Mon.Sep 23, 2024

article thumbnail

US Pushes Ban on Chinese, Russian Tech in Connected Vehicles

Data Breach Today

Commerce Department Moves to Regulate Foreign Vehicle Tech Amid Security Fears The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.

article thumbnail

Chinese APT Earth Baxia target APAC by exploiting GeoServer flaw

Security Affairs

Suspected China-linked APT Earth Baxia targeted a government organization in Taiwan by exploiting a recently patched OSGeo GeoServer GeoTools flaw. Trend Micro researchers reported that China-linked APT group Earth Baxia has targeted a government organization in Taiwan and potentially other countries in the Asia-Pacific (APAC) region. The threat actor used spear-phishing emails and exploited the recently patched GeoServer vulnerability CVE-2024-36401.

Phishing 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pennsylvania Firm to Pay $65M for Cancer Patient Photo Hack

Data Breach Today

Lehigh Valley Health Network Will Pay 134,000 Victims of Ransomware Attack and Leak A Pennsylvania-based healthcare system that was hacked by ransomware group BlackCat in 2023 and extorted over stolen exam photos of breast cancer patients posted to a data leak site has agreed to pay $65 million under a proposed settlement of a lawsuit affecting 134,000 patients and employees.

article thumbnail

News alert: DigiCert acquires Vercara to enhance cloud-based DNS management, DDoS protection

The Last Watchdog

LEHI, Utah, Sept. 23, 2024 – DigiCert, backed by Clearlake Capital Group, L.P. (together with its affiliates, “Clearlake”), Crosspoint Capital Partners L.P. (“Crosspoint”), and TA Associates Management L.P. (“TA”), today announced it has completed its acquisition of Vercara, a leader in cloud-based services that secure the online experience, including managed authoritative Domain Name System (DNS) and Distributed Denial-of-Service (DDoS) security offerings that protect organizations’ network

Cloud 100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

4 More EU Nations Join US-Led Initiative to Counter Spyware

Data Breach Today

Austria, Estonia, Lithuania and the Netherlands Join the Coalition Formed in March Four more European Union nations have joined a United States government-led initiative lanched in March to tackle spyware misuse globally. The move came amid growing criticisms of the European Commission's failure to curb the EU's prolific spyware market.

Marketing 289

More Trending

article thumbnail

North Korea Targets Software Supply Chain Via PyPI

Data Breach Today

Backdoored Python Packages Likely Work of 'Gleaming Pisces,' Says Palo Alto A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.

287
287
article thumbnail

Types of Cloud Security Controls & Their Uses

eSecurity Planet

Cloud security controls are methods and protocols to protect cloud environments’ data, applications, and infrastructure. They enforce security measures to prevent threats and unauthorized access. These controls comprise physical, technical, and administrative safeguards. Understanding the various controls, their applications, benefits, and associated risks will help you gain full, secure operations during and after cloud migration.

Cloud 106
article thumbnail

How Microsoft Is Beefing Up Security With 34,000 Engineers

Data Breach Today

After Review Board Criticism, Microsoft Targets Culture, Governance, Engineering After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.

Security 277
article thumbnail

Hacking the “Bike Angels” System for Moving Bikeshares

Schneier on Security

I always like a good hack. And this story delivers. Basically, the New York City bikeshare program has a system to reward people who move bicycles from full stations to empty ones. By deliberately moving bikes to create artificial problems, and exploiting exactly how the system calculates rewards, some people are making a lot of money. At 10 a.m. on a Tuesday last month, seven Bike Angels descended on the docking station at Broadway and 53rd Street, across from the Ed Sullivan Theater.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Rockwell Automation PLC Software Contains RCE Flaw

Data Breach Today

Attackers Could Shut Down Operations Or Cause Physical Damage A severe vulnerability in Rockwell Automation software used to configure programmable logic controllers could allow attackers to remotely execute malicious code. The vulnerability is rated 8.8 on the CVSS v4 scale. The U.S. Cybersecurity and Infrastructure Security Agency advised immediate patching.

article thumbnail

Telegram will provide user data to law enforcement in response to legal requests

Security Affairs

Telegram will provide user data to law enforcement agencies in response to valid legal requests, according to a recent policy update Telegram has updated its privacy policy informing users that it will share users’ phone numbers and IP addresses with law enforcement in response to valid legal requests. The company CEO Pavel Durov announced the policy update this week.

Privacy 113
article thumbnail

Telegram Pledges Closer Cooperation With Police

Data Breach Today

Embattled CEO Pavel Durov Says Telegram Will Released IP Addresses, Phone Numbers Embattled Telegram CEO Pavel Durov signaled a more cooperative relationship with law enforcement, telling users Monday the messaging service will provide IP addresses and phone numbers "in response to valid legal requests." Durov faces criminal charges in France.

