Fri.Feb 16, 2024

article thumbnail

US FTC Proposes Penalties for Deepfake Impersonators

Data Breach Today

FTC Says It Should Be Able to Sue Providers Who Know Their Tech Is Used for Fraud The U.S. Federal Trade Commission said it's too easy for fraudsters to launch "child in trouble" and romance scams, so it has proposed rule-making that would give the agency new authority to sue in federal court any technology providers that facilitate impersonation fraud.

IT 263
article thumbnail

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say

WIRED Threat Level

A surprise disclosure of a national security threat by the House Intelligence chair was part of an effort to block legislation that aimed to limit cops and spies from buying Americans' private data.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FDA Ramps Up Resources for Medical Device Cybersecurity

Data Breach Today

FDA's Dr. Suzanne Schwartz on How New 'Super Office' Boosts Agency's Cyber Efforts The FDA's multifaceted approach to strengthening medical device security centers on several key areas, including enhanced regulatory oversight, industry collaboration and a recent organizational change that raises the profile of the agency's device work, said the FDA's Dr.

article thumbnail

U.S. CISA: hackers breached a state government organization

Security Affairs

U.S. CISA revealed that threat actors breached an unnamed state government organization via an administrator account belonging to a former employee. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that a threat actor gained access to an unnamed state government organization’s network environment via an administrator account belonging to a former employee.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ukrainian Behind Raccoon Stealer Operations Extradited to US

Data Breach Today

Mark Sokolovsky Has Fought Extradition From the Netherlands Since March 2022 Arrest A Dutch court extradited a Ukrainian national to the United States, where he faces criminal charges related to his role in the malware-as-a-service Raccoon Stealer. The extradition of Mark Sokolovsky, 28, comes nearly two years after Netherlands police arrested him in March 2022.

260
260

More Trending

article thumbnail

Cyberwar: What Is It Good For?

Data Breach Today

CISO Sam Curry and CMO Red Curry discuss the chaos and disruption of cyberwar and how attacks on critical infrastructure can tactically help attackers in combat, demoralize the general population and affect critical capabilities at just the right point in time.

IT 246
article thumbnail

CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2020-3259 Cisco ASA and FTD Information Disclosure Vulnerability CVE-2024-21410 Microsoft Exchange Server Privilege Escalation Vulnerability The vulnerability CVE-2020-3259

IT 141
article thumbnail

Navigating the AI Career Maze

Data Breach Today

CyberEd.io's Steve King on Job Opportunities Available in Age of AI The AI industry is exploding with demand for talent that can navigate the maze of machine learning, data analytics and neural networks. But what does this mean for the average IT person looking for a job? Steve King of CyberEd.io discusses finding work in the AI field.

Analytics 244
article thumbnail

Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs

Security Affairs

Russia-linked APT group Turla has been spotted targeting Polish non-governmental organizations (NGO) with a new backdoor dubbed TinyTurla-NG. Russia-linked cyberespionage group Turla has been spotted using a new backdoor dubbed TinyTurla-NG in attacks aimed at Polish non-governmental organizations. The Turla APT group (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ) has been active since at least 2004 targeting diplomatic and government organizations and private businesse

CMS 141
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ISMG Editors: What Happened to the Cyberwar in Israel?

Data Breach Today

Also: Potential HIPAA Audit Revival; Security Risks of Sovereign AI In the latest weekly update, four ISMG editors discussed the relatively low profile of cyberwarfare in recent international conflicts, the potential revival of a dormant HIPAA compliance audit program and the security implications of sovereign AI development.

article thumbnail

RETVec: Resilient and Efficient Text Vectorizer

Elie

This research study presented at NeurIPS 2024 introduces RETVec, a robust and multilingual text vectorizer that provides efficiency and resilience against typos and adversarial attacks for neural-based text processing.

137
137
article thumbnail

On Point: Identity Fabric Is the Future of Cybersecurity

Data Breach Today

Improving Security by Integrating IAM Infrastructure, Applications and Services Protecting our identities is extremely important. An identity fabric is a robust identity control framework, but before you can roll one out, you need to understand all aspects of the IAM life cycle, assess all the areas of risk and make sure that remediation controls are in place.

article thumbnail

SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles

WIRED Threat Level

The prototype satellites hitched a ride on a Falcon 9 rocket.

Military 125
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Augmented Security: The Impact of AR on Cybersecurity

KnowBe4

Recently, Apple launched its Apple Vision Pro to much fanfare and has pushed the discussion of Augmented Reality (AR) beyond the realms of gaming and entertainment. From healthcare innovations to retail experiences and manufacturing enhancements, AR has the potential to reshape operational frameworks and redefine user interactions.

