishing) campaign, IT World Canada reports.