248
248
article thumbnail

Educate Your Users About Malicious SEO Poisoning Attacks

KnowBe4

Since the beginning of computers, social engineering has been the number one way that computers and networks have been compromised. Social engineering is involved in 70% to 90% of all successful data breaches.

Education 106
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Fake Paystubs Are Draining Billions From Lenders

Data Breach Today

How AI Could Solve Failings of Traditional Employment and Income Verification Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.

IT 232
article thumbnail

5 handy Alexa routines I depend on every day - and how to build your own

Collaboration 2.0

Ready to unlock your Amazon Echo's true potential? Here's how Alexa routines can automate your home, simplify tasks, and save you time with just a few taps in the Alexa app.

98
article thumbnail

Zscaler: There are 200 Malicious Lookalike Domains for Every 1 Impersonated Brand

KnowBe4

Analysis of typosquatting and brand impersonation activity across 500 of the most visited domains provides insight in to how these techniques come together to effectively deceive.

article thumbnail

OLED vs. QLED TV: Which panel type is best suited for your home?

Collaboration 2.0

What's the difference between OLED and QLED TVs? Brightness level, picture quality, and price are just a few factors in deciding why you should buy one over the other.

98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Scammers Abuse Virtual Shopping Lists to Trick Walmart Customers

KnowBe4

Threat actors are abusing virtual shopping lists to trick Walmart customers into transferring money or disclosing personal information, according to researchers at Malwarebytes. Links to the lists are distributed via Google Ads that impersonate Walmart support.

article thumbnail

So long, Chromecast: Google TV Streamer available today with these new features

Collaboration 2.0

Doubling as a smart home hub, the new streaming device comes with Google TV Freeplay and a Sports Page. You can buy it now.

IT 97
article thumbnail

Half of all Financial Services Cyber Attacks Start with a Very Costly Phish

KnowBe4

New analysis of attacks on the financial sector shows that the combination of phishing emails and compromised credentials is a recurring — and financially impactful — threat.

article thumbnail

North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages

Security Affairs

North Korea-linked APT group Gleaming Pisces is distributing a new malware called PondRAT through tainted Python packages. Unit 42 researchers uncovered an ongoing campaign distributing Linux and macOS malwar PondRAT through poisoned Python packages. The campaign is attributed to North Korea-linked threat actor Gleaming Pisces (also known as Citrine Sleet ), who previously distributed the macOS remote administration tool POOLRAT (aka SIMPLESEA ).

Risk 79
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Buy a Microsoft Office for Windows license for $35 - the lowest price so far

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 84% off right now (there's a deal for a Mac version, too).

98
article thumbnail

OpenText World 2024: Announcing keynote speakers

OpenText Information Management

Hear these and other inspiring speakers offer advice and insights on how you can elevate human potential and reimagine information help lead your organization in the digital era. Register today! The post OpenText World 2024: Announcing keynote speakers appeared first on OpenText Blogs.

Cloud 69
article thumbnail

Cloudflare's new AI Audit tool aims to give content creators better bot controls

Collaboration 2.0

Don't want your work ripped off by OpenAI, Meta AI, and Google Gemini? If your work is on a website you control, Cloudflare's AI Audit tool may help. Here's how to try it.

IT 75
article thumbnail

Key Takeaways from the Thales Data Threat Report: EME Edition

Thales Cloud Protection & Licensing

Key Takeaways from the Thales Data Threat Report: EME Edition madhav Tue, 09/24/2024 - 05:23 Organizations in the Europe and Middle East (EME) region face significant challenges. The threat landscape is increasingly complex, regulatory requirements are becoming more stringent, and the economic environment remains uncertain. The 2024 Thales Data Threat Report: Europe and Middle East Edition provides insight into how EME decision-makers navigate these challenges, leverage emerging technologies, an

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Sign up for Costco and get a $20 gift card, free

Collaboration 2.0

Don't miss this deal to buy your own Costco membership and get a free $20 gift card, effectively cutting the price to $45 for the year. (I bought one and highly recommend it.

IT 97
article thumbnail

Get real feedback from Performance Testers who use OpenText™ LoadRunner™ Solutions

OpenText Information Management

Performance testing is an important step in software development to ensure that applications can handle their projected user loads and remain stable under stress. Tools for these tests help in identifying bottlenecks, optimizing performance, and preventing costly issues before software reaches production. The OpenText LoadRunner family is a suite of performance testing tools that offer functions such as load testing to simulate concurrent users, stress testing to determine system limits, and per

Cloud 64
article thumbnail

This Samsung T5 SSD is almost 50% off at Amazon well before October Prime Day

Collaboration 2.0

The Samsung T5 Evo 4TB portable SSD is over $200 off at Amazon, letting you save nearly 50% on all the storage space you'll need for games, documents, photos, and videos.

98