Wed.Oct 30, 2024

article thumbnail

Microsoft Warns of Ongoing Russian Intelligence Campaign

Data Breach Today

Russian SVR Targeting Government, Academia, Defense Organizations Globally A Russian-state hacking group is posing as Microsoft employees and sending malicious configuration files as email attachments to target organizations across the world. The campaign has the hallmarks of a Midnight Blizzard phishing campaign although its use of an RDP configuration file is novel.

Phishing 303
article thumbnail

Change Healthcare Breach Hits 100M Americans

Krebs on Security

Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information. Image: Tamer Tuncay, Shutterstock.com. A ransomware attack at Change Healthcare in the third week of February quickly spawned disruptions across the U.S. healthcare system that reverberated for months, thanks to the company’s c

Insurance 283
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Delta Air Lines' IT Outage Lawsuit: CrowdStrike Countersues

Data Breach Today

Vendor Blames Delta's Outage Severity on Its 'Own Response and IT Infrastructure' CrowdStrike has countersued customer Delta Air Lines, accusing the airline of employing a lawsuit and seeking damages in "a desperate attempt to shift blame" for Delta's own IT inadequacies having exacerbated its outage, unlike "other major airlines" that quickly resumed operations.

IT 302
article thumbnail

This Lenovo laptop is my surprise pick for best MacBook Pro alternative (even for Apple users)

Collaboration 2.0

Lenovo's Yoga Slim 7i Aura Edition pairs several unique and helpful features with the high-performing and efficient Intel Core Ultra 7 (Series 2).

124
124
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Career Advice: Cybersecurity Means Business

Data Breach Today

Understanding the Impact of Security on the Business Makes You More Effective With cybersecurity now embedded across all industries and functions, the importance of aligning security measures with business objectives has never been greater. Here’s why being business savvy is crucial in cybersecurity - and how you can cultivate it to become a more effective professional.

More Trending

article thumbnail

Filigran Expands AI-Driven Threat Intel With $35M Series B

Data Breach Today

Insight Partners-Led Round Boosts US Growth, Fuels Threat Intelligence for Filigran Filigran’s $35 million Series B funding, led by Insight Partners, positions the company to scale its threat intelligence and proactive security capabilities while expanding its U.S. footprint. Plans include doubling the engineering team and strengthening breach and attack simulation capabilities.

Security 292
article thumbnail

This $99 Android phone is no Pixel 9 Pro, but performs better than handsets twice the price

Collaboration 2.0

Not everyone needs a $1,000 phone​. If you're on a tight budget or you're shopping for the kids, the NUU N10 is a truly impressive budget handset.

122
122
article thumbnail

CISA Opens Election War Room to Combat Escalating Threats

Data Breach Today

United States’ Top Cyber Defense Agency Mobilizes Nationwide Election Support Hub The director of the Cybersecurity and Infrastructure Security Agency said Wednesday the agency is establishing an election operations room to help counter foreign interference and support state officials amid escalating cyber and physical threats to the 2024 vote.

article thumbnail

QNAP fixed NAS backup zero-day demonstrated at Pwn2Own Ireland 2024

Security Affairs

QNAP fixed critical zero-day CVE-2024-50388 which was demonstrated against a TS-464 NAS device during the Pwn2Own Ireland 2024 competition. QNAP addressed a critical zero-day vulnerability, tracked as CVE-2024-50388, which was exploited by white hat hackers against a TS-464 NAS device during the recent Pwn2Own Ireland 2024 hacking competition. The flaw is an OS command injection vulnerability in HBS 3 Hybrid Backup Sync , a remote attacker could exploit it to execute arbitrary code commands on

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Do Leading AI Models Comply With the EU AI Act?

Data Breach Today

New Compliance Tool Say Many AI Firms Fail to Meet Security, Fairness Standards Large language models developed by Meta and Mistral AI are among a dozen artificial intelligence models that fail to meet the cybersecurity and fairness requirements of the European Union AI Act, which went into effect on Aug. 1, said developers of a new open-source AI evaluation tool.

article thumbnail

QR Code Phishing is Growing More Sophisticated

KnowBe4

Sophos describes a QR code phishing (quishing) campaign that targeted its employees in an attempt to steal information.

Phishing 119
article thumbnail

State Forces ENT Practice to Spend $2.25M on Better Security

Data Breach Today

NY AG Action and $1M Fine Follow Back-to-Back Hacks That Affected 224,500 in 2023 An upstate New York-based medical practice must spend $2.25 million to improve its data security practices over the next five years, plus pay state regulators up to a $1 million fine following an investigation into two ransomware attacks days apart in 2023 that affected nearly 224,500 people.

