Wed.Oct 02, 2024

article thumbnail

Cybercrime is Still Evil Incorporated, But Disruptions Help

Data Breach Today

Naming and Sanctioning Cybercrime Syndicate Members Has Repercussions, Police Say Western law enforcement may not be able to bust every last Russian cybercrime suspect, but newly revealed efforts against Evil Corp and LockBit reveal suspects arrested while on vacation, as well as the psychological fallout criminal syndicates face when members get named, indicted and sanctioned.

276
276
article thumbnail

News alert: Aembit appoints former Snowflake security director Mario Duarte as its new CISO

The Last Watchdog

Silver Spring, MD, Oct. 2, 2024, CyberNewswire — Aembit , the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly head of security at Snowflake, joins Aembit with a deep commitment to address pressing gaps in non-human identity security. Duarte’s journey in cybersecurity began with a passion for penetration testing, sparked by the 1980s cult classic film WarGames.

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Warnings Mount Over Fake North Korean IT Workers

Data Breach Today

German Domestic Intelligence Agency Says German Companies Have Fallen For Scam The German federal domestic intelligence agency is adding to warnings over North Korean IT workers obtaining remote work in Western tech companies. The world's most secretive and repressive regime looks for multiple ways to circumvent strict economic sanctions.

IT 276
article thumbnail

How Large Language Models Are Reshaping the Cybersecurity Landscape

Elie

This talk examine current real-world examples of AI-driven attacks and explore which defensive AI capabilities are available today.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Amazon CISO Amy Herzog on Embedding Security in Ring, Alexa

Data Breach Today

How Amazon Accelerates Product Development While Securing Customer Data Amy Herzog, chief information security officer for Ads and Devices at Amazon, shares how her cybersecurity team accelerates product development by integrating security from the start to secure customer data on popular consumer devices like Ring and Alexa.

Security 256

More Trending

article thumbnail

How Are We Going to Fill 4.8 Million Cybersecurity Jobs?

Data Breach Today

CISO Jon France on Talent Shortage, Skills Gap in ISC2's 2024 Workforce Study ISC2’s 2024 Cybersecurity Workforce Study warns of a stagnant workforce, a growing skills gap and a shortage of 4.8 million cybersecurity professionals worldwide. Despite increasing demand, many organizations struggle to fill critical roles, hindered by budget constraints and skills shortages.

article thumbnail

Dick’s Sporting Goods Cyber Attack Underscores Importance of Email Security and Internal Controls

KnowBe4

The recent cyber attack on Dick's Sporting Goods makes it clear that email played a critical role and emphasizes the need for better security controls.

Security 119
article thumbnail

UK ICO Fines Police Service Northern Ireland 750,000 Pounds

Data Breach Today

A 2023 Breach Exposed Personal Details of All PSNI Officers and Staff The U.K. data regulator the Police Service for Northern Ireland 750,000 pounds following a 2023 data breach that exposed personal details of the entire workforce. The U.K. Information Commissioner's Office determined the breach occurred when police attempted to respond to two open records requests.

article thumbnail

14 New DrayTek routers’ flaws impacts over 700,000 devices in 168 countries

Security Affairs

Multiple flaws in DrayTek residential and enterprise routers can be exploited to fully compromise vulnerable devices. Forescout researchers discovered 14 new vulnerabilities in DrayTek routers, two of which have been rated as critical. Of the 14 security flaws nine are rated high, and three are rated medium in severity. The flaws impact residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices.

IoT 97
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Global Governments Release New Ransomware Response Guidance

Data Breach Today

Counter Ransomware Group Focuses on Timely Reporting, Avoiding Paying the Ransom New voluntary ransomware guidance released during the International Counter Ransomware Initiative meeting this week calls for victims to report attacks to law enforcement on a more timely basis - and involve more advisors in deciding whether to pay a ransom.

article thumbnail

Rhadamanthys information stealer introduces AI-driven capabilities

Security Affairs

The Rhadamanthys information stealer has been upgraded with advanced features, including the use of artificial intelligence (AI) for optical character recognition (OCR). Researchers at the Recorded Future’s Insikt group have documented the evolution of the Rhadamanthys info stealer. The malware was first identified in 2022, and since then it has been upgraded with advanced features, the latest version 0.7.0 introduces AI-driven capabilities for extracting cryptocurrency seed phrases from i

article thumbnail

OpenAI Valuation Nearly Doubles to $157B After $6.6B Funding

Data Breach Today

Thrive Capital, Microsoft, SoftBank, Nvidia Reportedly Lead OpenAI's Latest Funding OpenAI’s new $6.6 billion round of funding has nearly doubled its valuation to $157 billion. With investments from Thrive Capital, Microsoft, SoftBank and Nvidia, OpenAI plans to expand its AI research while facing pressures around executive turnover and its transition away from a nonprofit model.

