Tue.Sep 03, 2024

article thumbnail

Halliburton Says Hackers Stole Data

Data Breach Today

Firm Says It Is Still 'Evaluating the Nature and Scope of the Information' Oil service giant Halliburton told U.S. federal regulators Tuesday that hackers stole data after the firm acknowledged "unauthorized activity" on its networks in late August. The incident "caused disruptions and limitation of access to portions of the company's business applications," the firm said.

Access 275
article thumbnail

Match Made in Heaven: Exploring the Relationship Between AI and Information Management

AIIM

Why are information management and AI even in the same sentence? It's an interesting question. What's the relationship? Well, the answer is simple: there is no AI without information.

IT 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Radiology IT Vendor Hack Hits 4 Practices, 411,000 People

Data Breach Today

Tennessee-Based Specialty Networks Incident Is Latest Attack on Business Associates A vendor that provides information systems and transcription services to radiology practices is alerting 411,037 people of a hack discovered last December involving the theft of sensitive data. The firm already faces at least four proposed federal class action lawsuits related to the hack.

IT 169
article thumbnail

The US Navy Is Going All In on Starlink

WIRED Threat Level

The Navy is testing out the Elon Musk–owned satellite constellation to provide high-speed internet access to sailors at sea. It’s part of a bigger project that’s about more than just getting online.

Access 130
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

ONCD Unveils BGP Security Road Map Amid Rising Threats

Data Breach Today

Director Hails New Guidance as 'First Step' in Resolving BGP Security Risks Harry Coker, director of the Office of the National Cyber Director, described new guidance published Tuesday that aims to bolster internet routing security as a critical "first step" in addressing long-standing security issues that threaten the backbone of global communications.

Security 161

More Trending

article thumbnail

US NTIA Probes Data Center Security Risks

Data Breach Today

Agency Publishes Notice Soliciting Comments on Potential Federal Response An artificial intelligence-fueled growth in data center construction has the federal government asking what it should do to help manage data security risks. The NTIA is interested in identifying opportunities "to improve data centers’ market development, supply chain resilience, and data security.

Risk 161
article thumbnail

Vulnerabilities in Microsoft apps for macOS allow stealing permissions

Security Affairs

Vulnerabilities in Microsoft apps for macOS could allow attackers to steal permissions and access sensitive data. Cisco Talos researchers discovered eight vulnerabilities in Microsoft apps for macOS. These flaws could allow attackers to inject malicious libraries into Microsoft’s apps and steal permissions. This could enable access to sensitive resources like the microphone, camera, and screen recording, potentially leading to data leaks or privilege escalation.

Libraries 104
article thumbnail

3 Men Plead Guilty to Running Service That Bypasses MFA

Data Breach Today

Automated Service Helped Subscribers Trick Victims Into Sharing One-Time Codes Three men have pleaded guilty to running OTPAgency, a subscription service for fraudsters designed to automatically phone targets and trick them into sharing the one-time codes criminals need to log into their bank accounts. The service targeted more than 12,500 individuals over its 18-month run.

IT 161
article thumbnail

Zyxel fixed critical OS command injection flaw in multiple routers

Security Affairs

Taiwanese manufacturer Zyxel addressed a critical OS command injection flaw affecting multiple models of its business routers. Zyxel has released security updates to address a critical vulnerability, tracked as CVE-2024-7261 (CVSS v3 score of 9.8), impacting multiple models of its business routers. The flaw is an operating system (OS) command injection issue that stems from the improper neutralization of special elements in the parameter “host” in the CGI program of some AP and security router

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

New HackerOne CEO Kara Sprague to Expand Beyond Bug Bounties

Data Breach Today

Sprague Replaces Veteran CEO, Plans to Double Down on PTaaS and AI Red Teaming HackerOne has tapped F5's longtime product leader as it next chief executive to continue expanding its portfolio beyond operating vulnerability disclosure programs. The firm tasked Kara Sprague with building on existing growth in areas including AI red teaming and penetration testing as a service.

IT 152
article thumbnail

VMware fixed a code execution flaw in Fusion hypervisor

Security Affairs

VMware released a patch to address a high-severity code execution flaw in its Fusion hypervisor, users are urged to apply it. VMware addressed a high-severity code execution vulnerability, tracked as CVE-2024-38811 (CVSS 8.8/10), in its Fusion hypervisor. The vulnerability is due to the usage of an insecure environment variable, a threat actor with standard user privileges can trigger the flaw to execute code in the context of the Fusion application. “VMware Fusion contains a code-execut

IT 99
article thumbnail

Quantifying Risks to Make the Right Cybersecurity Investments

Data Breach Today

CRQ Can Help Organizations Optimize Investment, Improve Resilience, Manage Threats When executives fully understand the potential impact and cost of cyberthreats, they can better assign the necessary resources to combat them. Learn about how Verizon's CRQ can help to improve an organization's cybersecurity investments and resilience.

