Wed.Sep 25, 2024

article thumbnail

US CISA Releases Toolkit for Anonymous School Threats

Data Breach Today

New Guidance Aims to Improve School Responses to ‘Scourge’ of Anonymous Threats The Cybersecurity and Infrastructure Security Agency unveiled a new toolkit Wednesday aimed at improving school responses to anonymous threats of violence, as the agency kicked off a two-day summit focusing on school security amid increasing threats targeting school systems nationwide.

article thumbnail

Data of 3,191 congressional staffers leaked in the dark web

Security Affairs

The personal information of over 3,000 congressional staffers was leaked on the dark web following a major cyberattack on the U.S. Capitol. The personal information of approximately 3,191 congressional staffers has been leaked on the dark web , according to new research from internet security firm Proton and Constella Intelligence. The leaked data includes passwords, IP addresses, and social media information.

Passwords 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Commvault to Boost AWS Data Protection With $47M Clumio Buy

Data Breach Today

Clumio Adds Advanced Cyber Resilience, AWS Data Recovery to Commvault's Platform Commvault aims to boost its AWS cyber resilience capabilities through the buy of Clumio. With a focus on protecting critical data stored in Amazon S3, this move will boost Commvault’s recovery efforts for hybrid cloud customers, offering near-instant data recovery and better application protection.

Cloud 182
article thumbnail

New variant of Necro Trojan infected more than 11 million devices

Security Affairs

Experts warn of Necro Trojan found in Google Play, threat actors are spreading it through fake versions of legitimate Android apps. Researchers from Kaspersky discovered a new version of the Necro Trojan in multiple apps uploaded to the Google Play store. The malware was hidden in popular applications and game mods. Kaspersky researchers first spotted the Necro Trojan in 2019, the malicious code was in the free version of the popular PDF creator application CamScanner app.

Metadata 139
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Managing Security at the Network Layer

Data Breach Today

How to Safeguard Critical Infrastructure Neglecting network security can lead to serious consequences for organizations. Here are the essential practices for managing network security, along with real-world examples that reinforce the importance of comprehensive protection. The time to secure your network is now - before it's too late.

Security 173

More Trending

article thumbnail

To Be a Cybersecurity Pro, Think Like a Puzzle Solver

Data Breach Today

How Curiosity and Gamification Drive Cybersecurity Excellence Curiosity is one of the most important traits for success in cybersecurity. Professionals in this field regularly face complex problems that require an inquisitive mind, and gamified, hands-on learning is one of the best ways to develop an inquisitive mindset.

article thumbnail

Arkansas City water treatment facility switched to manual operations following a cyberattack

Security Affairs

Arkansas City, a small city in Cowley County, Kansas, was forced to switch its water treatment facility to manual operations due to a cyberattack. Arkansas City, Kansas, had to switch its water treatment facility to manual operations over the weekend due to a cyberattack that was detected on Sunday. As of the 2020 census, Arkansas City has a population of 11,974.

article thumbnail

Over 100 EU Firms Commit to Implementing Key AI Act Provisions

Data Breach Today

Meta, Apple, Mistral, Nvidia Not Among AI Pact's Signatories More than 100 tech companies including OpenAI, Microsoft and Amazon on Wednesday made voluntary commitments to conduct trustworthy and safe development of artificial intelligence in the European Union, with a few notable exceptions, including Meta, Apple, Nvidia and Mistral.

article thumbnail

6 ways the new AirPods Max could have been so much better

Collaboration 2.0

I love my AirPods Max, which is why I'm so baffled by Apple's recent update. Here's how I want to see them improved before I'll be willing to upgrade.

98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CMS Now Says 3.1 Million Affected by MOVEit Hack

Data Breach Today

New Estimate Is 3 Times Higher Than Number Agency Initially Publicly Disclosed The U.S. Centers for Medicare and Medicaid Services has updated the scope of the MOVEit hacking breach last year, telling a sister agency that the software supply chain attack affected more than 3.1 million individuals - about three times the number of victims disclosed publicly earlier this month.

CMS 173
article thumbnail

Election-Themed Phishing Threats Are on the Rise

KnowBe4

Researchers at ReliaQuest have published a report looking at cyber threats surrounding the upcoming US presidential election, warning that election-related phishing will continue to increase over the next month.

article thumbnail

Stopping Business Email Compromise and Ransomware Attacks with Human-centric Security

Data Breach Today

In the ever-evolving cybersecurity landscape, two substantial threats persist: ransomware and Business Email Compromise (BEC).

article thumbnail

The E Ink tablet that rebooted my creativity is not a ReMarkable or Amazon Kindle

Collaboration 2.0

The Onyx Book Note Air 3 C offers a premium color pen-to-paper experience while bringing its own set of unique features to the table.

