Thu.Sep 05, 2024

article thumbnail

FEMA Has Begun Deploying Cyber Advisers to Disaster Zones

Data Breach Today

FEMA CIO: Cyber Advisers Provide Critical Security Guidance Amid Recovery Efforts Charles Armstrong, chief information officer of the Federal Emergency Management Agency, told the Billington Cybersecurity Summit his agency has begun deploying cyber advisors to disaster recovery zones to "rapidly and securely" build information technology and operational technology infrastructure.

article thumbnail

Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team

WIRED Threat Level

Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world.

Military 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaspersky US Customers Migrate to Pango's UltraAV After Ban

Data Breach Today

Kaspersky Hands Off 1 Million US Customers to UltraAV Amid Government Software Ban Kaspersky is transferring 1 million U.S. antivirus customers to Pango Group's UltraAV product following the Department of Commerce's ban on Kaspersky software sales or updates. The transition ensures users will continue to receive critical cybersecurity updates and services.

Sales 189
article thumbnail

We Hunted Hidden Police Signals at the DNC

WIRED Threat Level

Using special software, WIRED investigated police surveillance at the DNC. We collected signals from nearly 300,000 devices, revealing vulnerabilities for both law enforcement and everyday citizens alike.

Privacy 143
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Banks Brace for DORA Cybersecurity Deadline on Jan. 17

Data Breach Today

New EU Rules Focus on Operational Resilience, Breach Reporting and Third-Party Risk The Digital Operational Resilience Act aims to reshape the financial services industry by introducing strict cybersecurity standards. Financial institutions must comply with the new rules by Jan. 17, 2025, or face severe penalties, said Richard Breavington, head of cyber and tech insurance at RPC.

More Trending

article thumbnail

US Broadens Indictments Against Russian Intelligence Hackers

Data Breach Today

Justice Department Adds Russian Intelligence Officers to Ukraine Hacking Indictment The United States announced a superseding indictment Thursday that adds five Russian military intelligence officers as defendants while warning that Kremlin cyberthreat actors continue to target U.S. and global critical infrastructure.

Military 182
article thumbnail

Earth Lusca adds multiplatform malware KTLVdoor to its arsenal

Security Affairs

The Chinese-speaking threat actor Earth Lusca used the new backdoor KTLVdoor in an attack against a trading company in China. Trend Micro Researchers spotted the Chinese-speaking threat actor Earth Lusca using a new multiplatform backdoor called KTLVdoor. The Earth Lusca group has been active since at least the first half of 2023, it primarily targeted organizations in Southeast Asia, Central Asia, and the Balkans.

IT 127
article thumbnail

Cryptohack Roundup: Focus on Pig Butchering

Data Breach Today

Also: Hacker Launders Stolen WazirX Funds; Galois, Uniswap Settlements This week, pig-butchering scams and bitcoin ATM scams increased, an update in the FTX case, stolen WazirX funds were laundered, settlements in the SEC-Galois and CFTC-Uniswap cases, Scotland seized crypto in a robbery, North Korea targeted Web3 staff, and the Mt. Gox CEO launched a new crypto firm.

182
182
article thumbnail

Phishing is Still the Top Initial Access Vector

KnowBe4

Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly.

Phishing 126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Former OpenAI Scientist's Startup Raises $1B Seed Funding

Data Breach Today

Ilya Sutskever Aims to Build Safe, Super-Intelligent AI A three-month-old startup promising safe artificial intelligence raised $1 billion in an all-cash deal in a seed funding round. Co-founded by former OpenAI Chief Scientist Ilya Sutskever, Safe Superintelligence will reportedly use the funds to acquire computing power.

article thumbnail

YubiKeys Are a Security Gold Standard—but They Can Be Cloned

WIRED Threat Level

Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack.

Security 121
article thumbnail

Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks

KnowBe4

A new attack runs slow and steady, focused on compromising large manufacturing companies using contextual social engineering to trick victims into giving up credentials.

article thumbnail

Why It's So Hard to Fully Block X in Brazil

WIRED Threat Level

With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks.

