Wed.Sep 25, 2024

article thumbnail

Commvault to Boost AWS Data Protection With $47M Clumio Buy

Data Breach Today

Clumio Adds Advanced Cyber Resilience, AWS Data Recovery to Commvault's Platform Commvault aims to boost its AWS cyber resilience capabilities through the buy of Clumio. With a focus on protecting critical data stored in Amazon S3, this move will boost Commvault’s recovery efforts for hybrid cloud customers, offering near-instant data recovery and better application protection.

Cloud 182
article thumbnail

New variant of Necro Trojan infected more than 11 million devices

Security Affairs

Experts warn of Necro Trojan found in Google Play, threat actors are spreading it through fake versions of legitimate Android apps. Researchers from Kaspersky discovered a new version of the Necro Trojan in multiple apps uploaded to the Google Play store. The malware was hidden in popular applications and game mods. Kaspersky researchers first spotted the Necro Trojan in 2019, the malicious code was in the free version of the popular PDF creator application CamScanner app.

Metadata 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US CISA Releases Toolkit for Anonymous School Threats

Data Breach Today

New Guidance Aims to Improve School Responses to ‘Scourge’ of Anonymous Threats The Cybersecurity and Infrastructure Security Agency unveiled a new toolkit Wednesday aimed at improving school responses to anonymous threats of violence, as the agency kicked off a two-day summit focusing on school security amid increasing threats targeting school systems nationwide.

article thumbnail

U.S. CISA adds Ivanti Virtual Traffic Manager flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Virtual Traffic Manager vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Ivanti Virtual Traffic Manager authentication bypass vulnerability CVE-2024-7593 (CVSS score of 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 133
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Managing Security at the Network Layer

Data Breach Today

How to Safeguard Critical Infrastructure Neglecting network security can lead to serious consequences for organizations. Here are the essential practices for managing network security, along with real-world examples that reinforce the importance of comprehensive protection. The time to secure your network is now - before it's too late.

Security 173

More Trending

article thumbnail

To Be a Cybersecurity Pro, Think Like a Puzzle Solver

Data Breach Today

How Curiosity and Gamification Drive Cybersecurity Excellence Curiosity is one of the most important traits for success in cybersecurity. Professionals in this field regularly face complex problems that require an inquisitive mind, and gamified, hands-on learning is one of the best ways to develop an inquisitive mindset.

article thumbnail

Data of 3,191 congressional staffers leaked in the dark web

Security Affairs

The personal information of over 3,000 congressional staffers was leaked on the dark web following a major cyberattack on the U.S. Capitol. The personal information of approximately 3,191 congressional staffers has been leaked on the dark web , according to new research from internet security firm Proton and Constella Intelligence. The leaked data includes passwords, IP addresses, and social media information.

Passwords 133
article thumbnail

Over 100 EU Firms Commit to Implementing Key AI Act Provisions

Data Breach Today

Meta, Apple, Mistral, Nvidia Not Among AI Pact's Signatories More than 100 tech companies including OpenAI, Microsoft and Amazon on Wednesday made voluntary commitments to conduct trustworthy and safe development of artificial intelligence in the European Union, with a few notable exceptions, including Meta, Apple, Nvidia and Mistral.

article thumbnail

6 ways the new AirPods Max could have been so much better

Collaboration 2.0

I love my AirPods Max, which is why I'm so baffled by Apple's recent update. Here's how I want to see them improved before I'll be willing to upgrade.

98
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

CMS Now Says 3.1 Million Affected by MOVEit Hack

Data Breach Today

New Estimate Is 3 Times Higher Than Number Agency Initially Publicly Disclosed The U.S. Centers for Medicare and Medicaid Services has updated the scope of the MOVEit hacking breach last year, telling a sister agency that the software supply chain attack affected more than 3.1 million individuals - about three times the number of victims disclosed publicly earlier this month.

CMS 173
article thumbnail

Election-Themed Phishing Threats Are on the Rise

KnowBe4

Researchers at ReliaQuest have published a report looking at cyber threats surrounding the upcoming US presidential election, warning that election-related phishing will continue to increase over the next month.

article thumbnail

US FTC Targets AI Firms in Crackdown on Deceptive Practices

Data Breach Today

Federal Trade Commission Takes Aim at Deceptive Use of Artificial Intelligence The U.S. Federal Trade Commission on Wednesday announced a series of law enforcement actions targeting companies the commission said is using deceptive artificial intelligence practices to defraud consumers, from promising "AI lawyers" to generating countless fake reviews.

article thumbnail

The E Ink tablet that rebooted my creativity is not a ReMarkable or Amazon Kindle

Collaboration 2.0

The Onyx Book Note Air 3 C offers a premium color pen-to-paper experience while bringing its own set of unique features to the table.