Paper 98
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

US FTC Targets AI Firms in Crackdown on Deceptive Practices

Data Breach Today

Federal Trade Commission Takes Aim at Deceptive Use of Artificial Intelligence The U.S. Federal Trade Commission on Wednesday announced a series of law enforcement actions targeting companies the commission said is using deceptive artificial intelligence practices to defraud consumers, from promising "AI lawyers" to generating countless fake reviews.

article thumbnail

October Prime Day 2024: Everything you need to know

Collaboration 2.0

Amazon's Prime Big Deal Days sale will run Oct. 8-9, with deals on top tech, flagship devices, and more. Here's what to know.

Sales 97
article thumbnail

The AI Revolution: Balancing Innovation and Ethics in the Age of Intelligent Technology

KnowBe4

Artificial intelligence (AI) is revolutionizing most, if not all, industries worldwide. AI systems use complex algorithms and large datasets to analyze information, make predictions and adjust to new scenarios through machine learning – enabling them to improve over time without being explicitly programmed for every task.

article thumbnail

New Windows Malware Locks Computer in Kiosk Mode

Schneier on Security

Clever : A malware campaign uses the unusual method of locking users in their browser’s kiosk mode to annoy them into entering their Google credentials, which are then stolen by information-stealing malware. Specifically, the malware “locks” the user’s browser on Google’s login page with no obvious way to close the window, as the malware also blocks the “ESC” and “F11” keyboard keys.

88
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

[WTH?] Critical Vulnerabilities in Automated Tank Gauges. This Is Not OK.

KnowBe4

A new wave of concern has surfaced around the security of Automated Tank Gauges (ATGs), critical systems that monitor and manage liquid levels in storage tanks at facilities like oil refineries and chemical plants.

article thumbnail

AI ban ordered after child protection worker used ChatGPT in Victorian court case

The Guardian Data Protection

Investigation finds staffer’s report referred to doll allegedly used by father for ‘sexual purposes’ as ‘age-appropriate toy’ Follow our Australia news live blog for latest updates Get our breaking news email , free app or daily news podcast Victoria’s child protection agency has been ordered to ban staff from using generative AI services after a worker was found to have entered significant amounts of personal information, including the name of an at-risk child, into ChatGPT.

Risk 85
article thumbnail

[Cybersecurity Awareness Month] From ‘The Inside Man’ to Real Life: AI's Role in Modern Cyber Threats

KnowBe4

AI and AI-generated deepfakes are proving to be the most intriguing, and in some ways troubling, recent advances in technology.

article thumbnail

Why Windows 11 requires a TPM - and how to get around that

Collaboration 2.0

Windows 11 officially requires a Trusted Platform Module. Here's what it does and how you can work around that requirement if your old PC doesn't have one.

IT 76
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Harnessing The Benefits of The Thales and Imperva Partner Ecosystem

Thales Cloud Protection & Licensing

Harnessing The Benefits of The Thales and Imperva Partner Ecosystem madhav Thu, 09/26/2024 - 05:18 In December last year, Thales acquired Imperva , its ninth acquisition in as many years and the second largest in organization’s history. The integration allows Thales to help organizations discover and protect sensitive data anywhere, manage access, and secure all its paths.

Cloud 62
article thumbnail

Meta's new 512GB Quest 3 deal may be the best VR headset offer right now

Collaboration 2.0

Meta announced that it will discontinue the 128GB version of the Quest 3 VR headset, and drop the price of the the 512GB by $150. Here's where to buy it.

IT 76
article thumbnail

CILIP writes to Secretary of State Shabana Mahmood MP with prison library groups and other charities

CILIP

CILIP writes to Secretary of State Shabana Mahmood MP with prison library groups and other charities Photo Credit: DronePics.Wales CILIP, CILIP's Prison Libraries Group (PrLG) of members, Prisoners’ Education Trust, The Reading Agency, Libraries Connected, Shannon Trust, and Prison Reading Groups, have written to Secretary of State for Justice Shabana Mahmood MP to highlight the importance of prison libraries and the need to improve library provision for people in prison.

article thumbnail

The best rugged laptops of 2024

Collaboration 2.0

We tested and researched some of the best rugged laptops from Getac, Lenovo, and more to help you find the most durable mobile PC to fit your needs.

76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

UK to Host AI Conference in San Francisco, Advancing Global AI Safety Efforts

Information Matters

In a move to further global cooperation on artificial intelligence safety, the United Kingdom announced plans to host a conference in San Francisco on November 21-22, 2024. The event aims Read more The post UK to Host AI Conference in San Francisco, Advancing Global AI Safety Efforts appeared first on Information Matters - AI in the UK.

article thumbnail

I found the best AirTags for Android users, and they're very accurate

Collaboration 2.0

Chipolo's latest One and Card trackers are perfect for keys and wallets that have a habit of disappearing.

76
article thumbnail

Migrating to Db2 13 for z/OS: What About Non-Universal Table Spaces?

Robert's Db2

I recently communicated with a Db2 for z/OS system administrator who had some concerns about non-universal table spaces in the context of his organization's planned migration from Db2 12 to Db2 13. This person asked important questions about the presence of non-universal table spaces in his Db2 environment and how those database objects might affect his team's plans for Db2 12-to-13 migration.