Wed.Sep 18, 2024

article thumbnail

Scam ‘Funeral Streaming’ Groups Thrive on Facebook

Krebs on Security

Scammers are flooding Facebook with groups that purport to offer video streaming of funeral services for the recently deceased. Friends and family who follow the links for the streaming services are then asked to cough up their credit card information. Recently, these scammers have branched out into offering fake streaming services for nearly any kind of event advertised on Facebook.

Passwords 222
article thumbnail

Intezer's $33M Series C Funding to Fuel AI, Customer Support

Data Breach Today

Norwest Money Fuels Integration of Cloud Defense Tools, Autonomous Alert Management Norwest Venture Partners led a $33 million Series C round to accelerate Intezer's product development, strengthen AI models and broaden security alert coverage. The funding will enable the New York-based company to offer more support for cloud security while growing its customer success teams.

Cloud 191
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: INE Security’s cybersecurity training service earns 2024 SC Excellence Award

The Last Watchdog

Cary, NC, Sept.18, 2024, CyberNewsWire — INE Security is proud to announce that it has been named a winner in the prestigious 2024 SC Awards, named Best IT Security-Related Training Program. This designation underscores INE Security’s commitment to excellence and leadership in the cybersecurity industry. The SC Awards , now in its 27th year, recognize the solutions, organizations, and individuals that have demonstrated outstanding achievement in advancing the security of information system

article thumbnail

Beware the Great AI Bubble Popping

Data Breach Today

Crashing Markets, Slower Innovation, But More Sustainable AI Development If the bubble isn't popping already, it'll pop soon, say many investors and close observers of the AI industry. If past bubbles are a benchmark, the burst will filter out companies with no solid business models and pave the way for more sustainable growth for the industry in the long term.

Marketing 173
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

News alert: SpyCloud study reveals ‘infostealer’ malware can be a precursor to a ransomware attack

The Last Watchdog

Austin, TX, Sept. 18, 2024, CyberNewsWire — SpyCloud , the leader in Cybercrime Analytics, today announced new cybersecurity research highlighting the growing and alarming threat of infostealers – a type of malware designed to exfiltrate digital identity data, login credentials, and session cookies from infected devices. SpyCloud’s latest findings reveal the staggering scale of identity exposure caused by infostealers, the influence this type of malware has had on the surge in ransomware i

More Trending

article thumbnail

News alert: Evergy selects OneLayer to manage, secure its private cellular OT assets

The Last Watchdog

Boston, Mass., Sept. 18, 2024] — One Layer , the leader in managing and securing enterprise private 5G/LTE Operational Technology (OT) networks, announced today the selection of its OneLayer Bridge private LTE network device management and zero trust security platform by energy provider Evergy, in a multi-year deal. Evergy has innovatively embraced Ericsson’s private LTE technology to elevate operational performance.

IT 100
article thumbnail

Australian Police Arrest Alleged Head of Ghost Encrypted App

Data Breach Today

International Law Enforcement Dismantles End-to-End Encrypted Messaging Service An international law enforcement operation dismantled the Ghost encrypted messaging service in a takedown that resulted in the arrest of 51 suspects across three continents including alleged members of the Italian Mafia and motorcycle gangs. Australian police arrested Ghost's alleged administrator.

article thumbnail

SANS Releases Guide to Address Rise in Attacks on Manufacturing and Industrial Control Systems

KnowBe4

Increased ransomware attacks on industrial control systems (ICS), mixed with general ICS insecurity found across the manufacturing sector, has given rise to a guide specifically addressing this risk.

article thumbnail

Swiss Post to Strengthen Cybersecurity With Open Systems Buy

Data Breach Today

Acquisition Set to Boost SASE Protection, Network Connectivity for Swiss Businesses Swiss Post has signed an agreement to acquire Open Systems, a cybersecurity leader specializing in secure access service edge. The deal, expected to close by late 2024, will expand Swiss Post's offerings for secure digital communications for public and private organizations across Switzerland.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

U.S. Government Indicts Chinese National For Alleged Spear Phishing Attacks

KnowBe4

The U.S. Justice Department has indicted a Chinese national, Song Wu, for allegedly sending spear phishing emails to employees at various U.S. military and government entities, research institutions and private companies.

article thumbnail

How Mega Attacks Are Spotlighting Critical 3rd-Party Risks

Data Breach Today

Recent mega data breaches involving third-party vendors - such as the Change Healthcare cyberattack - are intensifying the spotlight on critical security risk management and governance issues for business associates and other suppliers, said regulatory attorney Rachel Rose.

