Thu.Nov 21, 2024

article thumbnail

CISA Red Team Finds Alarming Critical Infrastructure Risks

Data Breach Today

Red Team Finds Vulnerabilities in Critical Infrastructure Org’s Security Framework The U.S., cyber defense agency is urging critical infrastructure operators to learn from the experience of a volunteer read teaming test and not rely too heavily on host-based endpoint detection and response solutions at the expense of network layer protections.

Risk 274
article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass , MailChimp , Okta , T-Mobile and Twilio. A visual depiction of the attacks by the SMS phishing group known as Scattered Spider, and Oktapus.

Phishing 168
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime

Data Breach Today

FBI Ties Suspects to at Least 45 Attacks and Theft of Cryptocurrency Worth Millions The U.S. government on Wednesday unsealed criminal charges against five suspected members of the "loosely organized, financially motivated cybercriminal group" Scattered Spider. The suspects have been tied to 45 attacks, disrupting businesses and stealing cryptocurrency worth millions of dollars.

article thumbnail

AI+IM Forum Europe 2024: Embracing the Information Management Renaissance

AIIM

The recent AI+IM Forum Europe in Manchester brought together industry leaders and practitioners to explore the evolving landscape of information management in the age of artificial intelligence. Here are my key takeaways from this thought-provoking event.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Wiz Fortifies Application Security With $450M Dazz Purchase

Data Breach Today

Buy of Application Security Startup Enhances Code-to-Cloud Vulnerability Management Wiz acquired application security posture management startup Dazz for $450 million to provide enterprises with a unified code-to-cloud solution. CEO Merav Bahat highlights how this partnership will streamline vulnerability management and strengthen remediation capabilities for global organizations.

Security 246

More Trending

article thumbnail

Breach Roundup: Russia Suspected of Severing Undersea Cables

Data Breach Today

Also: VPN Vulnerabilities Attract Hackers, Hackers Use Swiss Mail to Send Malware This week, Russia suspected in Balctic Sea cable sabotage, VPNs draw ransomware attackers and Swiss snail mail malware. An AI training company reported a cybertheft of $250,000 and a U.S. space firm reported a breach. Microsoft said it will pay $$$ for AI vulnerabilities and a MFA success story.

article thumbnail

More than 2,000 Palo Alto Networks firewalls hacked exploiting recently patched zero-days

Security Affairs

Threat actors already hacked thousands of Palo Alto Networks firewalls exploiting recently patched zero-day vulnerabilities. Thousands of Palo Alto Networks firewalls have reportedly been compromised in attacks exploiting recently patched zero-day vulnerabilities ( CVE-2024-0012 and CVE-2024-9474 ) in PAN-OS. CVE-2024-0012 is a vulnerability in Palo Alto Networks PAN-OS that allows unauthenticated attackers with network access to the management web interface to bypass authentication and gain adm

article thumbnail

Cryptohack Roundup: No Prison Time for FTX's Gary Wang

Data Breach Today

Also: Bitfinex Launderer Razzlekhan Gets 18-Month Sentence This week, sentences in FTX, Bitfinex and Helix cases, a $25.5M Thala hack, the WazirX hack and South Korea probed UpBit. U.S. lawmakers want a crackdown on Tornado. U.S. Prosecutors may scale back crypto cases.

article thumbnail

Secret Service Tracking People’s Locations without Warrant

Schneier on Security

This feels important : The Secret Service has used a technology called Locate X which uses location data harvested from ordinary apps installed on phones. Because users agreed to an opaque terms of service page, the Secret Service believes it doesn’t need a warrant.

IT 110
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

British Lawmakers Leery of Losing EU Adequacy Status

Data Breach Today

Lawmakers Expressed Concerns Over Proposed Data Use and Access Bill British lawmakers sought assurances Tuesday from the U.K. government that proposed data use reform legislation will not cause the country to lose its data-sharing rights with the European Union. Lawmakers also warned about potential AI risks arising from the bill.

Risk 218
article thumbnail

China’s Surveillance State Is Selling Citizen Data as a Side Hustle

WIRED Threat Level

Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online—no questions asked.

Marketing 107
article thumbnail

GAO: HHS Needs to Be a Better Leader in Health Sector Cyber

Data Breach Today

Watchdog Agency Report Points to Unimplemented Cyber Recommendations The U.S. Department of Health and Human Services needs to take important actions to do a better job of carrying out its duties as the lead federal agency responsible for strengthening cybersecurity in the healthcare and public health sector, said a new federal watch dog agency report.

article thumbnail

Biometric Litigation Risks Endure Even Post BIPA Amendment

Data Matters

Enacted in 2008, the Illinois Biometric Information Privacy Act (“BIPA”) regulates the collection and possession of biometric data by private entities operating in Illinois. Biometric data includes, for example, fingerprints, voiceprints, eye scans, and face/hand scans. Notably, BIPA establishes a private right of action, allowing any person to seek damages, attorneys’ fees, and injunctive relief if the person has been aggrieved by a BIPA violation.

