Thu.Nov 21, 2024

article thumbnail

Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime

Data Breach Today

FBI Ties Suspects to at Least 45 Attacks and Theft of Cryptocurrency Worth Millions The U.S. government on Wednesday unsealed criminal charges against five suspected members of the "loosely organized, financially motivated cybercriminal group" Scattered Spider. The suspects have been tied to 45 attacks, disrupting businesses and stealing cryptocurrency worth millions of dollars.

article thumbnail

AI+IM Forum Europe 2024: Embracing the Information Management Renaissance

AIIM

The recent AI+IM Forum Europe in Manchester brought together industry leaders and practitioners to explore the evolving landscape of information management in the age of artificial intelligence. Here are my key takeaways from this thought-provoking event.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Red Team Finds Alarming Critical Infrastructure Risks

Data Breach Today

Red Team Finds Vulnerabilities in Critical Infrastructure Org’s Security Framework The U.S., cyber defense agency is urging critical infrastructure operators to learn from the experience of a volunteer read teaming test and not rely too heavily on host-based endpoint detection and response solutions at the expense of network layer protections.

Risk 274
article thumbnail

China’s Surveillance State Is Selling Citizen Data as a Side Hustle

WIRED Threat Level

Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online—no questions asked.

Marketing 138
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

British Lawmakers Leery of Losing EU Adequacy Status

Data Breach Today

Lawmakers Expressed Concerns Over Proposed Data Use and Access Bill British lawmakers sought assurances Tuesday from the U.K. government that proposed data use reform legislation will not cause the country to lose its data-sharing rights with the European Union. Lawmakers also warned about potential AI risks arising from the bill.

Risk 262

More Trending

article thumbnail

Cryptohack Roundup: No Prison Time for FTX's Gary Wang

Data Breach Today

Also: Bitfinex Launderer Razzlekhan Gets 18-Month Sentence This week, sentences in FTX, Bitfinex and Helix cases, a $25.5M Thala hack, the WazirX hack and South Korea probed UpBit. U.S. lawmakers want a crackdown on Tornado. U.S. Prosecutors may scale back crypto cases.

article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass , MailChimp , Okta , T-Mobile and Twilio. A visual depiction of the attacks by the SMS phishing group known as Scattered Spider, and Oktapus.

Phishing 228
article thumbnail

Will Arrests Squash Scattered Spider's Cybercrime Assault?

Data Breach Today

Members of Loosely Organized Group Recently Tied to Partnership With RansomHub Will the indictment of five alleged members of the loosely affiliated Scattered Spider cybercrime group disrupt its wider activities? The current count of known attacks tied to the group stands at over 130, but the accused have so far been tied by the FBI to only 45 of the attacks.

IT 261
article thumbnail

More than 2,000 Palo Alto Networks firewalls hacked exploiting recently patched zero-days

Security Affairs

Threat actors already hacked thousands of Palo Alto Networks firewalls exploiting recently patched zero-day vulnerabilities. Thousands of Palo Alto Networks firewalls have reportedly been compromised in attacks exploiting recently patched zero-day vulnerabilities ( CVE-2024-0012 and CVE-2024-9474 ) in PAN-OS. CVE-2024-0012 is a vulnerability in Palo Alto Networks PAN-OS that allows unauthenticated attackers with network access to the management web interface to bypass authentication and gain adm

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Wiz Fortifies Application Security With $450M Dazz Purchase

Data Breach Today

Buy of Application Security Startup Enhances Code-to-Cloud Vulnerability Management Wiz acquired application security posture management startup Dazz for $450 million to provide enterprises with a unified code-to-cloud solution. CEO Merav Bahat highlights how this partnership will streamline vulnerability management and strengthen remediation capabilities for global organizations.

Security 246
article thumbnail

OpenAI updates GPT-4o, reclaiming its crown for best AI model

Collaboration 2.0

If you use ChatGPT for writing, you'll be happy to hear this.

IT 122
article thumbnail

Breach Roundup: Russia Suspected of Severing Undersea Cables

Data Breach Today

Also: VPN Vulnerabilities Attract Hackers, Hackers Use Swiss Mail to Send Malware This week, Russia suspected in Balctic Sea cable sabotage, VPNs draw ransomware attackers and Swiss snail mail malware. An AI training company reported a cybertheft of $250,000 and a U.S. space firm reported a breach. Microsoft said it will pay $$$ for AI vulnerabilities and a MFA success story.

article thumbnail

Meta Finally Breaks Its Silence on Pig Butchering

WIRED Threat Level

The company gave details for the first time on its approach to combating organized criminal networks behind the devastating scams.

