Thu.Sep 05, 2024

article thumbnail

FEMA Has Begun Deploying Cyber Advisers to Disaster Zones

Data Breach Today

FEMA CIO: Cyber Advisers Provide Critical Security Guidance Amid Recovery Efforts Charles Armstrong, chief information officer of the Federal Emergency Management Agency, told the Billington Cybersecurity Summit his agency has begun deploying cyber advisors to disaster recovery zones to "rapidly and securely" build information technology and operational technology infrastructure.

article thumbnail

Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team

WIRED Threat Level

Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world.

Military 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaspersky US Customers Migrate to Pango's UltraAV After Ban

Data Breach Today

Kaspersky Hands Off 1 Million US Customers to UltraAV Amid Government Software Ban Kaspersky is transferring 1 million U.S. antivirus customers to Pango Group's UltraAV product following the Department of Commerce's ban on Kaspersky software sales or updates. The transition ensures users will continue to receive critical cybersecurity updates and services.

Sales 177
article thumbnail

Quishing, an insidious threat to electric car owners

Security Affairs

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent years, the spread of electric cars has led to an increase in public charging stations. However, new cyber threats have emerged with this growth, including “quishing.” This term, a combination of “QR Code” and “phishing,” describes a scam in which fraudsters use counterfeit QR Codes to steal sensitive information

Phishing 116
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Banks Brace for DORA Cybersecurity Deadline on Jan. 17

Data Breach Today

New EU Rules Focus on Operational Resilience, Breach Reporting and Third-Party Risk The Digital Operational Resilience Act aims to reshape the financial services industry by introducing strict cybersecurity standards. Financial institutions must comply with the new rules by Jan. 17, 2025, or face severe penalties, said Richard Breavington, head of cyber and tech insurance at RPC.

More Trending

article thumbnail

RansomHub Claims Theft of Montana Planned Parenthood Data

Data Breach Today

Experts Say Orgs That Handle Highly Sensitive Health Info Are Targets of Attacks Planned Parenthood of Montana, which provides patients with reproductive healthcare services including birth control and abortion, is responding to a hack and a threat by cybercriminal group RansomHub to leak 93 gigabytes of data allegedly stolen from the organization.

169
169
article thumbnail

Tracelo Data Breach: 1.4 Million Records Exposed

eSecurity Planet

Data is the new gold, and breaches have become an unfortunate reality. A recent incident involving Tracelo, a popular smartphone geolocation tracking service, has exposed the personal information of over 1.4 million users. This breach, orchestrated by a hacker known as “Satanic,” highlights the vulnerability of even seemingly secure online platforms.

article thumbnail

US Broadens Indictments Against Russian Intelligence Hackers

Data Breach Today

Justice Department Adds Russian Intelligence Officers to Ukraine Hacking Indictment The United States announced a superseding indictment Thursday that adds five Russian military intelligence officers as defendants while warning that Kremlin cyberthreat actors continue to target U.S. and global critical infrastructure.

Military 169
article thumbnail

Phishing is Still the Top Initial Access Vector

KnowBe4

Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Cryptohack Roundup: Focus on Pig Butchering

Data Breach Today

Also: Hacker Launders Stolen WazirX Funds; Galois, Uniswap Settlements This week, pig-butchering scams and bitcoin ATM scams increased, an update in the FTX case, stolen WazirX funds were laundered, settlements in the SEC-Galois and CFTC-Uniswap cases, Scotland seized crypto in a robbery, North Korea targeted Web3 staff, and the Mt. Gox CEO launched a new crypto firm.

169
169
article thumbnail

Earth Lusca adds multiplatform malware KTLVdoor to its arsenal

Security Affairs

The Chinese-speaking threat actor Earth Lusca used the new backdoor KTLVdoor in an attack against a trading company in China. Trend Micro Researchers spotted the Chinese-speaking threat actor Earth Lusca using a new multiplatform backdoor called KTLVdoor. The Earth Lusca group has been active since at least the first half of 2023, it primarily targeted organizations in Southeast Asia, Central Asia, and the Balkans.

