Wed.Oct 09, 2024

article thumbnail

US DOJ Developing Guidelines for AI Use in Law Enforcement

Data Breach Today

Justice Department Aiming to Emphasize Privacy and Security in AI Deployment The U.S. Department of Justice is drafting new guidelines for law enforcement on the use of artificial intelligence and facial recognition tools to enhance public safety while safeguarding civil rights and ensuring ethical deployment, a senior official said Wednesday.

article thumbnail

Lamborghini Carjackers Lured by $243M Cyberheist

Krebs on Security

The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later — while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.

Paper 267
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia May Require Businesses to Report Ransom Payments

Data Breach Today

Cyber Bill Says the Government Can't Use Information to Prosecute Victims Ransom payments are typically tightly held secrets between cybercriminals and their victims, but the Australian government has introduced a cybersecurity bill in Parliament that would require require larger businesses to report ransom payments to the government.

article thumbnail

Internet Archive Breach Exposes 31 Million Users

WIRED Threat Level

The hack exposed the data of 31 million users as the embattled Wayback Machine maker scrambles to stay online and contain the fallout of digital—and legal—attacks.

Archiving 143
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Marriott Pays $52M to Settle US States Data Breach Litigation

Data Breach Today

Hotel Chain Also Settles with Federal Trade Commission The world's largest hotel chain agreed Wednesday to pay $52 million and agree to two decades of third-party monitoring of its cybersecurity program to settle a rash of data breaches affecting millions of guests. The multi-million payout is part of a settlement reached with 50 U.S. attorneys general.

More Trending

article thumbnail

Human Security Raises $50M+ to Take on Click-Fraud Defense

Data Breach Today

WestCap-Led Funding to Drive Click-Fraud Protection, Ad Integrity Expansion Human Security's recent $50 million growth funding, led by WestCap, will drive the development of click-fraud defense and enhance advertising integrity solutions. CEO Stu Solomon aims to leverage the funding for scaling the engineering and data science teams, addressing emerging fraud threats.

article thumbnail

69,000 Bitcoins Are Headed for the US Treasury—While the Agent Who Seized Them Is in Jail

WIRED Threat Level

The $4.4 billion in crypto is set to be the largest pile of criminal proceeds ever sold off by the US. The former IRS agent who seized the recording-breaking sum, meanwhile, languishes in a Nigerian jail cell.

article thumbnail

County 911 Service Notifying 180,000 About Breach in July

Data Breach Today

Compromised Patient Info Dates Back to 2011 at Muskogee City County 911 Service An Oklahoma county provider of medical, fire, police and other 911 emergency services is notifying 180,000 individuals that their health information may have been compromised in a recent ransomware attack. The incident affects patients receiving emergency medical care as far back as 2011.

article thumbnail

Palo Alto fixed critical flaws in PAN-OS firewalls that allow for full compromise of the devices

Security Affairs

Palo Alto fixed critical flaws in PAN-OS firewalls, warning that attackers could chain these vulnerabilities to hijack the devices. Palo Alto Networks addressed multiple vulnerabilities that an attacker can chain to hijack PAN-OS firewalls. The vulnerabilities reside in the Palo Alto Networks’ Expedition solution, which is a migration tool designed to help organizations move configurations from other firewall platforms (like Check Point, Cisco, and others) to Palo Alto’s PAN-OS. R

Passwords 135
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

UK to Continue Disruptive Actions Targeting Cybercrime

Data Breach Today

Stephen Doughty Says Cybersecurity Vital to National And Economic Security The British government will continue disruptive actions against ransomware and malware operators, a top U.K. government official vowed Wednesday. Stephen Doughty, Minister of State, said the recently elected U.K. government views security as a core pillar of economic and strategic growth.

article thumbnail

Secure Your World with Phishing Resistant Passkeys

Thales Cloud Protection & Licensing

Secure Your World with Phishing Resistant Passkeys madhav Thu, 10/10/2024 - 05:12 As we celebrate Cybersecurity Awareness Month 2024 with the theme "Secure Our World," exploring innovative technologies is crucial to help us achieve this goal. One such advancement that's revolutionizing online security and user authentication is passkeys. Passkeys represent a significant leap forward in creating a safer digital landscape, aligning perfectly with the mission to secure our world.

Phishing 133
article thumbnail

Career Spotlight: The Growing Demand for OT Security Experts

Data Breach Today

Critical Infrastructure Firms Are Hiring - and Paying Well As digital transformation continues to reshape industries, the convergence of operational technology and cybersecurity has emerged as a critical area of focus. But there's a noticeable gap in the workforce. Professionals who truly understand both OT and cybersecurity are in short supply.

article thumbnail

Cybercriminals Are Targeting AI Conversational Platforms

Security Affairs

Resecurity reports a rise in attacks on AI Conversational platforms, targeting chatbots that use NLP and ML to enable automated, human-like interactions with consumers. Resecurity has observed a spike in malicious campaigns targeting AI agents and Conversational AI platforms that leverage chatbots to provide automated, human-like interactions for consumers.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Malicious Pixels: Criminals Revamp QR Code Phishing Attacks

Data Breach Today

Attackers Use ASCII Characters to Create Tough-to-Spot QR Codes, Barracuda Warns Attackers are moving beyond using QR code images added to phishing emails to trick victims into visiting malicious sites, and using ASCII "full block" characters to build working QR codes designed to evade optical character recognition defenses, warns cybersecurity firm Barracuda Networks.

