Mon.Apr 29, 2024

article thumbnail

FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data

Krebs on Security

The U.S. Federal Communications Commission (FCC) today levied fines totaling nearly $200 million against the four major carriers — including AT&T , Sprint , T-Mobile and Verizon — for illegally sharing access to customers’ location information without consent. The fines mark the culmination of a more than four-year investigation into the actions of the major carriers.

Access 296
article thumbnail

Secure by Design: UK Enforces IoT Device Cybersecurity Rules

Data Breach Today

Law Bans Universal Default Passwords; Requires Bug-Reporting Channels, Update Plan Say goodbye to buying internet of things devices in Britain with a default or hardcoded password set to "12345," as the country has banned manufacturers from shipping internet-connected and network-connected devices that don't comply with minimum cybersecurity standards.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Los Angeles County Department of Health Services disclosed a data breach

Security Affairs

The Los Angeles County Department of Health Services reported a data breach that exposed thousands of patients’ personal and health information. The Los Angeles County Department of Health Services disclosed a data breach that impacted thousands of patients. Patients’ personal and health information was exposed after a phishing attack impacted over two dozen employees.

article thumbnail

Pyongyang Hackers Deploy Backdoors Via Fake Job Interviews

Data Breach Today

North Korean Prediliction for Elaborate Social Engineering Attacks Strikes Again Likely North Korean threat actors are using fake job interviews to trick software developers into downloading disguised Python backdoors as part of an ongoing espionage campaign. Pyongyang hackers have a history of constructing elaborate social engineering ruses.

278
278
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Financial Business and Consumer Solutions (FBCS) data breach impacted 2M individuals

Security Affairs

Financial Business and Consumer Solutions (FBCS) suffered a data breach that exposed information 2 million individuals. Debt collection agency Financial Business and Consumer Solutions (FBCS) disclosed a data breach that may have impacted 1,955,385 individuals. FBCS, a third-party debt collection agency, collects personal information from its clients to facilitate debt collection activities on behalf of those clients.

More Trending

article thumbnail

Vulnerability Recap 4/29/24 – Cisco, Microsoft, Palo Alto & More

eSecurity Planet

Many of this week’s disclosures involve new aspects of old vulnerabilities. Palo Alto’s Pan-OS flaw impacts Siemens products and receives new remediation instructions. An old Microsoft Windows spooler flaw is added to the CISA KEV list, and the Cactus Ransomware gang currently pursues unfixed Qlik Sense servers with a vulnerability patched in September 2023.

article thumbnail

Career Spotlight: Growing Need for Technology Legal Analysts

Data Breach Today

High Demand for Experts Who Know Law Plus AI, Blockchain and Internet of Things Advancements in AI, blockchain and the internet of things have caused the demand for professionals who have expertise in those fields as well as in law to skyrocket. There simply are not enough experts equipped with this knowledge, and the gap presents a unique and lucrative career opportunity.

article thumbnail

Google prevented 2.28 million policy-violating apps from being published on Google Play in 2023

Security Affairs

Google announced they have prevented 2.28 million policy-violating apps from being published in the official Google Play. Google announced that in 2023, they have prevented 2.28 million policy-violating apps from being published on Google Play. This amazing result was possible thanks to the introduction of enhanced security features, policy updates, and advanced machine learning and app review processes.

Privacy 123
article thumbnail

French Government Bids on Atos' Cyber and Computing Assets

Data Breach Today

Atos Received a Letter of Intent From French Finance Minister Bruno Le Maire The French government could acquire a loss-making cybersecurity unit and other critical assets of Paris IT consultancy firm Atos after previous bids by competing firms fell through. Atos employs about 4,000 people and is strategically important to the French government.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The FCC imposes $200 million in fines on four US carriers for unlawfully sharing user location data

Security Affairs

The Federal Communications Commission (FCC) fined the largest U.S. wireless carriers $200 million for sharing customers’ real-time location data without consent. The FCC has fined four major U.S. wireless carriers nearly $200 million for unlawfully selling access to real-time location data of their customers without consent. The fines come as a result of the Notices of Apparent Liability (NAL) issued by the FCC against AT&T, Sprint, T-Mobile, and Verizon in February 2020.

Insurance 122
article thumbnail

Are Enterprises Overconfident About Cybersecurity Readiness?

Data Breach Today

Cisco Cybersecurity Readiness Index Shows Only 3% of Companies Are Cyber Resilient Cisco's 2024 Cybersecurity Readiness Index showed a concerning gap - while 80% of organizations felt confident in their cybersecurity readiness, only 3% had a "Mature" level of readiness. This suggests companies must plan cybersecurity budgets, upgrade infrastructure and adopt AI for resilience.

article thumbnail

Whale Song Code

Schneier on Security

During the Cold War, the US Navy tried to make a secret code out of whale song. The basic plan was to develop coded messages from recordings of whales, dolphins, sea lions, and seals. The submarine would broadcast the noises and a computer—the Combo Signal Recognizer (CSR)—would detect the specific patterns and decode them on the other end.

article thumbnail

Forescout CEO on Navigating OT, IoT Threats in Cybersecurity

Data Breach Today

Barry Mainz Discusses Asset Visibility, Security and Risk Management Outside IT Forescout CEO Barry Mainz highlights the growing risks associated with OT and IoT devices and how cybersecurity strategies must evolve to address these challenges. He emphasizes the need for visibility, classification and robust risk assessment to manage these vulnerabilities effectively.

