Fri.Mar 29, 2024

article thumbnail

UK Nuclear Cleanup Site Faces Criminal Cybersecurity Charges

Data Breach Today

Probe Finds 'Largest and Most Hazardous Nuclear Site' Violated Security Laws Britain's nuclear power watchdog said it plans to prosecute the country's "largest and most hazardous nuclear site," Sellafield, for violating nuclear industry cybersecurity regulations from 2019 to 2023. Both Russian and Chinese nation-state hackers reportedly infiltrated the site's networks.

Cleanup 320
article thumbnail

Infostealers continue to pose threat to macOS users

Jamf

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising victim’s Macs but with similar aims: to steal sensitive user data.

143
143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware Flood Causes PyPI to Temporarily Halt New Accounts

Data Breach Today

Hackers Are Now Using Code Repositories as Malware Vectors Python code repository PyPI temporarily halted new user registration for a second time in three months following a surge in malware-ridden code mimicking legitimate software packages. PyPI is not the only code repository to recently be attacked by hackers.

295
295
article thumbnail

American fast-fashion firm Hot Topic hit by credential stuffing attacks

Security Affairs

Hot Topic suffered credential stuffing attacks that exposed customers’ personal information and partial payment data. Hot Topic, Inc. is an American fast-fashion company specializing in counterculture-related clothing and accessories, as well as licensed music. The company was the victim of credential stuffing attacks against its website and mobile application on November 18-19 and November 25, 2023.

Passwords 140
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

ISMG Editors: Apple's Antitrust Showdown With the Feds

Data Breach Today

Legal Expert Jonathan Armstrong Unpacks Issues in Big Tech, Ransomware, AI and More In the latest weekly update, legal expert Jonathan Armstrong joined three ISMG editors to discuss the Department of Justice's antitrust lawsuit against Apple, ransomware payment dilemmas and AI copyright infringement fears - highlighting the intricate legal issues shaping big tech and cybersecurity.

More Trending

article thumbnail

DHS Calls Political Campaigns 'Ripe Target' for Cyberattacks

Data Breach Today

Foreign Adversaries Increasingly See Campaigns as Prime for Hacking, Official Says The U.S. Department of Homeland Security's assistant secretary for cyber, infrastructure, risk and resilience is sounding the alarm over hackers targeting political campaigns ahead of the 2024 elections, warning that campaigns could be left vulnerable if they fail to practice basic cyber hygiene.

Risk 289
article thumbnail

Narwhal Spider Threat Group Behind New Phishing Campaign Impersonating Reputable Law Firms

KnowBe4

Using little more than a well-known business name and a invoice-related PDF, the “NaurLegal” phishing campaign aims at installing malware trojans.

Phishing 126
article thumbnail

Is It Generative AI's Fault, or Do We Blame Human Beings?

Data Breach Today

AI is on the way to embedding itself in our daily lives. CISO Sam Curry and his brother, CMO Red Curry, discuss what generative AI means for copyrights and plagiarism, the "AI bubble," and whether governing AI-derived speech will wind up limiting free speech.

IT 286
article thumbnail

Lessons from a Ransomware Attack against the British Library

Schneier on Security

You might think that libraries are kind of boring, but this self-analysis of a 2023 ransomware and extortion attack against the British Library is anything but.

Libraries 124
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ShadowRay Attack Strikes AI Workloads

Data Breach Today

Thousands of AI Workloads Compromised Amid CVE Vulnerability Dispute An active attack campaign dubbed ShadowRay is targeting the widely used Ray open-source artificial intelligence scaling framework. It stems from a vulnerability that researchers say is a flaw but that Ray's developers say is a deliberate design choice.

article thumbnail

New Malware Loader Delivers Agent Tesla Remote Access Trojan Via Phishing

KnowBe4

A new malware loader is delivering the Agent Tesla remote access Trojan (RAT), according to researchers at Trustwave SpiderLabs. The malware is distributed by phishing emails with malicious attachments.

Phishing 119
article thumbnail

Feds Warn of Credential Harvesting Threats in Healthcare

Data Breach Today

HHS Says Tried-and-True Hacker Methods Can Compromise Patient Data, Safety Federal regulators are sounding an alarm to warn healthcare sector entities of cyberattacks involving a tried-and-true hacking method - credential harvesting, which can be used to compromise patient data, disrupt healthcare operations and enable other crimes.

277
277
article thumbnail

Your KnowBe4 Fresh Content Updates from March 2024

KnowBe4

Check out the 35 new pieces of training content added in March, alongside the always fresh content update highlights, events and new features.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Weekly Update 393

Troy Hunt

A serious but not sombre intro this week: I mentioned at the start of the vid that I had the classic visor hat on as I'd had a mole removed from my forehead during the week, along with another on the back of my hand. Here in Australia, we have one of the highest rates of skin cancer in the world with apparently about two-thirds of us being diagnosed with it before turning 70.

article thumbnail

75% of Organizations Believe They Are at Risk of Careless or Negligent Employees

KnowBe4

New data shows organizations are well aware that their users are one of their greatest cybersecurity risks today, and yet aren’t taking the right steps to remediate the risk.

