Tue.Sep 03, 2024

article thumbnail

Halliburton Says Hackers Stole Data

Data Breach Today

Firm Says It Is Still 'Evaluating the Nature and Scope of the Information' Oil service giant Halliburton told U.S. federal regulators Tuesday that hackers stole data after the firm acknowledged "unauthorized activity" on its networks in late August. The incident "caused disruptions and limitation of access to portions of the company's business applications," the firm said.

Access 287
article thumbnail

Match Made in Heaven: Exploring the Relationship Between AI and Information Management

AIIM

Why are information management and AI even in the same sentence? It's an interesting question. What's the relationship? Well, the answer is simple: there is no AI without information.

IT 186
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Radiology IT Vendor Hack Hits 4 Practices, 411,000 People

Data Breach Today

Tennessee-Based Specialty Networks Incident Is Latest Attack on Business Associates A vendor that provides information systems and transcription services to radiology practices is alerting 411,037 people of a hack discovered last December involving the theft of sensitive data. The firm already faces at least four proposed federal class action lawsuits related to the hack.

IT 182
article thumbnail

The US Navy Is Going All In on Starlink

WIRED Threat Level

The Navy is testing out the Elon Musk–owned satellite constellation to provide high-speed internet access to sailors at sea. It’s part of a bigger project that’s about more than just getting online.

Access 145
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US NTIA Probes Data Center Security Risks

Data Breach Today

Agency Publishes Notice Soliciting Comments on Potential Federal Response An artificial intelligence-fueled growth in data center construction has the federal government asking what it should do to help manage data security risks. The NTIA is interested in identifying opportunities "to improve data centers’ market development, supply chain resilience, and data security.

Risk 173

More Trending

article thumbnail

3 Men Plead Guilty to Running Service That Bypasses MFA

Data Breach Today

Automated Service Helped Subscribers Trick Victims Into Sharing One-Time Codes Three men have pleaded guilty to running OTPAgency, a subscription service for fraudsters designed to automatically phone targets and trick them into sharing the one-time codes criminals need to log into their bank accounts. The service targeted more than 12,500 individuals over its 18-month run.

IT 173
article thumbnail

Vulnerabilities in Microsoft apps for macOS allow stealing permissions

Security Affairs

Vulnerabilities in Microsoft apps for macOS could allow attackers to steal permissions and access sensitive data. Cisco Talos researchers discovered eight vulnerabilities in Microsoft apps for macOS. These flaws could allow attackers to inject malicious libraries into Microsoft’s apps and steal permissions. This could enable access to sensitive resources like the microphone, camera, and screen recording, potentially leading to data leaks or privilege escalation.

Libraries 137
article thumbnail

New HackerOne CEO Kara Sprague to Expand Beyond Bug Bounties

Data Breach Today

Sprague Replaces Veteran CEO, Plans to Double Down on PTaaS and AI Red Teaming HackerOne has tapped F5's longtime product leader as it next chief executive to continue expanding its portfolio beyond operating vulnerability disclosure programs. The firm tasked Kara Sprague with building on existing growth in areas including AI red teaming and penetration testing as a service.

IT 162
article thumbnail

U.S. oil giant Halliburton disclosed a data breach

Security Affairs

U.S. oil company Halliburton disclosed a data breach following the RansomHub ransomware gang attack that occurred in August. In August, Halliburton, a major U.S. oil company, announced that a cyberattack hit its IT infrastructure, particularly impacting operations at its Houston offices. Halliburton Company is an American multinational corporation and the world’s second largest oil service company which is responsible for most of the world’s largest fracking operations.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Quantifying Risks to Make the Right Cybersecurity Investments

Data Breach Today

CRQ Can Help Organizations Optimize Investment, Improve Resilience, Manage Threats When executives fully understand the potential impact and cost of cyberthreats, they can better assign the necessary resources to combat them. Learn about how Verizon's CRQ can help to improve an organization's cybersecurity investments and resilience.

article thumbnail

Three men plead guilty to running MFA bypass service OTP.Agency

Security Affairs

Three men have pleaded guilty to operating OTP.Agency, an online service that allowed crooks to bypass Multi-Factor authentication (MFA). Three men, Callum Picari (22), Vijayasidhurshan Vijayanathan (21), and Aza Siddeeque (19), have pleaded guilty to operating OTP.Agency , an online platform that allowed crooks to bypass MFA used by customers of several banks and services.

article thumbnail

Verkada Agrees to $2.95M Civil Penalty With US FTC

Data Breach Today

Cloud-Based Security Camera Firm Pledges Better Security in US FTC Settlement A California security camera company agreed to pay a $2.95 million civil penalty and implement a security program after hackers in 2021 accessed video from 150,000 internet-connected security cameras, including from devices placed inside psychiatric hospitals and women's health clinics.

