Tue.Jun 18, 2024

article thumbnail

German BSI Forces Microsoft to Disclose Security Measures

Data Breach Today

Company Publishes Information on Double Key Encryption Under Regulatory Pressure Following a legal intervention made by the German federal cybersecurity agency, Microsoft has disclosed additional information on encryption measures it adopted to secure its customer data. A new white paper details how the company is deploying double key encryption.

article thumbnail

The Financial Dynamics Behind Ransomware Attacks

Security Affairs

Over the last few years, ransomware attacks have become one of the most prevalent and expensive forms of cybercrime. Initially, these attacks involved malicious software that encrypts a victim’s data, rendering it inaccessible until a ransom is paid to the attackers. Today, this tactic has evolved, where ransomware operators in nearly every case first exfiltrate sensitive data and then threaten to publicly expose it if a ransom demand is not paid.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Uncover Chinese Hacking Cyberespionage Campaign

Data Breach Today

Chinese Threat Actor 'Velvet Ant' Evaded Detection for Years in Victim Network A Chinese threat actor used state-sponsored techniques to carry out a cyberespionage campaign targeting a major organization's networks after exploiting legacy technology to gain multiple footholds across the enterprise infrastructure, researchers said in a Monday blog post.

293
293
article thumbnail

VMware fixed RCE and privilege escalation bugs in vCenter Server

Security Affairs

VMware addressed vCenter Server vulnerabilities that can allow remote code execution or privilege escalation. VMware addressed multiple vCenter Server vulnerabilities that remote attackers can exploit to achieve remote code execution or privilege escalation. vCenter Server is a centralized management platform developed by VMware for managing virtualized environments.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Chemical Firms Boost Cybersecurity Ahead of New Regulations

Data Breach Today

New Report Finds Chemical Firms Are Investing in Cyber, Raising CISO Visibility Chemical companies have significantly boosted their cyber budgets over the past five years, according to a 2023 cyber survey published Monday, as awareness of cybersecurity vulnerabilities has steadily risen across the industry and new U.S. and E.U. regulations loom on the horizon.

More Trending

article thumbnail

Multifactor Authentication Bypass: Attackers Refine Tactics

Data Breach Today

Push Fatigue Attacks Succeed 5% of the Time, Surge in the Morning, Researchers Find Multifactor authentication is a must-have security defense for repelling outright credential stuffing and password spraying attacks. But no defense is foolproof. Attackers have been refining their tactics for bypassing MFA, including using technology and trickery.

article thumbnail

Vulnerability Recap 6/18/24 – Patch Tuesday, Plus More Ivanti Issues

eSecurity Planet

The remote code execution vulnerabilities from last week’s recap continue, and Microsoft Patch Tuesday identifies plenty of issues to patch — but fortunately, most of them aren’t critical vulnerabilities. PHP’s Windows flaw is now being exploited by ransomware, almost immediately after researchers publicized the issue. Google also has an elevation of privilege vulnerability in its Pixel phones, among others; Android has published fixes for all the device issues.

article thumbnail

IMF Touts Fiscal Policy Change, Taxes to Soften AI Impact

Data Breach Today

Agency Suggests Taxing AI-Related Carbon Emissions, Excess Profits The International Monetary Fund suggested that governments consider a fiscal approach to remedy the damages artificial intelligence has brought to the environment and the economy. The agency proposed imposing a green tax on AI-related carbon emissions and taxing excess profits.

article thumbnail

Accelerate transformation with a human-centered approach

CGI

How do organizations improve their chance of seeing a return on their investment using innovative technology, like AI? And how do we help business leaders feel confident that they are building an organization fit for the future?

98
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Perks of Independence for Synopsys' Software Integrity Group

Data Breach Today

GM Jason Schmitt on How Francisco Partners, Clearlake $2.1B Buy Will Propel Growth Synopsys' Software Integrity Group will become a standalone company under Francisco Partners and Clearlake once the $2.1 billion transaction closes. General Manager Jason Schmitt explains the significance of the acquisition, the carve-out process and future growth strategies.