Security 286
article thumbnail

M4 Mac Mini vs. M2 Mac Mini: Which Apple desktop should you buy?

Collaboration 2.0

Apple's new Mac Mini offers a big performance boost thanks to the M4 chipset, but is it enough to warrant a purchase?

IT 116
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Google fixed a critical vulnerability in Chrome browser

Security Affairs

Google addressed a critical vulnerability in its Chrome browser, tracked as CVE-2024-10487, which was reported by Apple. Google has patched a critical Chrome vulnerability, tracked as CVE-2024-10487, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. The vulnerability is an out-of-bounds write issue that resides in the Dawn implementation.

Security 138
article thumbnail

I tested sleep earbuds made by ex-Bose engineers, and they worked like a charm

Collaboration 2.0

The Ozlo Sleepbuds, with their calming audio output and comforting fit, are the best sleep earbuds I've ever used.

116
116
article thumbnail

New version of Android malware FakeCall redirects bank calls to scammers

Security Affairs

The latest FakeCall malware version for Android intercepts outgoing bank calls, redirecting them to attackers to steal sensitive info and bank funds. Zimperium researchers spotted a new version of the FakeCall malware for Android that hijacks outgoing victims’ calls and redirects them to the attacker’s phone number. The malware allows operators to steal bank users’ sensitive information and money from their bank accounts.

article thumbnail

We have an official open-source AI definition now, but the fight is far from over

Collaboration 2.0

Which of the three sides are you on?

109
109
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Google fixed a critical vulnerability in Chrome browser

Security Affairs

Google addressed a critical vulnerability in its Chrome browser, tracked as CVE-2024-10487, which was reported by Apple. Google has patched a critical Chrome vulnerability, tracked as CVE-2024-10487, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. The vulnerability is an out-of-bounds write issue that resides in the Dawn implementation.

article thumbnail

Gen AI as a software quality tool? Skepticism is fading as more organizations implement it

Collaboration 2.0

IT pros' attitudes toward using generative AI as a quality assurance and testing vehicle have shifted significantly over the past 12 months, a new survey found.

IT 104
article thumbnail

Energizing business outcomes: How data-driven AI and cybersecurity shape the future of Energy & Utilities

CGI

The Energy and Utilities sector is undergoing rapid transformation, driven by decarbonization goals, changing consumer demands and technological advancements. In this changing environment, the sector is confronted with new market pressures, heightened competition, an increased risk of cyberattacks, and pricing pressures imposed by competition, governments and regulators.

article thumbnail

Apple Watch lets you translate your conversations in real-time. Here's how

Collaboration 2.0

WatchOS 11's Translate app lets you have a live conversation in two languages with another person - right from your wrist.

103
103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Simpson Garfinkel on Spooky Cryptographic Action at a Distance

Schneier on Security

Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When I create a virtual machine server in the Amazon cloud, I am prompted for an RSA public key that will be used to control access to the machine.

Risk 113
article thumbnail

How to make LibreOffice look more like Microsoft Office

Collaboration 2.0

If you've been using Microsoft Office for years but want to switch to LibreOffice, here's how to get a more familiar UI to make the transition seamless.

103
103
article thumbnail

Is RIOT Data Undermining Your Information Governance? Here’s What You Need to Know 

Gimmal

In today’s landscape, organizations accumulate vast amounts of information daily. While data is a cornerstone of modern business, not all of it serves a purpose. In fact, a significant portion could be working against you. Enter RIOT data : Redundant, Inaccessible , Obsolete, and Trivial data that clogs systems, inflates costs, and exposes organizations to compliance risks.

article thumbnail

48% of people have been scammed while holiday shopping online - what to watch for

Collaboration 2.0

Almost half of Americans will do most of their holiday shopping between Black Friday and Cyber Monday. But that's also the busiest time of the year for scammers. Here's how to protect yourself.

102
102
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Why Apple Intelligence and Private Cloud Compute are so different and secure

Jamf

Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

Cloud 45
article thumbnail

Can Apple's new AI photo 'Clean up' tool beat Google's Magic Editor? For some users, yes

Collaboration 2.0

On my iPhone, I used these rival tools to fix the busy backgrounds of some vacation pics. Compare the respective results here.

100
100
article thumbnail

Simson Garfinkel on Spooky Cryptographic Action at a Distance

Schneier on Security

Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When I create a virtual machine server in the Amazon cloud, I am prompted for an RSA public key that will be used to control access to the machine.

Risk 61