article thumbnail

U.S. oil giant Halliburton disclosed a data breach

Security Affairs

U.S. oil company Halliburton disclosed a data breach following the RansomHub ransomware gang attack that occurred in August. In August, Halliburton, a major U.S. oil company, announced that a cyberattack hit its IT infrastructure, particularly impacting operations at its Houston offices. Halliburton Company is an American multinational corporation and the world’s second largest oil service company which is responsible for most of the world’s largest fracking operations.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Verkada Agrees to $2.95M Civil Penalty With US FTC

Data Breach Today

Cloud-Based Security Camera Firm Pledges Better Security in US FTC Settlement A California security camera company agreed to pay a $2.95 million civil penalty and implement a security program after hackers in 2021 accessed video from 150,000 internet-connected security cameras, including from devices placed inside psychiatric hospitals and women's health clinics.

Cloud 152
article thumbnail

Major Scam Operation Uses Deepfake Videos

KnowBe4

Researchers at Palo Alto Networks’ Unit 42 are tracking dozens of scam campaigns that are using deepfake videos to impersonate CEOs, news anchors, and high-profile government officials.

article thumbnail

Windows 11 finally outscores Windows 10 among PC gamers

Collaboration 2.0

Since its debut almost three years ago, Windows 11 has struggled to catch up to its predecessor in popularity and market share. But with the clock now running out for Windows 10, things seem to be shifting a little faster.

article thumbnail

Three men plead guilty to running MFA bypass service OTP.Agency

Security Affairs

Three men have pleaded guilty to operating OTP.Agency, an online service that allowed crooks to bypass Multi-Factor authentication (MFA). Three men, Callum Picari (22), Vijayasidhurshan Vijayanathan (21), and Aza Siddeeque (19), have pleaded guilty to operating OTP.Agency , an online platform that allowed crooks to bypass MFA used by customers of several banks and services.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Organizations in the Middle East Targeted By Malware Impersonating Palo Alto GlobalProtect VPN

KnowBe4

A social engineering campaign is targeting entities in the Middle East using malware that impersonates Palo Alto Networks’ GlobalProtect VPN, according to researchers at Trend Micro.

article thumbnail

This great Amazon Fire TV Omni Series QLED is still $170 off after Labor Day

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming, and you can save $170 on the 55-inch version in this still-live Labor Day deal.

87
article thumbnail

Building a threat hunting team

OpenText Information Management

In our previous discussions, we've delved into the daily life of a threat hunter, explored the collaborative nature of their work, and highlighted the tools they rely on. Now, as we shift our focus to the strategic side, it's crucial to consider how to build a threat hunting team that aligns with your organization's unique needs. As we've seen, threat hunting is not just about the tools or techniques; it's about the people behind the process.

article thumbnail

How to send RCS messages from your iPhone to your Android user friends

Collaboration 2.0

Using Apple's iOS 18 and the right carrier, iPhone owners can send Android users messages with high-res photos and videos, read receipts, audio clips, and more. Here's how.

86
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

What are OpenText AI assistants?

OpenText Information Management

AI assistants are everywhere these days—Siri, Alexa, and Google Assistant have become household names. In the business world, AI assistants are growing in popularity as well. These assistants take some of the burden off knowledge workers by tackling mundane, time-consuming tasks, freeing up workers to focus more on innovative and strategic projects that can help their organizations get ahead.

ECM 69
article thumbnail

Every power user needs this laptop accessory to keep their device running cool

Collaboration 2.0

The AICHESON K1 features an interesting pit design that, when combined with a 5.5-inch fan, can cool down hot laptops in no time at all.

83
article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from August 2024

KnowBe4

Check out the August updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

7 things I never do after I install Linux (and why you shouldn't either)

Collaboration 2.0

Linux is a powerful and user-friendly operating system that allows you to do far more than you can with Windows. There are, however, some things you should never do.

73
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Biometrics for Law Enforcement: Transforming Public Safety With Fast, Accurate Identification

HID Global

Learn how biometric technology in law enforcement is transforming public safety with fast, accurate identification for enhanced security and efficiency.

article thumbnail

The HP Victus 15L gaming PC is still just $480 after Labor Day

Collaboration 2.0

Buying a new gaming PC doesn't have to break the bank, and HP has the Victus 15L has top-tier components and performance in an already affordable package. But you can save $340 on one when you buy directly from HP right now.

86
article thumbnail

Boost security and efficiency with Airlock Digital and Jamf Pro

Jamf

Enhance endpoint security and streamline management with Airlock Digital's application allowlisting integrated with Jamf Pro for threat detection and compliance