IoT 162
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

A New Wave of Class Actions: The Genetic Information Privacy Act

Data Matters

Largely dormant for the last 25 years, Illinois’ Genetic Information Privacy Act (GIPA) has been sharing the limelight recently with its sibling, the Biometric Information Privacy Act. (BIPA). GIPA includes a number of restrictions related to the use and disclosure of genetic testing and genetic information, and it provides a private right of action and permits recovery of steep statutory damages.

Privacy 86
article thumbnail

How the Enterprise Browser Has Reshaped the Modern Workplace

Data Breach Today

Island CEO Mike Fey on How Enterprise Browsers Streamline Operations, Fuel Security Island co-founder and CEO Mike Fey discusses how enterprise browsers facilitate efficient business processes through cloud integrations, safeguard sensitive data effectively and deliver a user experience tailored to the needs of business environments.

Cloud 162
article thumbnail

Choosing the right solution for end-to-end process optimization 

CGI

Through digital technology, financial institutions, including banks and insurers, can streamline, optimize, and integrate their back- and front-end business processes across the enterprise to improve efficiencies, the customer experience, and more. The question is which solution is best for achieving this?

article thumbnail

FCC Fines US Cell Carriers $200M for Selling Location Data

Data Breach Today

Commission Approves Long-Anticipated Fines for Verizon, T-Mobile, AT&T and Sprint The Federal Communications Commission announced Monday that it is slapping the leading U.S. cellular providers with nearly $200 million in fines for selling customers' location data to third parties without their consent, following years of warnings from lawmakers about the apparent privacy abuses.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Targeted Smishing Attacks by Threat Group “The Com” On The Rise

KnowBe4

The activity by this group, responsible for (SIM) swapping, cryptocurrency theft, swatting, and corporate intrusions is on the rise, according to new.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Thales Cloud Protection & Licensing

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders madhav Tue, 04/30/2024 - 05:32 Trust is the currency of the digital economy. It fuels innovation, drives customer loyalty, and underpins successful digital transformation. The Thales 2024 Trust Index report indicates that 87% of consumers expect vendors to respect their digital rights, which leads to trusted relationships.

article thumbnail

The Art of Huh?

KnowBe4

One of the best things you can teach yourself, your family, and your organization is how to recognize the common signs of phishing and how to mitigate and appropriately report it.

article thumbnail

WASHINGTON DC METRO AREA CHAPTERS OF ARMA INTERNATIONAL: BRAVE NEW WORLD OF FEDERAL RECORDS on May 14, 2024 8:30am-4pm

IG Guru

Register here. The post WASHINGTON DC METRO AREA CHAPTERS OF ARMA INTERNATIONAL: BRAVE NEW WORLD OF FEDERAL RECORDS on May 14, 2024 8:30am-4pm first appeared on IG GURU.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Phishing Campaigns Spoof the U.S. Postal Service

KnowBe4

Researchers at Akamai have found that phishing sites impersonating the U.S. Postal Service get as much traffic as the real USPS website.

Phishing 100
article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

Integrated risk management (IRM) is a discipline designed to embed risk considerations for the use of technology throughout an organization. In other words, it links technology spending directly to the value of the resource protected and the associated risks controlled by that technology. To explain IRM, in the article I outline its key components, benefits, how IRM differs from other risk models, and IRM frameworks.

Risk 67
article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from April 2024

KnowBe4

Check out the April updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

Rethinking Supply Chains at the Gartner Supply Chain Symposium Xpo, Orlando

OpenText Information Management

I will be attending the Gartner Supply Chain Symposium Xpo, Rethinking Supply Chains, in Orlando in a few days. This conference runs May 6-8, 2024, and OpenText has participated in this conference in the past, both in Orlando and its sister event in Europe, usually taking place a month later. Both of these leading events bring together supply chain leaders from around the world and from various industry sectors to discuss key trends impacting their operations and to learn from each other how to

IoT 59
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

VeloxCon 2024: Innovation in data management

IBM Big Data Hub

VeloxCon 2024 , the premier developer conference that is dedicated to the Velox open-source project, brought together industry leaders, engineers, and enthusiasts to explore the latest advancements and collaborative efforts shaping the future of data management. Hosted by IBM® in partnership with Meta, VeloxCon showcased the latest innovation in Velox including project roadmap, Prestissimo (Presto-on-Velox), Gluten (Spark-on-Velox), hardware acceleration, and much more.

article thumbnail

Teqtivity + Jamf Pro: Maximizing benefits for your Apple fleet

Jamf

Businesses face myriad challenges to security and compliance. Learn how the seamless integration between Teqtivity and Jamf Pro offers unparalleled advantages for managing your Apple fleet.

article thumbnail

Db2 13 for z/OS: Utility Execution History

Robert's Db2

A few months ago, I got this question from a Db2 for z/OS DBA: "Is there a way we can check to see if the UNLOAD utility has been executed for certain of our tables?" The environment in question was a Db2 12 for z/OS system, and because of that I had to provide an answer that was less-than-great from an ease-of-use persepective: "Yes, you can do that in a Db2 12 environment, but the process is going to be a bit cumbersome.

IT 62