Mon.Aug 05, 2024

article thumbnail

CrowdStrike Rejects Delta's Negligence Claims Over IT Outage

Data Breach Today

Cybersecurity Firm Says Airline Rebuffed Help, Questions Its Incident Response CrowdStrike has dismissed claims of negligence leveled at it by Delta Air Lines, which is threatening to sue after a faulty security software update led to days of IT disruption. In response, the cybersecurity vendor is asking why Delta's competitors recovered so much more quickly.

IT 267
article thumbnail

Low-Drama ‘Dark Angels’ Reap Record Ransoms

Krebs on Security

A ransomware group called Dark Angels made headlines this past week when it was revealed the crime group recently received a record $75 million data ransom payment from a Fortune 50 company. Security experts say the Dark Angels have been around since 2021, but the group doesn’t get much press because they work alone and maintain a low profile, picking one target at a time and favoring mass data theft over disrupting the victim’s operations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring

The Last Watchdog

LAS VEGAS — Humans, unsurprisingly, remain the weak link in cybersecurity. Related: Digital identity best practices We’re gullible – and we can’t get away from relying on usernames and passwords. Steady advances in software and hardware mechanisms to secure identities and privileged access have helped; yet crippling network breaches that start by fooling or spoofing a single human user continue to proliferate.

article thumbnail

Zero-Day Vulnerability in Apache OFBiz Enables RCE

Data Breach Today

Flaws in Apache OFBiz Putting Critical Business Functions at Risk A zero-day pre-authentication vulnerability in Apache OFBiz is putting critical business functions at risk by enabling unauthorized remote code execution. The vulnerability's root cause lies in a flaw in OFBiz's authentication mechanism.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How Project 2025 Would Put US Elections at Risk

WIRED Threat Level

Experts say the “nonsensical” policy proposal, which largely aligns with Donald Trump’s agenda, would weaken the US agency tasked with protecting election integrity, critical infrastructure, and more.

Risk 29

More Trending

article thumbnail

Researchers warn of a new critical Apache OFBiz flaw

Security Affairs

Researchers urge organizations using Apache OFBiz to address a critical bug, following reports of active exploitation of another flaw. Experts urge organizations to address a new critical vulnerability, tracked as CVE-2024-38856, in Apache OFBiz. The vulnerability is an incorrect authorization issue in Apache OFBiz that impacts versions through 18.12.14, version 18.12.15 addressed the flaw. “Unauthenticated endpoints could allow execution of screen rendering code of screens if some precond

article thumbnail

Stock Sell-Off: CISO Global, Trend Micro, Okta Hardest Hit

Data Breach Today

12 Security Stocks Fared Worse Than the Nasdaq Monday, While Just 10 Did Better Cybersecurity companies took Monday's sell-off on the chin, with CISO Global, Trend Micro and Okta experiencing significant stock price drops in Wall Street's worst day since 2022. The Nasdaq Composite Index fell nearly 3.5% Monday amid concerns about Friday's dismal jobs report.

article thumbnail

A flaw in Rockwell Automation ControlLogix 1756 could expose critical control systems to unauthorized access

Security Affairs

A security bypass bug in Rockwell Automation ControlLogix 1756 devices could allow unauthorized access to vulnerable devices. A high-severity security bypass vulnerability, tracked as CVE-2024-6242 (CVSS Base Score v4.0 of 7.3), impacts Rockwell Automation ControlLogix 1756 devices. An attacker can exploit the vulnerability to execute common industrial protocol (CIP) programming and configuration commands. “A vulnerability exists in the affected products that allows a threat actor to bypas

Access 135
article thumbnail

Rockwell Controller Flaw Exposes Industrial Control Systems

Data Breach Today

Claroty Says Attackers Could Use Security Flaw to Bypass Trusted Slot Feature A vulnerability in Rockwell Automation's ControlLogix 1756 devices allows attackers to bypass a critical security feature, turning the trusted slot mechanism into a hacker's secret passageway to jump between slots and gain access to industrial control systems.

Access 130
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Brand Impersonation of Microsoft Increases 50% in One Quarter

KnowBe4

The use of the Microsoft brand in phishing attacks demonstrates both its widespread credibility as well as the continued success of attacks leveraging it.

Phishing 117
article thumbnail

Attacks on Blood Suppliers Trigger Supply Chain Warning

Data Breach Today

Blood Shortage After Ransomware Attack Underscores Rising Threats to Patient Safety The American Hospital Association and Health Information Sharing and Analysis Center are urging the healthcare sector to step up its supply chain security and resilience as disruptive cyberattacks target critical suppliers, including last week's attack on a Florida-based blood donation center.

article thumbnail

New Patent Application for Car-to-Car Surveillance

Schneier on Security

Ford has a new patent application for a system where cars monitor each other’s speeds, and then report then to some central authority. Slashdot thread.