Risk 115
article thumbnail

Integrating AI into Asset Performance Management: It’s all about the data

IBM Big Data Hub

Imagine a future where artificial intelligence (AI) seamlessly collaborates with existing supply chain solutions, redefining how organizations manage their assets. If you’re currently using traditional AI, advanced analytics, and intelligent automation, aren’t you already getting deep insights into asset performance? Undoubtedly. But what if you could optimize even further?

article thumbnail

Russian Federation-backed threat group APT29 Now Targeting German Political Parties

KnowBe4

New analysis of APT29’s (aka Cozy Bear) activities and their association with Russia’s Foreign Intelligence Service (SVR) has revealed suspected attempts to collect political intelligence.

Phishing 115
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

OpenTelemetry vs. Prometheus: You can’t fix what you can’t see

IBM Big Data Hub

Monitoring and optimizing application performance is important for software developers and enterprises at large. The more applications that an enterprise deploys, the more data that exists for collecting and analyzing. Yet, this data isn’t worth much without the right tools for monitoring, optimizing, storing and—crucially—putting the data into context.

article thumbnail

OpenText World Europe 2024 is coming to London

OpenText Information Management

OpenText World Europe 2024 is coming to London, UK on April 15, the first stop of our European tour. Join global thought leaders and regional experts for an unforgettable, event-packed day of experiences that demonstrate how AI can be a force multiplier for human potential. Hosted at the QEII Centre in London, this full-day, complimentary event gives you the singular opportunity to hear, see, and explore what’s new and next in AI-led information management.

IoT 72
article thumbnail

GraphQL vs. REST API: What’s the difference?

IBM Big Data Hub

As the conduits through which software components interact and data flows across the internet, APIs are the lifeblood of contemporary web services. API technologies like SOAP (a web services messaging protocol), REST (an architectural style) and GraphQL (a programming language and tool) simplify software development by enabling third-party data and services integration.

article thumbnail

NHS AI test spots tiny cancers missed by doctors via BBC

IG Guru

Check out the article here. The post NHS AI test spots tiny cancers missed by doctors via BBC first appeared on IG GURU.

57
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Holistic asset management for utility network companies

IBM Big Data Hub

Addressing challenges of the energy transition with grid asset management The energy transition is gearing up to full speed as renewable energy sources replace fossil-based systems of energy production. The grid itself must green to operate within the environmental, social and governance (ESG) objectives and become carbon neutral by 2050. This shift requires energy utility companies to plan their grid asset management holistically as they find a new balance between strategic objectives.

article thumbnail

In Full Bloom: Still Photographs of Cherry Blossoms

Unwritten Record

Original Caption: Cherry Blossoms at the Jefferson Memorial, Washington, DC. April 1975. (Local ID: 111-CC-96905) Original Caption: Cherry Blossoms at the Jefferson Memorial, Washington, DC. April 1975. (Local ID: 111-CC-96905) Original Caption: Cherry Blossoms at the Jefferson Memorial, Washington, DC. April 1975. (Local ID: 111-CC-96905) For more than a hundred years, we have celebrated cherry blossoms blooming along the Tidal Basin.

article thumbnail

Create a lasting customer retention strategy

IBM Big Data Hub

Customer retention must be a top priority for leaders of any company wanting to remain competitive. An effective customer retention strategy should support the company to maintain a healthy stable of loyal customers and bring in new customers. Generating repeat business is critical: McKinsey’s report on customer acquisition states (link resides outside of ibm.com) that companies need to acquire three new customers to make up the business value of losing one existing customer.

article thumbnail

What Is Data Loss Prevention (DLP)? Definition & Best Practices

eSecurity Planet

Data loss prevention (DLP) refers to a set of security solutions that identify and monitor information content across storage, operations, and networks. DLP solutions help detect and prevent potential data exposure or leaks. They apply policies dynamically, manage business data rights, and automate data processes to effectively protect sensitive information.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

No. TV Advertising Is Not Going to Become “Performance Driven”

John Battelle's Searchblog

Remember the “year of mobile”? That was the five-year period from roughly 2007 to 2012, when industry pundits annually declared that everything was about to change because of the smart phone. Mobile eventually did come to dominate the marketing landscape, but the shift took far longer than anyone expected. I’m starting to think we’re in a similar cycle with streaming – only the transition from cable to digital television has taken far longer, and has been far, far m

article thumbnail

A guide to understanding Advanced Endpoint Protection

Jamf

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

article thumbnail

Navigating perpetual healthcare challenges with new thinking and innovation

CGI

Reflecting on my journey in the healthcare sector—from my years as a practitioner, through my tenures as U.S. Army Surgeon General and Secretary of Veterans Affairs, to my time in industry with CGI—I’m struck by the seismic shifts impacting public and private health systems and their stakeholders. Two decades ago, healthcare looked vastly different than it does today.

Access 52