Mon.Sep 23, 2024

article thumbnail

US Pushes Ban on Chinese, Russian Tech in Connected Vehicles

Data Breach Today

Commerce Department Moves to Regulate Foreign Vehicle Tech Amid Security Fears The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.

article thumbnail

Chinese APT Earth Baxia target APAC by exploiting GeoServer flaw

Security Affairs

Suspected China-linked APT Earth Baxia targeted a government organization in Taiwan by exploiting a recently patched OSGeo GeoServer GeoTools flaw. Trend Micro researchers reported that China-linked APT group Earth Baxia has targeted a government organization in Taiwan and potentially other countries in the Asia-Pacific (APAC) region. The threat actor used spear-phishing emails and exploited the recently patched GeoServer vulnerability CVE-2024-36401.

Phishing 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea Targets Software Supply Chain Via PyPI

Data Breach Today

Backdoored Python Packages Likely Work of 'Gleaming Pisces,' Says Palo Alto A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.

304
304
article thumbnail

ESET fixed two privilege escalation flaws in its products

Security Affairs

ESET addressed two local privilege escalation vulnerabilities in security products for Windows and macOS operating systems. Cybersecurity firm ESET released security patches for two local privilege escalation vulnerabilities impacting Windows and macOS products. The first vulnerability, tracked as CVE-2024-7400 (CVSS score of 7.3), could allow an attacker to misuse ESET’s file operations during the removal of a detected file to delete files without having proper permissions to do so.

IT 135
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How Microsoft Is Beefing Up Security With 34,000 Engineers

Data Breach Today

After Review Board Criticism, Microsoft Targets Culture, Governance, Engineering After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.

Security 290

More Trending

article thumbnail

Pennsylvania Firm to Pay $65M for Cancer Patient Photo Hack

Data Breach Today

Lehigh Valley Health Network Will Pay 134,000 Victims of Ransomware Attack and Leak A Pennsylvania-based healthcare system that was hacked by ransomware group BlackCat in 2023 and extorted over stolen exam photos of breast cancer patients posted to a data leak site has agreed to pay $65 million under a proposed settlement of a lawsuit affecting 134,000 patients and employees.

article thumbnail

Educate Your Users About Malicious SEO Poisoning Attacks

KnowBe4

Since the beginning of computers, social engineering has been the number one way that computers and networks have been compromised. Social engineering is involved in 70% to 90% of all successful data breaches.

Education 119
article thumbnail

4 More EU Nations Join US-Led Initiative to Counter Spyware

Data Breach Today

Austria, Estonia, Lithuania and the Netherlands Join the Coalition Formed in March Four more European Union nations have joined a United States government-led initiative lanched in March to tackle spyware misuse globally. The move came amid growing criticisms of the European Commission's failure to curb the EU's prolific spyware market.

Marketing 289
article thumbnail

Scammers Abuse Virtual Shopping Lists to Trick Walmart Customers

KnowBe4

Threat actors are abusing virtual shopping lists to trick Walmart customers into transferring money or disclosing personal information, according to researchers at Malwarebytes. Links to the lists are distributed via Google Ads that impersonate Walmart support.

Security 113
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Rockwell Automation PLC Software Contains RCE Flaw

Data Breach Today

Attackers Could Shut Down Operations Or Cause Physical Damage A severe vulnerability in Rockwell Automation software used to configure programmable logic controllers could allow attackers to remotely execute malicious code. The vulnerability is rated 8.8 on the CVSS v4 scale. The U.S. Cybersecurity and Infrastructure Security Agency advised immediate patching.

article thumbnail

Half of all Financial Services Cyber Attacks Start with a Very Costly Phish

KnowBe4

New analysis of attacks on the financial sector shows that the combination of phishing emails and compromised credentials is a recurring — and financially impactful — threat.

article thumbnail

Telegram Pledges Closer Cooperation With Police

Data Breach Today

Embattled CEO Pavel Durov Says Telegram Will Released IP Addresses, Phone Numbers Embattled Telegram CEO Pavel Durov signaled a more cooperative relationship with law enforcement, telling users Monday the messaging service will provide IP addresses and phone numbers "in response to valid legal requests." Durov faces criminal charges in France.

266
266
article thumbnail

Zscaler: There are 200 Malicious Lookalike Domains for Every 1 Impersonated Brand

KnowBe4

Analysis of typosquatting and brand impersonation activity across 500 of the most visited domains provides insight in to how these techniques come together to effectively deceive.

Security 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Fake Paystubs Are Draining Billions From Lenders

Data Breach Today

How AI Could Solve Failings of Traditional Employment and Income Verification Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.