116
116
article thumbnail

How BlueVoyant's Cyber Defense Platform Reduces Cyber Risk

Data Breach Today

CEO Jim Rosenthal on the Perks of Combining Internal and External Security Measures BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.

Risk 130
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Creating a Big Security Culture With a Tiny Button

KnowBe4

When it comes to creating a strong cybersecurity culture, one of the most powerful tools we have at our disposal is the Phish Alert Button (PAB).

Phishing 113
article thumbnail

4 steps to grow a data governance program

Collibra

As more organizations are dealing with higher volumes and varieties of data, they are encountering more data-related problems. Whether it’s managing data quality, installing cybersecurity measures, or simply budgeting for the high cost of processing and storing enormous amounts of information, enterprises face growing challenges to enable data access and usage.

article thumbnail

Apple finally starts paying off qualifying MacBook owners as part of a class action settlement

Collaboration 2.0

If you bought a MacBook with a faulty butterfly keyboard between 2015 and 2019 and filed a claim, the check should be in the mail.

97
article thumbnail

CILIP statement on the fire damage at Spellow Hub Library in Liverpool

CILIP

CILIP statement on the fire damage at Spellow Hub Library in Liverpool Spellow Hub library is located in Liverpool, and was transformed into a 'library of the future' in 2023. CILIP expresses solidarity with the library staff and users of Spellow Hub Library that was severely damaged during scenes of violent disorder on Saturday 3 August 2024. This public library opened in Spring 2023 as a fully accessible 'library of the future', offering a free “education to employment” service for people of a

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The best fitness trackers you can buy: Expert tested and reviewed

Collaboration 2.0

We tested the best fitness trackers from Apple, Garmin, Fitbit, and others to help you track your health, sleep, and more.

76
article thumbnail

The Pros and Cons of Electronic Health Records

Record Nations

Medical professionals have the difficult task of balancing paperwork and administrative duties while providing high-quality patient care. They need to be able to update charts, communicate with other providers, and make decisions as quickly and efficiently as possible. Electronic Health Records (EHR) provide resources to streamline this process. EHRs affect both the administrative and patient-facing.

article thumbnail

Schools will remove app from students' Chromebooks and iPads following security breach

Collaboration 2.0

Device management app Mobile Guardian will be pulled from Chrome and iOS devices after 13,000 Singapore users had their data remotely wiped by a cyber attacker.

article thumbnail

Keeping it Local and Secure: Data Sovereignty in a Cloud-Driven World

Thales Cloud Protection & Licensing

Keeping it Local and Secure: Data Sovereignty in a Cloud-Driven World josh.pearson@t… Tue, 08/06/2024 - 07:00 Today's world is data driven. As data is generated, shared, and stored, a significant portion of these activities occur on servers owned by US companies. This concentration of data raises concerns about control, privacy, and compliance, particularly considering regulations like the EU's General Data Protection Regulation (GDPR) and the staggering €1.2 billion (around $1.3 billion) fine i

Cloud 62
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The best VPN for Windows: Expert tested and reviewed

Collaboration 2.0

We tested the best VPNs for your Windows PC on everything from speed to server count to security. Here are some of the top VPNs for the Microsoft Windows operating system.

article thumbnail

From the Archive: Tech Must Get Over Its Superman Complex, Or We’re All Screwed

John Battelle's Searchblog

Detail from the cover of Yuval Noah Harari’s 21 Lessons for the 21st Century Five years ago I was posting a lot to a publication called NewCo Shift, which is now offline. I got ahold of the archives, and found this review, which hasn’t lost any of its relevance – in fact, it kind of reads like it was written last week. Everyone in tech loves Yuval Noah Harari.

article thumbnail

You can search Google Lens with your voice now. Here's how - and why it's so useful

Collaboration 2.0

Expanding your Google Lens searches just got a lot easier thanks to this new feature.

IT 75
article thumbnail

How to Establish a Secure Visitor Management System

HID Global

Safeguarding your premises and protecting your assets is paramount. Explore the importance of visitor management as a cornerstone of facility protection.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Can AI even be open source? It's complicated

Collaboration 2.0

AI can't exist without open source, but the top AI vendors are unwilling to commit to open-sourcing their programs and data sets. To complicate matters further, defining open-source AI is a messy issue that has yet to be settled.

IT 75
article thumbnail

Community Webs Now Accepting New Member Applications

Archive-It

We are now accepting applications from public libraries, historical societies and museums, local and community archives, and other cultural heritage organizations to join Community Webs ! Launched in 2017, Community Webs seeks to empower cultural heritage organizations to build community-focused digital collections documenting local history with a particular focus on voices that have been underrepresented in the historic record.

article thumbnail

This Samsung phone is the one most people should buy in 2024 (and it's not a flagship)

Collaboration 2.0

The Galaxy A35 5G has its flaws, but with a two-day battery life and gorgeous display, it's hard to ignore how good it is for the price.

IT 75