Risk 147
article thumbnail

Broadcom fixed Critical VMware vCenter Server flaw CVE-2024-38812

Security Affairs

Broadcom addressed a critical vulnerability in the VMware vCenter Server that could allow remote attackers to achieve code execution. Broadcom released security updates to address a critical vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), in VMware vCenter Server that could lead to remote code execution. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

Cloud 88
article thumbnail

California Enacts Laws to Combat Election, Media Deepfakes

Data Breach Today

Laws Seek Removal of Deceptive Content, Labeling of Less Malicious Content California enacted regulation to crack down on the misuse of artificial intelligence as Gov. Gavin Newsom on Tuesday signed five bills focused on curbing the impact of deepfakes. The Golden State has been on the national forefront of tech regulation.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Did a Chinese University Hacking Competition Target a Real Victim?

WIRED Threat Level

Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there.

article thumbnail

Use the STAR Method for Your Cybersecurity Job Interview

Data Breach Today

Tell Interviewers How You Respond to Incidents and Solve Problems The STAR - Situation, Task, Action, Result - method is a widely used framework for answering behavioral interview questions. It allows job candidates to present their experiences in a structured way, making it easier for interviewers to understand their problem-solving skills and real-world impact.

article thumbnail

Walkie-Talkies Explode in New Attack on Hezbollah

WIRED Threat Level

In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths.

article thumbnail

Experts warn of China-linked APT’s Raptor Train IoT Botnet

Security Affairs

Researchers warn of a new IoT botnet called Raptor Train that already compromised over 200,000 devices worldwide. Cybersecurity researchers from Lumen’s Black Lotus Labs discovered a new botnet, named Raptor Train, composed of small office/home office (SOHO) and IoT devices. The experts believe the botnet is controlled by a Chine-linked APT group Flax Typhoon (also called Ethereal Panda or RedJuliett).

IoT 77
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

How to turn your old Android phone into a security or pet camera

Collaboration 2.0

Need to keep an eye on something in your house or business, but can't be in two places at once? This free app makes it easy to set up a simple remote camera using any old Android phone.

article thumbnail

Credential Flusher, understanding the threat and how to protect your login data

Security Affairs

Credential Flusher is a method that allows hackers to steal login credentials directly from the victim’s web browser. The cyber attacks have become increasingly sophisticated, putting our personal information at risk. One of the latest and most insidious techniques is Credential Flusher, a method that allows hackers to steal login credentials directly from the victim’s web browser.

article thumbnail

Building Security Resilient Against Quantum Threats: Embracing PQC in Five Steps

Thales Cloud Protection & Licensing

Building Security Resilient Against Quantum Threats: Embracing PQC in Five Steps divya Thu, 09/19/2024 - 06:53 The recent announcement by NIST regarding the finalization of post-quantum cryptography (PQC) standards marks a pivotal moment for organizations aiming to future-proof their data security against quantum threats. The three standards—FIPS 203 (Kyber for key encapsulation), FIPS 204 (Dilithium for digital signatures), and FIPS 205 (SPHINCS+ for stateless signatures)—are designed to bolste

article thumbnail

Step aside, Sonos. Bose delivers another path to headphone and soundbar compatibility

Collaboration 2.0

The new Bose Smart Soundbar debuts with two new software features, one of which is a direct response to Sonos' TV Audio Swap.

78
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

North Korean Hackers Target Software Developers With Phony Coding Tests

KnowBe4

Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews.

article thumbnail

Instagram makes 'Teen Accounts' private by default - and AI will be checking your age

Collaboration 2.0

Meta is restricting content, enforcing time limits, and handing control back to parents. Will the changes make younger users safer on social media?

75
article thumbnail

The Inside Man Biggest Fan Contest is Heating Up

KnowBe4

We are halfway through our annual The Inside Man Biggest Fan Contest, and we already have some amazing entries!

article thumbnail

I added 1TB of storage to my sluggish PC with this thumb-sized accessory

Collaboration 2.0

If you're dealing with a laggy PC, the PNY 1TB storage drive can speed up your system with added storage. And it dealt with my stress tests exceedingly well.

IT 64
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

A Must See for KnowBe4 Customers and Partners: Geoff White to Keynote KB4-CON EMEA 2024

KnowBe4

As a valued KnowBe4 customer and partner, we're thrilled to bring you exciting news about our upcoming KB4-CON EMEA 2024 in London.

article thumbnail

Garmin's newest satellite communicator lets you share photos and voice notes too

Collaboration 2.0

Garmin's inReach Messenger Plus offers more ways to stay in touch on your off-grid adventures - in case of emergency or just for fun. Here's how it works.

article thumbnail

U.S. Treasury issued fresh sanctions against entities linked to the Intellexa Consortium

Security Affairs

The U.S. Department of Treasury issued new sanctions against five executives and one entity linked to the Intellexa Consortium. The Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued new sanctions against five individuals and one entity associated with the Intellexa Consortium for their role in developing, operating, and distributing commercial spyware.