Mon.Sep 23, 2024

article thumbnail

4 More EU Nations Join US-Led Initiative to Counter Spyware

Data Breach Today

Austria, Estonia, Lithuania and the Netherlands Join the Coalition Formed in March Four more European Union nations have joined a United States government-led initiative lanched in March to tackle spyware misuse globally. The move came amid growing criticisms of the European Commission's failure to curb the EU's prolific spyware market.

Marketing 278
article thumbnail

News alert: DigiCert acquires Vercara to enhance cloud-based DNS management, DDoS protection

The Last Watchdog

LEHI, Utah, Sept. 23, 2024 – DigiCert, backed by Clearlake Capital Group, L.P. (together with its affiliates, “Clearlake”), Crosspoint Capital Partners L.P. (“Crosspoint”), and TA Associates Management L.P. (“TA”), today announced it has completed its acquisition of Vercara, a leader in cloud-based services that secure the online experience, including managed authoritative Domain Name System (DNS) and Distributed Denial-of-Service (DDoS) security offerings that protect organizations’ network

Cloud 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pennsylvania Firm to Pay $65M for Cancer Patient Photo Hack

Data Breach Today

Lehigh Valley Health Network Will Pay 134,000 Victims of Ransomware Attack and Leak A Pennsylvania-based healthcare system that was hacked by ransomware group BlackCat in 2023 and extorted over stolen exam photos of breast cancer patients posted to a data leak site has agreed to pay $65 million under a proposed settlement of a lawsuit affecting 134,000 patients and employees.

article thumbnail

Educate Your Users About Malicious SEO Poisoning Attacks

KnowBe4

Since the beginning of computers, social engineering has been the number one way that computers and networks have been compromised. Social engineering is involved in 70% to 90% of all successful data breaches.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Rockwell Automation PLC Software Contains RCE Flaw

Data Breach Today

Attackers Could Shut Down Operations Or Cause Physical Damage A severe vulnerability in Rockwell Automation software used to configure programmable logic controllers could allow attackers to remotely execute malicious code. The vulnerability is rated 8.8 on the CVSS v4 scale. The U.S. Cybersecurity and Infrastructure Security Agency advised immediate patching.

More Trending

article thumbnail

US Pushes Ban on Chinese, Russian Tech in Connected Vehicles

Data Breach Today

Commerce Department Moves to Regulate Foreign Vehicle Tech Amid Security Fears The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.

article thumbnail

Chinese APT Earth Baxia target APAC by exploiting GeoServer flaw

Security Affairs

Suspected China-linked APT Earth Baxia targeted a government organization in Taiwan by exploiting a recently patched OSGeo GeoServer GeoTools flaw. Trend Micro researchers reported that China-linked APT group Earth Baxia has targeted a government organization in Taiwan and potentially other countries in the Asia-Pacific (APAC) region. The threat actor used spear-phishing emails and exploited the recently patched GeoServer vulnerability CVE-2024-36401.

article thumbnail

North Korea Targets Software Supply Chain Via PyPI

Data Breach Today

Backdoored Python Packages Likely Work of 'Gleaming Pisces,' Says Palo Alto A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.

221
221
article thumbnail

ESET fixed two privilege escalation flaws in its products

Security Affairs

ESET addressed two local privilege escalation vulnerabilities in security products for Windows and macOS operating systems. Cybersecurity firm ESET released security patches for two local privilege escalation vulnerabilities impacting Windows and macOS products. The first vulnerability, tracked as CVE-2024-7400 (CVSS score of 7.3), could allow an attacker to misuse ESET’s file operations during the removal of a detected file to delete files without having proper permissions to do so.

IT 77
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

How Microsoft Is Beefing Up Security With 34,000 Engineers

Data Breach Today

After Review Board Criticism, Microsoft Targets Culture, Governance, Engineering After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.

Security 187
article thumbnail

Zscaler: There are 200 Malicious Lookalike Domains for Every 1 Impersonated Brand

KnowBe4

Analysis of typosquatting and brand impersonation activity across 500 of the most visited domains provides insight in to how these techniques come together to effectively deceive.

article thumbnail

Fake Paystubs Are Draining Billions From Lenders

Data Breach Today

How AI Could Solve Failings of Traditional Employment and Income Verification Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.

IT 179
article thumbnail

Hacking the “Bike Angels” System for Moving Bikeshares

Schneier on Security

I always like a good hack. And this story delivers. Basically, the New York City bikeshare program has a system to reward people who move bicycles from full stations to empty ones. By deliberately moving bikes to create artificial problems, and exploiting exactly how the system calculates rewards, some people are making a lot of money. At 10 a.m. on a Tuesday last month, seven Bike Angels descended on the docking station at Broadway and 53rd Street, across from the Ed Sullivan Theater.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Telegram Pledges Closer Cooperation With Police

Data Breach Today

Embattled CEO Pavel Durov Says Telegram Will Released IP Addresses, Phone Numbers Embattled Telegram CEO Pavel Durov signaled a more cooperative relationship with law enforcement, telling users Monday the messaging service will provide IP addresses and phone numbers "in response to valid legal requests." Durov faces criminal charges in France.