Paper 98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Stopping Business Email Compromise and Ransomware Attacks with Human-centric Security

Data Breach Today

In the ever-evolving cybersecurity landscape, two substantial threats persist: ransomware and Business Email Compromise (BEC).

article thumbnail

New Windows Malware Locks Computer in Kiosk Mode

Schneier on Security

Clever : A malware campaign uses the unusual method of locking users in their browser’s kiosk mode to annoy them into entering their Google credentials, which are then stolen by information-stealing malware. Specifically, the malware “locks” the user’s browser on Google’s login page with no obvious way to close the window, as the malware also blocks the “ESC” and “F11” keyboard keys.

82
article thumbnail

October Prime Day 2024: Everything you need to know

Collaboration 2.0

Amazon's Prime Big Deal Days sale will run Oct. 8-9, with deals on top tech, flagship devices, and more. Here's what to know.

Sales 97
article thumbnail

AI ban ordered after child protection worker used ChatGPT in Victorian court case

The Guardian Data Protection

Investigation finds staffer’s report referred to doll allegedly used by father for ‘sexual purposes’ as ‘age-appropriate toy’ Follow our Australia news live blog for latest updates Get our breaking news email , free app or daily news podcast Victoria’s child protection agency has been ordered to ban staff from using generative AI services after a worker was found to have entered significant amounts of personal information, including the name of an at-risk child, into ChatGPT.

Risk 82
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The AI Revolution: Balancing Innovation and Ethics in the Age of Intelligent Technology

KnowBe4

Artificial intelligence (AI) is revolutionizing most, if not all, industries worldwide. AI systems use complex algorithms and large datasets to analyze information, make predictions and adjust to new scenarios through machine learning – enabling them to improve over time without being explicitly programmed for every task.

article thumbnail

5 Linux terminal apps that are better than your default - and free to install

Collaboration 2.0

When you have to dive into the Linux terminal, you'll want a terminal app that either makes the job easier and/or is awesome enough that you don't mind using it. Here are my five favorite options.

IT 98
article thumbnail

[WTH?] Critical Vulnerabilities in Automated Tank Gauges. This Is Not OK.

KnowBe4

A new wave of concern has surfaced around the security of Automated Tank Gauges (ATGs), critical systems that monitor and manage liquid levels in storage tanks at facilities like oil refineries and chemical plants.

article thumbnail

X's first transparency report since Musk reveals a surprising contradiction

Collaboration 2.0

The social platform's report - its first in three years - reveals, among other things, that five million hateful posts were removed, but only 2,361 profiles were banned. Here's what else we learned.

IT 75
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Harnessing The Benefits of The Thales and Imperva Partner Ecosystem

Thales Cloud Protection & Licensing

Harnessing The Benefits of The Thales and Imperva Partner Ecosystem madhav Thu, 09/26/2024 - 05:18 In December last year, Thales acquired Imperva , its ninth acquisition in as many years and the second largest in organization’s history. The integration allows Thales to help organizations discover and protect sensitive data anywhere, manage access, and secure all its paths.

Cloud 62
article thumbnail

Is OneDrive messing with your files? How to get your Windows storage under control

Collaboration 2.0

If you're not paying close attention, your local files can get moved to Microsoft's OneDrive cloud storage. Here's what's happening, and how you can clean up the mess.

Cloud 98
article thumbnail

[Cybersecurity Awareness Month] From ‘The Inside Man’ to Real Life: AI's Role in Modern Cyber Threats

KnowBe4

AI and AI-generated deepfakes are proving to be the most intriguing, and in some ways troubling, recent advances in technology.

article thumbnail

Your doctor might be using AI to answer your questions - here's how that works

Collaboration 2.0

A popular patient portal called MyChart now employs an AI bot that thousands of US doctors are using to write messages to their patients. Disclosure is optional.

75
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

CILIP writes to Secretary of State Shabana Mahmood MP with prison library groups and other charities

CILIP

CILIP writes to Secretary of State Shabana Mahmood MP with prison library groups and other charities Photo Credit: DronePics.Wales CILIP, CILIP's Prison Libraries Group (PrLG) of members, Prisoners’ Education Trust, The Reading Agency, Libraries Connected, Shannon Trust, and Prison Reading Groups, have written to Secretary of State for Justice Shabana Mahmood MP to highlight the importance of prison libraries and the need to improve library provision for people in prison.

article thumbnail

One of my favorite laptops I've tested this year is ultraportable and has all-day battery life

Collaboration 2.0

The new Intel Core Ultra 7 200V (Series 2) processor promises next-gen AI experiences in lighter, thinner form factors. I tested it on the Asus Zenbook S 14.

IT 75
article thumbnail

UK to Host AI Conference in San Francisco, Advancing Global AI Safety Efforts

Information Matters

In a move to further global cooperation on artificial intelligence safety, the United Kingdom announced plans to host a conference in San Francisco on November 21-22, 2024. The event aims Read more The post UK to Host AI Conference in San Francisco, Advancing Global AI Safety Efforts appeared first on Information Matters - AI in the UK.