157
157
article thumbnail

The Overlooked Truth: User Experience in Cybersecurity

KnowBe4

We live in a world where the term "cybersecurity" tends to make folks either shiver with anxiety or yawn with boredom. The narrative has always been about hacking, phishing , and all sorts of digital skullduggery. However, the overlooked truth is that users don't adopt best security practices because they’re designed without the slightest nod to the user experience.

article thumbnail

Huntress Lands $150M to Boost Posture, Recovery Capabilities

Data Breach Today

Series D Funds to Drive Posture, Recovery Plays for Endpoint, Identity for SMBs With $150 million of Series D funding led by Kleiner Perkins, Meritech Capital and Sapphire Ventures, Huntress is set to build or buy posture and recovery capabilities for endpoint and identity protection and enhance educational initiatives to counter the accelerating pace of cyberthreats.

Education 157
article thumbnail

Brazilian Entities Increasingly Targeted by Nation-State Phishing Attacks

KnowBe4

Mandiant has published a report looking at cyber threats targeting Brazil, finding that more than 85% of government-backed phishing activity comes from threat actors based in China, North Korea and Russia.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

What Makes Healthcare a Prime Target for Ransomware?

Data Breach Today

Rubrik's Steve Stone on Reducing Data-Related Vulnerabilities in Healthcare Healthcare organizations are particularly vulnerable to ransomware, risking significant data loss. Steve Stone, head of Rubrik’s Zero Labs, outlines why healthcare faces higher risks and how organizations can strengthen their defenses against these disruptive threats.

article thumbnail

Microsoft & Google Offer Discounted Cybersecurity Solutions to Rural Hospitals

eSecurity Planet

The healthcare industry has emerged as a prominent target for cybercriminal activities in the past few years. Ransomware attacks , where hackers encrypt critical data and demand payment for decryption, have skyrocketed. In 2023 alone, the healthcare industry witnessed a staggering 130% increase in ransomware attacks. These attacks not only compromise sensitive patient data but also disrupt essential hospital services, putting lives at risk.

article thumbnail

NHS Ransomware Attack: Healthcare Industry Infrastructures Are Critical

Data Breach Today

Rubrik's Steve Stone on Reducing Data-Related Vulnerabilities in Healthcare Healthcare organizations are particularly vulnerable to ransomware, risking significant data loss. Steve Stone, head of Rubrik’s Zero Labs, outlines why healthcare faces higher risks and how organizations can strengthen their defenses against these disruptive threats.

article thumbnail

CyberheistNews Vol 14 #25 Microsoft and KnowBe4 Collaborate on Ribbon Phish Alert Button for Outlook

KnowBe4

Microsoft and KnowBe4 Collaborate on Ribbon Phish Alert Button for Outlook

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Using supply chain control towers to empower employees and satisfy customers

CGI

In today’s fast-paced and complex business landscape, resilient, sustainable and customer-centric supply chains are crucial for businesses to thrive. An innovative solution that has gained prominence in recent years is the supply chain control tower.

52
article thumbnail

How Biometrics Help Prevent Medical and Insurance Fraud

HID Global

Discover how facial recognition technology can prevent medical & insurance fraud by enhancing patient ID verification, and streamlining claims processes.

article thumbnail

Optical Character Recognition: Revolutionising Text Digitisation

Docuware

Transforming physical documents into digital files is a step in the right direction for improving office processes, saving business costs and helping achieve sustainability goals. But simply having digital copies isn’t enough — you also need to be able to edit these documents in their digital format.

26
article thumbnail

Collibra powers UC Davis Health’s responsible AI adoption

Collibra

Healthcare is literally a matter of life and death. At a time when the world is abuzz with hype and promise around artificial intelligence in (almost) equal measure, those who can most effectively leverage and master AI-based innovations will be the real industry change makers. UC Davis Health (UCDH) adopted Collibra and built out AI Governance to improve its patient care experience.

article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

How to Grow a Car Dealership Business

Docuware

Recent changes in the automotive sales environment range from the prevalence of online purchasing and new data privacy regulations to diminished customer loyalty and high customer expectations sales and service. If you want to stay competitive, it's game on! In this blog post, we’ll cover proven ways to bring more potential buyers to your dealership and retain your current customers.

Sales 26
article thumbnail

Implement Passwordless 360° for Enhanced Security and UX

Thales Cloud Protection & Licensing

Implement Passwordless 360° for Enhanced Security and UX josh.pearson@t… Wed, 06/19/2024 - 07:03 If you’ve somehow missed it, let me state the obvious: Passwordless is a strategic bet! Many organizations realize this already. But if there was ever a doubt, have a look at the latest KuppingerCole report that predicts the passwordless authentication market to be a $6.6 billion market.