Retail 120
article thumbnail

Volt Typhoon Disrupts US Organizations, CISA Issues Alerts

eSecurity Planet

Volt Typhoon, a notorious cyber group linked to the People’s Republic of China, has expanded its operations beyond illegal access and data theft. This state-backed hacker collective, also known as Vanguard Panda, BRONZE SILHOUETTE, Dev-0391, UNC3236, Voltzite, and Insidious Taurus, has infiltrated the networks of critical infrastructure sectors ranging from aviation to maritime in a strategic bid for future catastrophic cyberattacks.

article thumbnail

Messaging Platform Telegram Sprouts Cyber Crime “Marketplaces” of Tools, Insights and Data

KnowBe4

Cybercriminals are taking advantage of the messaging platform Telegram by creating channels and groups where learning and commerce all can take place freely.

Phishing 114
article thumbnail

Maintaining GDPR and Data Privacy Compliance in 2024

IT Governance

Expert tips from Alan Calder Alan is the Group CEO of GRC International Group PLC, the parent company of IT Governance, and is an acknowledged international security guru. He’s also an award-winning author, and has been involved in developing a wide range of information security and data privacy training courses, has consulted for clients across the globe, and is a regular media commentator and speaker.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Reducing defects and downtime with AI-enabled automated inspections

IBM Big Data Hub

A large, multinational automobile manufacturer responsible for producing millions of vehicles annually, engaged with IBM to streamline their manufacturing processes with seamless, automated inspections driven by real-time data and artificial intelligence (AI). As an automobile manufacturer, our client has an inherent duty to provide high-quality products.

article thumbnail

Junk mail: how one click can lead to a deluge

The Guardian Data Protection

When piles of unsolicited mail and catalogues thud through the letterbox, ask yourself: how do they get your details and how can you stop it? Do catalogues from companies you have never heard of regularly land with a thud on your doormat? These deliveries of junk mail may make you wonder how the senders got your name and address – and if your personal details are being shared without your say-so.

Retail 82
article thumbnail

Customer service vs customer experience: Key differentiators

IBM Big Data Hub

In many organizations, but not all, customer service is treated as part of the customer experience. Both are interested in driving customer satisfaction, but they focus on different parts of the customer journey to achieve it. So what are the key differences in customer service vs. customer experience? And why do both matter for your business? Customer experience , or CX, is a holistic accounting of customers’ perceptions resulting from all their interactions with a business or brand, whet

article thumbnail

How are Medical Records Stored?

Record Nations

Medical records can be stored digitally as electronic health records (EHRs) or physically as paper documents. Typically, files used regularly are more accessible as an EHR. Whereas, long-term or inactive records are best stored offsite in physical files. Both options are regulated by HIPAA guidelines to protect privacy. HIPAA also requires that regardless of the.

Paper 70
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

What are Breach and Attack Simulations?

IBM Big Data Hub

Breach and Attack Simulation (BAS) is an automated and continuous software-based approach to offensive security. Similar to other forms of security validation such as red teaming and penetration testing , BAS complements more traditional security tools by simulating cyberattacks to test security controls and provide actionable insights. Like a red team exercise, breach and attack simulations use the real-world attack tactics, techniques, and procedures (TTPs) employed by hackers to proactively i

article thumbnail

The right of access to personal data: a more extensive view?

Data Protection Report

This article first appeared in PLC Magazine in the January / February 2024 issue of PLC Magazine. The right of access to personal data looks set to be a key focus area for data protection regulators for 2024 in both the EU and the UK. The European Data Protection Board (EDPB) announced that its 2024 co-ordinated enforcement action will look at how controllers implement the right of access to personal data.

article thumbnail

Vectara Launches New Chatbot Development Platform

Information Matters

Santa Clara-based startup Vectara has unveiled a new platform called Vectara Chat that aims to simplify and streamline the process of building chatbots using generative AI. The company says Vectara Read more The post Vectara Launches New Chatbot Development Platform appeared first on Information Matters - Where AI Meets Knowledge Management.

52
article thumbnail

SMARTPHONE SCREENS ARE ABOUT TO BECOME SPEAKERS via IEEE Spectrum

IG Guru

Check out the article here. The post SMARTPHONE SCREENS ARE ABOUT TO BECOME SPEAKERS via IEEE Spectrum first appeared on IG GURU.

Risk 51
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Friday Squid Blogging: Vegan Squid-Ink Pasta

Schneier on Security

It uses black beans for color and seaweed for flavor. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 108