Risk 87
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Will Arrests Squash Scattered Spider's Cybercrime Assault?

Data Breach Today

Members of Loosely Organized Group Recently Tied to Partnership With RansomHub Will the indictment of five alleged members of the loosely affiliated Scattered Spider cybercrime group disrupt its wider activities? The current count of known attacks tied to the group stands at over 130, but the accused have so far been tied by the FBI to only 45 of the attacks.

IT 159
article thumbnail

I tried replacing Twitter with Bluesky, Threads, and Mastodon: Here's what I found

Collaboration 2.0

More and more ex-Twitter/X users are seeking new online homes. I kicked the tires on these three nascent services. Here's what you need to know about them.

106
106
article thumbnail

Fraud Awareness Week

KnowBe4

The Association of Certified Fraud Examiners (ACFE) recently released a report Occupational Fraud 2024: A Report to the Nations , where they estimated that most organizations lose about 5% of their revenue each year due to fraud.

article thumbnail

ChatGPT Search could destroy online businesses - how you can stay ahead

Collaboration 2.0

OpenAI's ChatGPT Search could be the beginning of the end for anyone who relies on Search ads and SEO. Here are three strategies to protect your business before it's too late.

IT 128
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Threat actor sells data of over 750,000 patients from a French hospital

Security Affairs

A threat actor had access to electronic patient record system of an unnamed French hospital, and the health data of 750,000 patients was compromised. An unnamed French hospital suffered a data breach that impacted more than 758,000 patients, a threat actor had access to the electronic patient record system of the organization. The threat actor claims that exposed records include name, first name, date of birth, gender, address, city, postal code, phone number(s), and email.

article thumbnail

Get these premium Sony Bravia home theater speakers for $500 off during Black Friday

Collaboration 2.0

This premium Sony speaker system offers easy placement and exclusive features. It's on sale for $500 of its list price during the holiday season.

Sales 100
article thumbnail

Video: Meet Our Cybersecurity Expert, Davin Jackson

eSecurity Planet

Davin Jackson has joined the eSecurity Planet team as our cybersecurity expert and media personality, bringing with him nearly 20 years of experience in tech and cybersecurity. He has helped organizations of various sizes to improve their security against cyber threats. His licenses and certifications include GIAC Web Application Penetration Tester, GIAC Certified Penetration Tester (GPEN), Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker, among others.

article thumbnail

The $23 Echo Dot deal is a great deal to upgrade your smart home this Black Friday

Collaboration 2.0

Looking for a way to add a hands-free virtual assistant to your life? You can buy the latest Echo Dot for only $23 through Black Friday.

99
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

The U.S. Justice Department charged five suspects linked to the Scattered Spider cybercrime gang with wire fraud conspiracy. The U.S. Justice Department charged five alleged members of the cybercrime gang Scattered Spider (also known as UNC3944 , 0ktapus ) with conspiracy to commit wire fraud. “Law enforcement today unsealed criminal charges against five defendants who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee cr

article thumbnail

Get a free Google Pixel 9 phone from T-Mobile with this Black Friday deal

Collaboration 2.0

When you sign up for a new T-Mobile line or trade in your old device, you can get a free Pixel 9 phone -- an $800 value.

105
105
article thumbnail

Meta Finally Breaks Its Silence on Pig Butchering

WIRED Threat Level

The company gave details for the first time on its approach to combating organized criminal networks behind the devastating scams.

IT 72
article thumbnail

Roku vs Fire Stick: Which one is best for your streaming needs in 2024?

Collaboration 2.0

The Roku Streaming Stick and the Amazon Fire TV Stick are two of the best devices for streaming. Here are the key reasons to buy one over the other.

91
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Celebrating our community at Data Citizens On the Road

Collibra

I’ll be honest. I get a real sense of joy bringing people together—especially when those people are passionate about data and its transformative power of driving competitive advantage and value for their organizations. Recently, at our Data Citizens® ‘24 on the Road, I had the immense pleasure of connecting with our vibrant community of data professionals, Collibra customers and our valued partners.

article thumbnail

Jim Zemlin, 'head janitor of open source,' marks 20 years at Linux Foundation

Collaboration 2.0

In a world where modest leadership is often an oxymoron, Jim Zemlin's two-decade tenure as executive director remains helpful, hopeful, and humble.

95
article thumbnail

Leveraging Metadata for Enhanced Information Governance 

Gimmal

Organizations are inundated with vast amounts of data—managing this data efficiently is crucial for compliance, productivity, and overall business success. Traditionally, folders have been the go-to method for organizing information. However, as data grows in volume and complexity, relying solely on folders presents significant limitations. Enter metadata—a powerful tool that can revolutionize your information governance strategy.