Thu.Sep 05, 2024

article thumbnail

FEMA Has Begun Deploying Cyber Advisers to Disaster Zones

Data Breach Today

FEMA CIO: Cyber Advisers Provide Critical Security Guidance Amid Recovery Efforts Charles Armstrong, chief information officer of the Federal Emergency Management Agency, told the Billington Cybersecurity Summit his agency has begun deploying cyber advisors to disaster recovery zones to "rapidly and securely" build information technology and operational technology infrastructure.

article thumbnail

Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team

WIRED Threat Level

Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world.

Military 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaspersky US Customers Migrate to Pango's UltraAV After Ban

Data Breach Today

Kaspersky Hands Off 1 Million US Customers to UltraAV Amid Government Software Ban Kaspersky is transferring 1 million U.S. antivirus customers to Pango Group's UltraAV product following the Department of Commerce's ban on Kaspersky software sales or updates. The transition ensures users will continue to receive critical cybersecurity updates and services.

Sales 189
article thumbnail

Quishing, an insidious threat to electric car owners

Security Affairs

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent years, the spread of electric cars has led to an increase in public charging stations. However, new cyber threats have emerged with this growth, including “quishing.” This term, a combination of “QR Code” and “phishing,” describes a scam in which fraudsters use counterfeit QR Codes to steal sensitive information

Phishing 132
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Banks Brace for DORA Cybersecurity Deadline on Jan. 17

Data Breach Today

New EU Rules Focus on Operational Resilience, Breach Reporting and Third-Party Risk The Digital Operational Resilience Act aims to reshape the financial services industry by introducing strict cybersecurity standards. Financial institutions must comply with the new rules by Jan. 17, 2025, or face severe penalties, said Richard Breavington, head of cyber and tech insurance at RPC.

More Trending

article thumbnail

US Broadens Indictments Against Russian Intelligence Hackers

Data Breach Today

Justice Department Adds Russian Intelligence Officers to Ukraine Hacking Indictment The United States announced a superseding indictment Thursday that adds five Russian military intelligence officers as defendants while warning that Kremlin cyberthreat actors continue to target U.S. and global critical infrastructure.

Military 182
article thumbnail

We Hunted Hidden Police Signals at the DNC

WIRED Threat Level

Using special software, WIRED investigated police surveillance at the DNC. We collected signals from nearly 300,000 devices, revealing vulnerabilities for both law enforcement and everyday citizens alike.

Privacy 111
article thumbnail

Cryptohack Roundup: Focus on Pig Butchering

Data Breach Today

Also: Hacker Launders Stolen WazirX Funds; Galois, Uniswap Settlements This week, pig-butchering scams and bitcoin ATM scams increased, an update in the FTX case, stolen WazirX funds were laundered, settlements in the SEC-Galois and CFTC-Uniswap cases, Scotland seized crypto in a robbery, North Korea targeted Web3 staff, and the Mt. Gox CEO launched a new crypto firm.

182
182
article thumbnail

Earth Lusca adds multiplatform malware KTLVdoor to its arsenal

Security Affairs

The Chinese-speaking threat actor Earth Lusca used the new backdoor KTLVdoor in an attack against a trading company in China. Trend Micro Researchers spotted the Chinese-speaking threat actor Earth Lusca using a new multiplatform backdoor called KTLVdoor. The Earth Lusca group has been active since at least the first half of 2023, it primarily targeted organizations in Southeast Asia, Central Asia, and the Balkans.

IT 119
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Former OpenAI Scientist's Startup Raises $1B Seed Funding

Data Breach Today

Ilya Sutskever Aims to Build Safe, Super-Intelligent AI A three-month-old startup promising safe artificial intelligence raised $1 billion in an all-cash deal in a seed funding round. Co-founded by former OpenAI Chief Scientist Ilya Sutskever, Safe Superintelligence will reportedly use the funds to acquire computing power.

article thumbnail

Phishing is Still the Top Initial Access Vector

KnowBe4

Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly.

Phishing 109
article thumbnail

New AirPods are arriving next week. Here are the top 4 features I want to see

Collaboration 2.0

Industry insiders are confident Apple will announce new AirPods next week during the iPhone 16 launch. Although that's exciting to hear, there are a few things I'd like to see first.