Cloud 162
article thumbnail

Zyxel fixed critical OS command injection flaw in multiple routers

Security Affairs

Taiwanese manufacturer Zyxel addressed a critical OS command injection flaw affecting multiple models of its business routers. Zyxel has released security updates to address a critical vulnerability, tracked as CVE-2024-7261 (CVSS v3 score of 9.8), impacting multiple models of its business routers. The flaw is an operating system (OS) command injection issue that stems from the improper neutralization of special elements in the parameter “host” in the CGI program of some AP and security router

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Organizations in the Middle East Targeted By Malware Impersonating Palo Alto GlobalProtect VPN

KnowBe4

A social engineering campaign is targeting entities in the Middle East using malware that impersonates Palo Alto Networks’ GlobalProtect VPN, according to researchers at Trend Micro.

article thumbnail

VMware fixed a code execution flaw in Fusion hypervisor

Security Affairs

VMware released a patch to address a high-severity code execution flaw in its Fusion hypervisor, users are urged to apply it. VMware addressed a high-severity code execution vulnerability, tracked as CVE-2024-38811 (CVSS 8.8/10), in its Fusion hypervisor. The vulnerability is due to the usage of an insecure environment variable, a threat actor with standard user privileges can trigger the flaw to execute code in the context of the Fusion application. “VMware Fusion contains a code-execut

IT 127
article thumbnail

List of Old NSA Training Videos

Schneier on Security

The NSA’s “ National Cryptographic School Television Catalogue ” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a bunch explaining the operations of various cryptographic equipment, and a few code words I have never heard of before.

FOIA 118
article thumbnail

Major Scam Operation Uses Deepfake Videos

KnowBe4

Researchers at Palo Alto Networks’ Unit 42 are tracking dozens of scam campaigns that are using deepfake videos to impersonate CEOs, news anchors, and high-profile government officials.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Windows 11 finally outscores Windows 10 among PC gamers

Collaboration 2.0

Since its debut almost three years ago, Windows 11 has struggled to catch up to its predecessor in popularity and market share. But with the clock now running out for Windows 10, things seem to be shifting a little faster.

article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from August 2024

KnowBe4

Check out the August updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

How to send RCS messages from your iPhone to your Android user friends

Collaboration 2.0

Using Apple's iOS 18 and the right carrier, iPhone owners can send Android users messages with high-res photos and videos, read receipts, audio clips, and more. Here's how.

98
article thumbnail

How to Use Dashlane in 2024: Complete Starter Guide

eSecurity Planet

Dashlane is a leading password manager designed to simplify and secure your digital life. It consolidates your passwords into a single, encrypted vault. Dashlane helps you keep track of your login credentials and enhances your overall online security. This guide will walk you through how to use Dashlane, offering a step-by-step approach to set up and optimize your experience.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

This great Amazon Fire TV Omni Series QLED is still $170 off after Labor Day

Collaboration 2.0

The Amazon Fire TV Omni QLED offers excellent picture and audio quality for both streaming and console gaming, and you can save $170 on the 55-inch version in this still-live Labor Day deal.

98
article thumbnail

Building a threat hunting team

OpenText Information Management

In our previous discussions, we've delved into the daily life of a threat hunter, explored the collaborative nature of their work, and highlighted the tools they rely on. Now, as we shift our focus to the strategic side, it's crucial to consider how to build a threat hunting team that aligns with your organization's unique needs. As we've seen, threat hunting is not just about the tools or techniques; it's about the people behind the process.

article thumbnail

Every power user needs this laptop accessory to keep their device running cool

Collaboration 2.0

The AICHESON K1 features an interesting pit design that, when combined with a 5.5-inch fan, can cool down hot laptops in no time at all.

98
article thumbnail

What are OpenText AI assistants?

OpenText Information Management

AI assistants are everywhere these days—Siri, Alexa, and Google Assistant have become household names. In the business world, AI assistants are growing in popularity as well. These assistants take some of the burden off knowledge workers by tackling mundane, time-consuming tasks, freeing up workers to focus more on innovative and strategic projects that can help their organizations get ahead.

ECM 72
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

7 things I never do after I install Linux (and why you shouldn't either)

Collaboration 2.0

Linux is a powerful and user-friendly operating system that allows you to do far more than you can with Windows. There are, however, some things you should never do.

76
article thumbnail

Sensitive data in the cloud: How can companies leverage the benefits without risking security?

Thales Cloud Protection & Licensing

Sensitive data in the cloud: How can companies leverage the benefits without risking security? josh.pearson@t… Tue, 09/03/2024 - 07:00 In an era of increasingly sophisticated data breaches and cyber threats, companies are rightfully concerned about moving sensitive data to the cloud. The benefits of cloud infrastructure, such as scalability, cost-efficiency, and accessibility, are clear.

Cloud 71
article thumbnail

Real-life computer bugs? Student Chromebooks infested with bedbugs - and it's not the first time

Collaboration 2.0

Bedbugs in school laptops have been a recurring issue. Here's a look at why.

IT 76