IT 121
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

GAO: HHS Needs to Be a Better Leader in Health Sector Cyber

Data Breach Today

Watchdog Agency Report Points to Unimplemented Cyber Recommendations The U.S. Department of Health and Human Services needs to take important actions to do a better job of carrying out its duties as the lead federal agency responsible for strengthening cybersecurity in the healthcare and public health sector, said a new federal watch dog agency report.

article thumbnail

Even Nvidia's CEO is obsessed with Google's NotebookLM AI tool

Collaboration 2.0

Nvidia CEO Jensen Huang spends a lot of time stuffing documents into Google's impressive AI tool. Here's why.

111
111
article thumbnail

Fraud Awareness Week

KnowBe4

The Association of Certified Fraud Examiners (ACFE) recently released a report Occupational Fraud 2024: A Report to the Nations , where they estimated that most organizations lose about 5% of their revenue each year due to fraud.

Security 110
article thumbnail

Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office

Security Affairs

Mexico is investigating a ransomware attack targeting its legal affairs office, as confirmed by the president amidst growing cybersecurity concerns. Mexico’s president announced the government is investigating an alleged ransomware hack that targeted the administration’s legal affairs office. “Today they are going to send me a report on the supposed hacking.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

I tried replacing Twitter with Bluesky, Threads, and Mastodon: Here's what I found

Collaboration 2.0

More and more ex-Twitter/X users are seeking new online homes. I kicked the tires on these three nascent services. Here's what you need to know about them.

106
106
article thumbnail

Celebrating our community at Data Citizens On the Road

Collibra

I’ll be honest. I get a real sense of joy bringing people together—especially when those people are passionate about data and its transformative power of driving competitive advantage and value for their organizations. Recently, at our Data Citizens® ‘24 on the Road, I had the immense pleasure of connecting with our vibrant community of data professionals, Collibra customers and our valued partners.

article thumbnail

Hands-on with the DJI Air 3: The perfect all-rounder drone (and now get 20% off for Black Friday)

Collaboration 2.0

Want a drone that'll do it all? The new DJI Air 3 is as close to an all-rounder as you'll get.

IT 105
article thumbnail

Threat actor sells data of over 750,000 patients from a French hospital

Security Affairs

A threat actor had access to electronic patient record system of an unnamed French hospital, and the health data of 750,000 patients was compromised. An unnamed French hospital suffered a data breach that impacted more than 758,000 patients, a threat actor had access to the electronic patient record system of the organization. The threat actor claims that exposed records include name, first name, date of birth, gender, address, city, postal code, phone number(s), and email.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Get a free Google Pixel 9 phone from T-Mobile with this Black Friday deal

Collaboration 2.0

When you sign up for a new T-Mobile line or trade in your old device, you can get a free Pixel 9 phone -- an $800 value.

105
105
article thumbnail

Biometric Litigation Risks Endure Even Post BIPA Amendment

Data Matters

Enacted in 2008, the Illinois Biometric Information Privacy Act (“BIPA”) regulates the collection and possession of biometric data by private entities operating in Illinois. Biometric data includes, for example, fingerprints, voiceprints, eye scans, and face/hand scans. Notably, BIPA establishes a private right of action, allowing any person to seek damages, attorneys’ fees, and injunctive relief if the person has been aggrieved by a BIPA violation.

Risk 97
article thumbnail

My favorite bone-conduction headphones are comfortable, durable, and $55 off for Black Friday

Collaboration 2.0

If having earbuds stuck into your ear canals doesn't appeal to you, Shokz OpenRun Pro open-ear headphones might be what you need.

105
105
article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

The U.S. Justice Department charged five suspects linked to the Scattered Spider cybercrime gang with wire fraud conspiracy. The U.S. Justice Department charged five alleged members of the cybercrime gang Scattered Spider (also known as UNC3944 , 0ktapus ) with conspiracy to commit wire fraud. “Law enforcement today unsealed criminal charges against five defendants who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee cr

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Get a refurbished Amazon Fire Tablet for as little as $10 with this Black Friday deal

Collaboration 2.0

This is a great way to save on an Amazon Fire Tablet for a kid or casual use this holiday season.

105
105
article thumbnail

Leveraging Metadata for Enhanced Information Governance 

Gimmal

Organizations are inundated with vast amounts of data—managing this data efficiently is crucial for compliance, productivity, and overall business success. Traditionally, folders have been the go-to method for organizing information. However, as data grows in volume and complexity, relying solely on folders presents significant limitations. Enter metadata—a powerful tool that can revolutionize your information governance strategy.

article thumbnail

I replaced my desktop with this MSI laptop for a week, and it surpassed my expectations

Collaboration 2.0

The MSI Stealth A16 AI Plus delivers a powerful (and flexible) performance that isn't burdened by a low battery life.

IT 105