Phishing 285
article thumbnail

Awaken Likho APT group targets Russian government with a new implant

Security Affairs

A threat actor tracked as Awaken Likho is targeting Russian government agencies and industrial entities, reported cybersecurity firm Kaspersky. A recent investigation by Kaspersky researchers into the APT group Awaken Likho (aka Core Werewolf and PseudoGamaredon) uncovered a new campaign from June to August 2024, showing a shift from UltraVNC to the MeshCentral platform for remote access.

article thumbnail

Ivanti CSA Customers Targeted in New Zero Day Attacks

Data Breach Today

Attackers Chain Three Security Flaws with Patched Admin Bypass Vulnerability Internet appliance maker Ivanti warned customers Tuesday that attackers are actively exploiting new vulnerabilities in Cloud Services Appliance instances by chaining three security flaws with a zero-day patched in September. The company advised customers to update to version 5.0.

Cloud 271
article thumbnail

Hurricane Deepfakes Flood Social Media

KnowBe4

As the recent hurricane Helene caused major damage and as hurricane Milton is expected to make landfall in Florida soon, deepfakes are spreading misinformation on social media.

119
119
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Top Trends in the European Digital Health/AI Market

Data Matters

Digital health AI technologies are transforming the advancement of drug development and healthcare delivery at an unprecedented speed, backed by governments facilitating the momentum to improve healthcare for their growing populations. Sidley’s European life sciences lawyers Josefine Sommer, Eva von Mühlenen, and Francesca Blythe share a timely take on the top 5 life sciences industry trends being shaped by pioneering digital technologies.

article thumbnail

Nearly half off a Samsung 75-inch QLED TV? October Prime Day offers just that

Collaboration 2.0

Samsung's Neo QLED 4K TV is 44% off during Amazon Prime Day 2. But hurry, because this deal will likely expire tonight.

87
article thumbnail

Auto-Identification Smart Glasses

Schneier on Security

Two students have created a demo of a smart-glasses app that performs automatic facial recognition and then information lookups. Kind of obvious, but the sort of creepy demo that gets attention. News article.

78
article thumbnail

If you're a Marriott customer, FTC says the breach-plagued hotel chain owes you

Collaboration 2.0

Following a settlement with the FTC, the hotel chain must implement a host of security changes and provide help to customers affected by the string of data breaches.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Best Secure Remote Access Software of 2025

eSecurity Planet

Remote access software can help you securely connect to your devices from wherever you may be. This can be helpful for both employees on the go and IT professionals trying to fix a coworker’s computer struggles while several hundred miles apart. This can be great for companies that employ many remote workers and want to secure their IT environment better.

Access 63
article thumbnail

Starlink's Hurricane relief offer is not quite as free as advertised

Collaboration 2.0

It sounded good, but a closer look revealed that SpaceX's Starlink free offer isn't much more than clever marketing.

article thumbnail

Top Security Configuration Management Tools: Features & Comparisons

eSecurity Planet

According to research house Statista, DevOps and DevSecOps were the most prevalent software development environments used worldwide, combining for 47 percent of implementations in a 2022 survey. Configuration management tools are key to delivering the DevOps promise of shortened development windows and a pipeline of continuous integration and continuous deployment (CI/CD).

article thumbnail

How to set up and and use your phone's lifesaving emergency features

Collaboration 2.0

Satellite messaging and emergency contact details are lifesaving features found in modern smartphones.

76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Fun, Fun, Funeral

Information Governance Perspectives

Intimate Views Into The American Family Scotty sensed he wasn’t his parents’ biological son from early on but was discouraged from seeking answers That hideous beast. It murdered my best friend on New Year’s Eve, leaving his bruised, punctured corpse to rot all week on the floor of a Malibu drug den. He died steps from the same sandy beach where, as blood brothers with matching bowl cuts and our third-grade imaginations, we’d once frolicked morning to night, burying treasures at the foot of a ro

ROT 52
article thumbnail

How to use your iPhone's emergency satellite features if you lose cell coverage

Collaboration 2.0

On the iPhone 14 and up, Apple offers three features that can help you communicate with emergency services - and loved ones - via satellite if you're caught without cell or Wi-Fi coverage.

article thumbnail

Fun, Fun, Funeral

Information Governance Perspectives

Intimate Views Into The American Family Scotty sensed he wasn’t his parents’ biological son from early on but was discouraged from seeking answers. That hideous beast. It murdered my best friend on New Year’s Eve, leaving his bruised, punctured corpse to rot all week on the floor of a Malibu drug den. He died steps from the same sandy beach where, as blood brothers with matching bowl cuts and our third-grade imaginations, we’d once frolicked morning to night, burying treasures at the foot of a r

ROT 52