170
170
article thumbnail

5 handy Alexa routines I depend on every day - and how to build your own

Collaboration 2.0

Ready to unlock your Amazon Echo's true potential? Here's how Alexa routines can automate your home, simplify tasks, and save you time with just a few taps in the Alexa app.

72
article thumbnail

North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages

Security Affairs

North Korea-linked APT group Gleaming Pisces is distributing a new malware called PondRAT through tainted Python packages. Unit 42 researchers uncovered an ongoing campaign distributing Linux and macOS malwar PondRAT through poisoned Python packages. The campaign is attributed to North Korea-linked threat actor Gleaming Pisces (also known as Citrine Sleet ), who previously distributed the macOS remote administration tool POOLRAT (aka SIMPLESEA ).

Risk 70
article thumbnail

This Samsung T5 SSD is almost 50% off at Amazon well before October Prime Day

Collaboration 2.0

The Samsung T5 Evo 4TB portable SSD is over $200 off at Amazon, letting you save nearly 50% on all the storage space you'll need for games, documents, photos, and videos.

97
article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

Half of all Financial Services Cyber Attacks Start with a Very Costly Phish

KnowBe4

New analysis of attacks on the financial sector shows that the combination of phishing emails and compromised credentials is a recurring — and financially impactful — threat.

article thumbnail

Key Takeaways from the Thales Data Threat Report: EME Edition

Thales Cloud Protection & Licensing

Key Takeaways from the Thales Data Threat Report: EME Edition madhav Tue, 09/24/2024 - 05:23 Organizations in the Europe and Middle East (EME) region face significant challenges. The threat landscape is increasingly complex, regulatory requirements are becoming more stringent, and the economic environment remains uncertain. The 2024 Thales Data Threat Report: Europe and Middle East Edition provides insight into how EME decision-makers navigate these challenges, leverage emerging technologies, an

article thumbnail

Scammers Abuse Virtual Shopping Lists to Trick Walmart Customers

KnowBe4

Threat actors are abusing virtual shopping lists to trick Walmart customers into transferring money or disclosing personal information, according to researchers at Malwarebytes. Links to the lists are distributed via Google Ads that impersonate Walmart support.

article thumbnail

Get real feedback from Performance Testers who use OpenText™ LoadRunner™ Solutions

OpenText Information Management

Performance testing is an important step in software development to ensure that applications can handle their projected user loads and remain stable under stress. Tools for these tests help in identifying bottlenecks, optimizing performance, and preventing costly issues before software reaches production. The OpenText LoadRunner family is a suite of performance testing tools that offer functions such as load testing to simulate concurrent users, stress testing to determine system limits, and per

Cloud 62
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Telegram will provide user data to law enforcement in response to legal requests

Security Affairs

Telegram will provide user data to law enforcement agencies in response to valid legal requests, according to a recent policy update Telegram has updated its privacy policy informing users that it will share users’ phone numbers and IP addresses with law enforcement in response to valid legal requests. The company CEO Pavel Durov announced the policy update this week.

Privacy 62
article thumbnail

Some of Siri's long-awaited AI enhancements could reach users by January

Collaboration 2.0

Though most of Siri's new core Apple Intelligence abilities are slated for next March, some may pop up in January, says Bloomberg's Mark Gurman.

74
article thumbnail

Vulnerability Recap 9/23/24 – Remote Code Execution Steals the Show

eSecurity Planet

Our security overview for the week includes Veeam and ServiceNow flaws and a vulnerability within the web browser Arc. Also, we get some more information on related macOS vulnerabilities fixed in 2022 and 2023. And Ivanti’s issues unfortunately keep coming, this time in its Cloud Service Appliance product. This week, RCE is in our (unwanted) starring role, with multiple opportunities for threat actors to execute malicious code.

Cloud 57
article thumbnail

One of the best QLED TVs I've tested isn't from Samsung or LG

Collaboration 2.0

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode for console gamers at a price that's not going to break the bank.

71
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

OpenText World 2024: Announcing keynote speakers

OpenText Information Management

Hear these and other inspiring speakers offer advice and insights on how you can elevate human potential and reimagine information help lead your organization in the digital era. Register today! The post OpenText World 2024: Announcing keynote speakers appeared first on OpenText Blogs.

Cloud 57
article thumbnail

The Amazon Fire TV Omni QLED offers a great picture, and it's $150 off

Collaboration 2.0

The Amazon Fire TV Omni QLED offers great picture and audio quality for both streaming and console gaming, and you can save $150 on the 55-inch version with this deal.

IT 67
article thumbnail

US Leads Global AI Startup Race, UK Lags Behind

Information Matters

In a rapidly expanding artificial intelligence market, the United States has emerged as the clear frontrunner for AI startups, while the United Kingdom finds itself trailing in eleventh place, according Read more The post US Leads Global AI Startup Race, UK Lags Behind appeared first on Information Matters - AI in the UK.