Wed.Jan 03, 2024

article thumbnail

Russia Hacked Surveillance Cameras to Target Sites in Kyiv

Data Breach Today

Hackers Used the Cameras to Spy on Ukraine's Air Defenses, Critical Infrastructure The Russian military hacked into surveillance cameras to spy on Ukrainian air defenses and Kyiv's critical infrastructure during the missile and drone strikes on the capital city Tuesday. Ukraine has blocked and dismantled the cameras, and it urged users to stop sharing security camera feeds online.

Military 309
article thumbnail

Hackers stole more than $81 million worth of crypto assets from Orbit Chain

Security Affairs

Crypto platform Orbit Chain suffered a cyberattack, threat actors have stolen more than $81 million worth of cryptocurrency. Orbit Chain has suffered a security breach that has resulted in the theft of more than $81 million worth of cryptocurrency. Orbit Chain is a multi-asset blockchain platform that connects various blockchains through Inter-Blockchain Communication (IBC).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware: 2023 Victim Count Appears to Reach Record Levels

Data Breach Today

Healthcare, School District and University Victim Counts Increase, Research Reports The count of known U.S. organizations that fell victim to ransomware last year - whether or not they paid a ransom - surged from 220 to 321, and hospital systems, K-12 school districts and post-secondary schools were especially affected, researchers report.

article thumbnail

Don’t trust links with known domains: BMW affected by redirect vulnerability

Security Affairs

Sometimes, you can’t even trust links with your own domain. As the Cybernews research team has discovered, some BMW subdomains were vulnerable to redirect vulnerability, enabling attackers to forge links leading to malicious sites through them. Cybernews researchers have discovered two BMW subdomains that were vulnerable to SAP redirect vulnerability.

Phishing 138
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How NOT to Lead: Critical Errors in Cybersecurity Leadership

Data Breach Today

Zero Trust Expert Chase Cunningham on His Latest Book About Leadership Styles Chase Cunningham discusses his new book, "How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders,” which details critical errors that can undermine your cybersecurity leadership and jeopardize your reputation and your company's future.

More Trending

article thumbnail

Ransomware Actors Steal Australian Courts' Video Recordings

Data Breach Today

Hackers Lock Up Recordings of Court Hearings to Extort Victoria's Court System The court system of Victoria said it had experienced a serious cybersecurity incident in late 2023 that gave hackers access to video recordings of proceedings at multiple courts, including the Supreme Court and the County Court. The hack took place on Dec. 8 and was discovered two weeks later.

article thumbnail

CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome and Perl library flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Below is the list of the issues added to the catalog: CVE-2023-7024 – The vulnerability is a Heap buffer overflow issue in WebRTC.

Libraries 135
article thumbnail

Hack on Defunct Ambulance Firm Affects 912,000 People

Data Breach Today

Archived Data Stolen 2 Months After Sale of Business Affects Patients, Employees A defunct ambulance company is notifying nearly 912,000 patients and employees that their archived records were compromised in an early 2023 data theft hack. The firm previously provided emergency care in the Boston region and administrative services to affiliated transportation companies.

Archiving 268
article thumbnail

Facial Recognition Systems in the US

Schneier on Security

A helpful summary of which US retail stores are using facial recognition, thinking about using it, or currently not planning on using it. (This, of course, can all change without notice.) Three years ago, I wrote that campaigns to ban facial recognition are too narrow. The problem here is identification, correlation, and then discrimination. There’s no difference whether the identification technology is facial recognition, the MAC address of our phones, gait recognition, license plate reco

Retail 112
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

SentinelOne to Bolster Cloud Security With PingSafe Buy

Data Breach Today

SentinelOne to Add CNAP Capabilities for 'Best of Breed' Security Platform Endpoint security firm SentinelOne is set to acquire PingSafe for an undisclosed sum of cash and stock. The move will integrate PingSafe's cloud-native application protection platform into SentinelOne's Singularity Platform, creating a unified and advanced cloud security solution.

Cloud 260
article thumbnail

New Research: Phishing Attacks Stole $295 Million In Crypto In 2023

KnowBe4

Researchers at Scam Sniffers have found that phishing attacks stole nearly $295 million worth of cryptocurrency from 324,000 victims in 2023, CryptoSlate reports. The cryptocurrency is stolen by malware delivered via phishing sites.