IT 94
article thumbnail

Former OpenAI Scientist's Startup Raises $1B Seed Funding

Data Breach Today

Ilya Sutskever Aims to Build Safe, Super-Intelligent AI A three-month-old startup promising safe artificial intelligence raised $1 billion in an all-cash deal in a seed funding round. Co-founded by former OpenAI Chief Scientist Ilya Sutskever, Safe Superintelligence will reportedly use the funds to acquire computing power.

article thumbnail

Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks

KnowBe4

A new attack runs slow and steady, focused on compromising large manufacturing companies using contextual social engineering to trick victims into giving up credentials.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

New AirPods are arriving next week. Here are the top 4 features I want to see

Collaboration 2.0

Industry insiders are confident Apple will announce new AirPods next week during the iPhone 16 launch. Although that's exciting to hear, there are a few things I'd like to see first.

90
article thumbnail

How Do You Mitigate Information Security Risk?

IT Governance

Modify, share, avoid or retain? Risk management is fundamental to information security and the international standard for information security management, ISO 27001. Previously , our head of GRC (governance, risk and compliance) consultancy, Damian Garcia, explained where to start with cyber security risk management: establishing a common vocabulary.

article thumbnail

Why It's So Hard to Fully Block X in Brazil

WIRED Threat Level

With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks.

IT 77
article thumbnail

I changed these 5 TV settings to instantly improve the picture quality - and you can too

Collaboration 2.0

With a bit of patience and experimentation, you can tweak your TV's basic settings for a better viewing experience.

92
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

YubiKeys Are a Security Gold Standard—but They Can Be Cloned

WIRED Threat Level

Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack.

article thumbnail

The new Soundcore Space One Pro are smaller and mightier in all the right ways

Collaboration 2.0

Soundcore's new Space One Pro headphones boast eight hours of runtime after only a quick five-minute charge. When folded up, they are about the size of a donut.

73
article thumbnail

Long Analysis of the M-209

Schneier on Security

Really interesting analysis of the American M-209 encryption device and its security.

article thumbnail

The rise and fall in programming languages' popularity since 2016 - and what it tells us

Collaboration 2.0

Our latest deep dive crunches the numbers from 2016 to 2024, revealing fascinating insights into the popularity of programming languages and how emerging trends and industry shifts have influenced developer preferences.

IT 75
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

How to Use a VPN: Complete User Guide

eSecurity Planet

A VPN (Virtual Private Network) routes your internet traffic through an encrypted tunnel, shielding your data from hackers and ensuring your online activities remain private and secure. A VPN can provide the solution if you want to safeguard your personal information, bypass geo-restrictions, or maintain anonymity online. This guide will walk you through everything you need to know, from how to use a VPN on your Windows or Mac PC, why to use a VPN, and its most common uses and challenges.

article thumbnail

I changed 10 settings on my Android phone to dramatically improve battery life

Collaboration 2.0

There are numerous ways to improve the battery life on your Android, but I've sifted through them all to highlight the most effective - plus an obvious bonus.

98
article thumbnail

Mobility management: optimizing device workflows for retail

Jamf

Apple’s intuitive and secure mobile devices lead many retailers to iPads and iPhones for store associates. See how Jamf supports the unique operations and workflows needs of retail.

Retail 40
article thumbnail

I found the AirTags that Android users have been waiting for

Collaboration 2.0

Chipolo's latest One and Card trackers are perfect for keys and wallets that have a habit of going astray.

82
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Bill-72: New health data transfer legislation proposed in Canada

Data Protection Report

The Government of Canada recently introduced Bill-72, the Connected Care for Canadians Act (Act), to promote the secure transfer of health information and prevent data blocking. The Act is designed to support the government’s initiative to establish an interoperable healthcare system and will permit the Ministry of Health to establish new regulations, set up a system to receive complaints, verify compliance and apply administrative monetary penalties for non-compliance.

article thumbnail

I went hands-on with Lenovo's auto-swiveling laptop at IFA 2024, and it's quite the spectacle

Collaboration 2.0

Lenovo's latest Intel ThinkBooks can rotate 270 degrees and open and close on their own, raising some interesting questions -- good and bad.

IT 73
article thumbnail

Capture Webinars

Info Source

Capture Webinars Webinar Title Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Webinar Title Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

40