IT 262
article thumbnail

Hacking the “Bike Angels” System for Moving Bikeshares

Schneier on Security

I always like a good hack. And this story delivers. Basically, the New York City bikeshare program has a system to reward people who move bicycles from full stations to empty ones. By deliberately moving bikes to create artificial problems, and exploiting exactly how the system calculates rewards, some people are making a lot of money. At 10 a.m. on a Tuesday last month, seven Bike Angels descended on the docking station at Broadway and 53rd Street, across from the Ed Sullivan Theater.

article thumbnail

News alert: DigiCert acquires Vercara to enhance cloud-based DNS management, DDoS protection

The Last Watchdog

LEHI, Utah, Sept. 23, 2024 – DigiCert, backed by Clearlake Capital Group, L.P. (together with its affiliates, “Clearlake”), Crosspoint Capital Partners L.P. (“Crosspoint”), and TA Associates Management L.P. (“TA”), today announced it has completed its acquisition of Vercara, a leader in cloud-based services that secure the online experience, including managed authoritative Domain Name System (DNS) and Distributed Denial-of-Service (DDoS) security offerings that protect organizations’ network

Cloud 100
article thumbnail

5 handy Alexa routines I depend on every day - and how to build your own

Collaboration 2.0

Ready to unlock your Amazon Echo's true potential? Here's how Alexa routines can automate your home, simplify tasks, and save you time with just a few taps in the Alexa app.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Types of Cloud Security Controls & Their Uses

eSecurity Planet

Cloud security controls are methods and protocols to protect cloud environments’ data, applications, and infrastructure. They enforce security measures to prevent threats and unauthorized access. These controls comprise physical, technical, and administrative safeguards. Understanding the various controls, their applications, benefits, and associated risks will help you gain full, secure operations during and after cloud migration.

Cloud 88
article thumbnail

OLED vs. QLED TV: Which panel type is best suited for your home?

Collaboration 2.0

What's the difference between OLED and QLED TVs? Brightness level, picture quality, and price are just a few factors in deciding why you should buy one over the other.

98
article thumbnail

North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages

Security Affairs

North Korea-linked APT group Gleaming Pisces is distributing a new malware called PondRAT through tainted Python packages. Unit 42 researchers uncovered an ongoing campaign distributing Linux and macOS malwar PondRAT through poisoned Python packages. The campaign is attributed to North Korea-linked threat actor Gleaming Pisces (also known as Citrine Sleet ), who previously distributed the macOS remote administration tool POOLRAT (aka SIMPLESEA ).

Risk 86
article thumbnail

So long, Chromecast: Google TV Streamer available today with these new features

Collaboration 2.0

Doubling as a smart home hub, the new streaming device comes with Google TV Freeplay and a Sports Page. You can buy it now.

IT 97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

OpenText World 2024: Announcing keynote speakers

OpenText Information Management

Hear these and other inspiring speakers offer advice and insights on how you can elevate human potential and reimagine information help lead your organization in the digital era. Register today! The post OpenText World 2024: Announcing keynote speakers appeared first on OpenText Blogs.

Cloud 69
article thumbnail

Police are using AI to write crime reports. What could go wrong?

Collaboration 2.0

Axon's Draft One is meant to save officers time, but can tech known to hallucinate improve policing?

76
article thumbnail

Get real feedback from Performance Testers who use OpenText™ LoadRunner™ Solutions

OpenText Information Management

Performance testing is an important step in software development to ensure that applications can handle their projected user loads and remain stable under stress. Tools for these tests help in identifying bottlenecks, optimizing performance, and preventing costly issues before software reaches production. The OpenText LoadRunner family is a suite of performance testing tools that offer functions such as load testing to simulate concurrent users, stress testing to determine system limits, and per

Cloud 64
article thumbnail

File won't download from Google Drive? Here's how to fix that

Collaboration 2.0

If your browser is suddenly refusing to download files from Google Drive, there's likely a very simple reason.

76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Key Takeaways from the Thales Data Threat Report: EME Edition

Thales Cloud Protection & Licensing

Key Takeaways from the Thales Data Threat Report: EME Edition madhav Tue, 09/24/2024 - 05:23 Organizations in the Europe and Middle East (EME) region face significant challenges. The threat landscape is increasingly complex, regulatory requirements are becoming more stringent, and the economic environment remains uncertain. The 2024 Thales Data Threat Report: Europe and Middle East Edition provides insight into how EME decision-makers navigate these challenges, leverage emerging technologies, an

article thumbnail

My new iPhone 16 Pro got stuck during setup. Here's how I fixed it - fast

Collaboration 2.0

If your new iPhone's display freezes on 'cellular setup complete,' don't waste your time waiting and waiting. Do this instead.

IT 75
article thumbnail

Vulnerability Recap 9/23/24 – Remote Code Execution Steals the Show

eSecurity Planet

Our security overview for the week includes Veeam and ServiceNow flaws and a vulnerability within the web browser Arc. Also, we get some more information on related macOS vulnerabilities fixed in 2022 and 2023. And Ivanti’s issues unfortunately keep coming, this time in its Cloud Service Appliance product. This week, RCE is in our (unwanted) starring role, with multiple opportunities for threat actors to execute malicious code.

Cloud 58