98
article thumbnail

How Do You Mitigate Information Security Risk?

IT Governance

Modify, share, avoid or retain? Risk management is fundamental to information security and the international standard for information security management, ISO 27001. Previously , our head of GRC (governance, risk and compliance) consultancy, Damian Garcia, explained where to start with cyber security risk management: establishing a common vocabulary.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The new Soundcore Space One Pro are smaller and mightier in all the right ways

Collaboration 2.0

Soundcore's new Space One Pro headphones boast eight hours of runtime after only a quick five-minute charge. When folded up, they are about the size of a donut.

98
article thumbnail

Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks

KnowBe4

A new attack runs slow and steady, focused on compromising large manufacturing companies using contextual social engineering to trick victims into giving up credentials.

article thumbnail

I changed these 5 TV settings to instantly improve the picture quality - and you can too

Collaboration 2.0

With a bit of patience and experimentation, you can tweak your TV's basic settings for a better viewing experience.

98
article thumbnail

Why It's So Hard to Fully Block X in Brazil

WIRED Threat Level

With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks.

IT 75
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

I found the AirTags that Android users have been waiting for

Collaboration 2.0

Chipolo's latest One and Card trackers are perfect for keys and wallets that have a habit of going astray.

98
article thumbnail

Long Analysis of the M-209

Schneier on Security

Really interesting analysis of the American M-209 encryption device and its security.

article thumbnail

The rise and fall in programming languages' popularity since 2016 - and what it tells us

Collaboration 2.0

Our latest deep dive crunches the numbers from 2016 to 2024, revealing fascinating insights into the popularity of programming languages and how emerging trends and industry shifts have influenced developer preferences.

IT 76
article thumbnail

YubiKeys Are a Security Gold Standard—but They Can Be Cloned

WIRED Threat Level

Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

College students can get a free month of Perplexity Pro - here's why you'll want to

Collaboration 2.0

If enough students from your college sign up for this offer, everyone on your campus can get a free year of this popular AI tool. Plus, students can earn gift card rewards for referring others.

75
article thumbnail

How to Use a VPN: Complete User Guide

eSecurity Planet

A VPN (Virtual Private Network) routes your internet traffic through an encrypted tunnel, shielding your data from hackers and ensuring your online activities remain private and secure. A VPN can provide the solution if you want to safeguard your personal information, bypass geo-restrictions, or maintain anonymity online. This guide will walk you through everything you need to know, from how to use a VPN on your Windows or Mac PC, why to use a VPN, and its most common uses and challenges.

article thumbnail

Searching through your Google Photos is about to get a lot easier, thanks to AI

Collaboration 2.0

You can now fashion more descriptive queries to locate a photo. Plus, a new feature called Ask Photos will tap into AI to answer questions about your images. Here's how to get early access to it.

Access 98
article thumbnail

Mobility management: optimizing device workflows for retail

Jamf

Apple’s intuitive and secure mobile devices lead many retailers to iPads and iPhones for store associates. See how Jamf supports the unique operations and workflows needs of retail.

Retail 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Businesses still ready to invest in Gen AI, with risk management a top priority

Collaboration 2.0

According to a Salesforce study, 87% of C-suite executives say implementing AI technology is a top business priority, but 93% acknowledge barriers to adoption in their organizations.

Risk 98
article thumbnail

Bill-72: New health data transfer legislation proposed in Canada

Data Protection Report

The Government of Canada recently introduced Bill-72, the Connected Care for Canadians Act (Act), to promote the secure transfer of health information and prevent data blocking. The Act is designed to support the government’s initiative to establish an interoperable healthcare system and will permit the Ministry of Health to establish new regulations, set up a system to receive complaints, verify compliance and apply administrative monetary penalties for non-compliance.

article thumbnail

Shark's new vacuums promise the most hands-free cleaning experience yet

Collaboration 2.0

With IFA 2024 underway, Shark announced two new vacuums with PowerDetect technology, which automatically detects dirt levels, different flooring types, edges, and corners. Here's what else they can do.

75