Phishing 111
article thumbnail

Airbus Renews Bid to Buy French Atos' Cybersecurity Unit

Data Breach Today

Aerospace Firm's Proposed Acquisition Valued at Up to 1.8 Billion Euros French IT firm Atos has confirmed it is in early-stage talks with Airbus to sell its cybersecurity unit for an estimated 1.8 billion euros, or 1.79 billion. The latest Airbus offer comes just six months after Airbus' unsuccessful bid for a minority stake in Atos Evidian.

article thumbnail

IBM’s new watson large speech model brings generative AI to the phone 

IBM Big Data Hub

Most everyone has heard of large language models, or LLMs, since generative AI has entered our daily lexicon through its amazing text and image generating capabilities, and its promise as a revolution in how enterprises handle core business functions. Now, more than ever, the thought of talking to AI through a chat interface or have it perform specific tasks for you, is a tangible reality.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Large Language Models: Moving Past the Early Stage

Data Breach Today

AI, machine learning and large language models are not new, but they are coming to fruition with the mass adoption of generative AI. For cybersecurity professionals, these are "exciting times we live in," said Dan Grosu, CTO and CISO at Information Security Media Group.

article thumbnail

Lockbit 3.0 Ransomware Disrupts Emergency Care at Multiple German Hospitals

KnowBe4

Hitting three hospitals within a Germany-based hospital network, the extent of the damage in this confirmed ransomware attack remains undetermined but has stopped parts of operations.

article thumbnail

Population Health Management Firm's Breach Affects Millions

Data Breach Today

HealthEC Hack Also Compromised More Than a Dozen US Healthcare Systems A hacking incident at a New Jersey-based vendor of artificial intelligence-enabled population health management services that involved a network server has affected more than a dozen of its healthcare clients across the country and nearly 4.5 million of their patients.

article thumbnail

State of Cybersecurity: Top 10 predictions for 2024

Jamf

In this blog, we predict the top ten global trends that will impact and drive cybersecurity in 2024.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Australia’s Digital Platform Regulators Release Working Papers on Risks and Harms Posed by Algorithms and Large Language Models

Data Matters

Australia’s Digital Platform Regulators Forum ( DP-REG ) has recently released two working papers relevant to developing AI policy on the global stage: Literature summary: Harms and risks of algorithms ( Algorithms WP ) and Examination of technology: Large language models used in generative artificial intelligence ( LLM WP ) (together, the Working Papers ) to mark the launch of its website.

Paper 86
article thumbnail

Delivering responsible AI in the healthcare and life sciences industry

IBM Big Data Hub

The COVID-19 pandemic revealed disturbing data about health inequity. In 2020, the National Institute for Health (NIH) published a report stating that Black Americans died from COVID-19 at higher rates than White Americans, even though they make up a smaller percentage of the population. According to the NIH, these disparities were due to limited access to care, inadequacies in public policy and a disproportionate burden of comorbidities, including cardiovascular disease, diabetes and lung disea

article thumbnail

CyberheistNews Vol 14 #01 [Heads Up] SMTP Smuggling - How It Easily Circumvents Your Email Defenses

KnowBe4

[Heads Up] SMTP Smuggling - How It Easily Circumvents Your Email Defenses

IT 103
article thumbnail

How AI will change the future of mass surveillance via Cyber News

IG Guru

Check out the article here. The post How AI will change the future of mass surveillance via Cyber News first appeared on IG GURU.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

People-focused digital transformation: Four keys to revolutionizing the health and care experience

CGI

From financial constraints and sustainability management to workforce shortages and capacity issues, the need for the health industry to address mounting pressures and modernize has never been more urgent.

article thumbnail

Navigating the Future: Strategic Insights on Identity Verification and Digital Banking in 2024

Thales Cloud Protection & Licensing

Navigating the Future: Strategic Insights on Identity Verification and Digital Banking in 2024 madhav Thu, 01/04/2024 - 05:32 As we embark on 2024, the digital landscape is undergoing a seismic shift, especially in identity verification and digital banking. This transformation presents both opportunities and challenges for business executives. Understanding these emerging trends is crucial to navigating this new terrain strategically.

article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

Welcome to a new year! Following our Christmas break, we’re rounding up two weeks’ worth of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. We’ll also soon publish our 2023 review of publicly disclosed incidents and records known to be breached across the year, as well as our quarterly report, so keep an eye on our blog.