IT 114
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Tracelo Data Breach: 1.4 Million Records Exposed

eSecurity Planet

Data is the new gold, and breaches have become an unfortunate reality. A recent incident involving Tracelo, a popular smartphone geolocation tracking service, has exposed the personal information of over 1.4 million users. This breach, orchestrated by a hacker known as “Satanic,” highlights the vulnerability of even seemingly secure online platforms.

article thumbnail

Long Analysis of the M-209

Schneier on Security

Really interesting analysis of the American M-209 encryption device and its security.

article thumbnail

I changed these 5 TV settings to instantly improve the picture quality - and you can too

Collaboration 2.0

With a bit of patience and experimentation, you can tweak your TV's basic settings for a better viewing experience.

98
article thumbnail

How Do You Mitigate Information Security Risk?

IT Governance

Modify, share, avoid or retain? Risk management is fundamental to information security and the international standard for information security management, ISO 27001. Previously , our head of GRC (governance, risk and compliance) consultancy, Damian Garcia, explained where to start with cyber security risk management: establishing a common vocabulary.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

New AirPods are arriving next week. Here are the top 4 features I want to see

Collaboration 2.0

Industry insiders are confident Apple will announce new AirPods next week during the iPhone 16 launch. Although that's exciting to hear, there are a few things I'd like to see first.

98
article thumbnail

How to Use a VPN: Complete User Guide

eSecurity Planet

A VPN (Virtual Private Network) routes your internet traffic through an encrypted tunnel, shielding your data from hackers and ensuring your online activities remain private and secure. A VPN can provide the solution if you want to safeguard your personal information, bypass geo-restrictions, or maintain anonymity online. This guide will walk you through everything you need to know, from how to use a VPN on your Windows or Mac PC, why to use a VPN, and its most common uses and challenges.

article thumbnail

I found the AirTags that Android users have been waiting for

Collaboration 2.0

Chipolo's latest One and Card trackers are perfect for keys and wallets that have a habit of going astray.

98
article thumbnail

Digital Accounting: Mastering the Transition in 5 Simple Steps

Docuware

Digital accounting has transformed how businesses operate and manage their finances. The traditional methods of managing financial data through spreadsheets and manual input are shifting to keep up with the demands of modern-day technology. In this article, we discuss its role and identify the significance of integrating digital processes. We also highlight the benefits of digital accounting and provide you with the steps to take to harness the digital transition successfully.

IT 44
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The new Soundcore Space One Pro are smaller and mightier in all the right ways

Collaboration 2.0

Soundcore's new Space One Pro headphones boast eight hours of runtime after only a quick five-minute charge. When folded up, they are about the size of a donut.

98
article thumbnail

Mobility management: optimizing device workflows for retail

Jamf

Apple’s intuitive and secure mobile devices lead many retailers to iPads and iPhones for store associates. See how Jamf supports the unique operations and workflows needs of retail.

Retail 40
article thumbnail

Qualcomm's secret project with Samsung and Google is mixed reality smart glasses, and I'm glad

Collaboration 2.0

Qualcomm CEO Cristiano Amon confirmed with CNBC that the joint venture is now for a pair of glasses powered by your smartphone.

76
article thumbnail

Bill-72: New health data transfer legislation proposed in Canada

Data Protection Report

The Government of Canada recently introduced Bill-72, the Connected Care for Canadians Act (Act), to promote the secure transfer of health information and prevent data blocking. The Act is designed to support the government’s initiative to establish an interoperable healthcare system and will permit the Ministry of Health to establish new regulations, set up a system to receive complaints, verify compliance and apply administrative monetary penalties for non-compliance.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

I went hands-on with Lenovo's auto-swiveling laptop at IFA 2024, and it's quite the spectacle

Collaboration 2.0

Lenovo's latest Intel ThinkBooks can rotate 270 degrees and open and close on their own, raising some interesting questions -- good and bad.

IT 76
article thumbnail

Capture Webinars

Info Source

Capture Webinars Webinar Title Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Webinar Title Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

40
article thumbnail

I changed 10 settings on my Android phone to dramatically improve battery life

Collaboration 2.0

There are numerous ways to improve the battery life on your Android, but I've sifted through them all to highlight the most effective - plus an obvious bonus.

76