IT 161
article thumbnail

From Desire Paths to Security Highways: Lessons from Disney's Approach to User-Centric Design

KnowBe4

When Walt Disney first unveiled the Magic Kingdom, he made a decision that would revolutionize theme park design - and inadvertently offer a valuable lesson for cybersecurity professionals.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

US DOJ Unveils New Strategic Approach to Counter Cybercrime

Data Breach Today

Justice Department Releases Cybercrime Plan, Focusing on Global Partnerships The United States Justice Department is coordinating its cybercrime defense mission under a new strategic approach released Wednesday that aims to enhance the collection of electronic evidence, bolster international collaboration and focus on disrupting significant cybercrime actors.

IT 161
article thumbnail

Critical Zimbra Postjournal flaw CVE-2024-45519 actively exploited in the wild. Patch it now!

Security Affairs

Threat actors attempt to exploit recently disclosed vulnerability CVE-2024-45519 in Synacor’s Zimbra Collaboration. Proofpoint cybersecurity researchers reported that threat actors are attempting to exploit a recently disclosed vulnerability, tracked as CVE-2024-45519, in Synacor’s Zimbra Collaboration. Starting on September 28, 2024, threat actors have been attempting to exploit the issue to achieve remote code execution on vulnerable instances.

IT 89
article thumbnail

Hawaii Clinic Notifies 124,000 of Hack Credited to Lockbit

Data Breach Today

Data Leak Preceded Law Enforcement Crackdown on Group That Targets Health Sector A clinic in Hawaii is notifying 124,000 patients that their health data was potentially compromised in a May hack. Lockbit 3.0 claims to have published the stolen records on its data leak site in June - months before global authorities this week disclosed a crackdown on the cybercrime gang.

IT 161
article thumbnail

The U.K.'s NCSC and U.S. FBI Warn of Iranian Spear-Phishing Attacks

KnowBe4

The U.K.’s National Cyber Security Centre (NCSC) and the U.S. FBI have released an advisory warning of Iranian state-sponsored spear-phishing attacks targeting “individuals with a nexus to Iranian and Middle Eastern affairs, such as current or former senior government officials, senior think tank personnel, journalists, activists, and lobbyists.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

OpenAI's New Model is Berry Good at Deception

Data Breach Today

Strawberry Can Also Assist with Making Weapons that Wipe Out Humans OpenAI claims its new artificial intelligence model, designed to "think" and "reason," can solve linguistic and logical problems that stump existing models. Officially called o1, the model nicknamed Strawberry can deceiving users and help make weapons that can obliterate the human race.

article thumbnail

The budget Android tablet I recommend has a display that looks double the price

Collaboration 2.0

Blackview's Mega 1 is an 11.5-inch Android 13 tablet with a brilliant 120Hz display and 24GB of RAM at a surprisingly miniscule price point.

98
article thumbnail

Police arrested four new individuals linked to the LockBit ransomware operation

Security Affairs

An international police operation led to the arrest of four individuals linked to the LockBit ransomware group, including a developer. Europol, the UK, and the US law enforcement authorities announced a new operation against the LockBit ransomware gang. The police arrested an alleged LockBit developer at France’s request while vacationing outside Russia and two individuals in the UK for supporting a LockBit affiliate.

article thumbnail

California AI Safety Bill Vetoed

Schneier on Security

Governor Newsom has vetoed the state’s AI safety bill. I have mixed feelings about the bill. There’s a lot to like about it, and I want governments to regulate in this space. But, for now, it’s all EU. (Related, the Council of Europe treaty on AI is ready for signature. It’ll be legally binding when signed, and it’s a big deal.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

U.S. CISA adds Ivanti Endpoint Manager (EPM) flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Endpoint Manager (EPM) vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Ivanti Virtual Traffic Manager authentication bypass vulnerability CVE-2024-29824 (CVSS score of 9.6) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 83
article thumbnail

Ring finally adds 24/7 continuous recording to some subscription plans

Collaboration 2.0

The home security company introduces several more cool features to its Ring Protect Plan - now rebranded to Ring Home.

article thumbnail

KuppingerCole Names Thales a Leader in the Passwordless Authentication Market

Thales Cloud Protection & Licensing

KuppingerCole Names Thales a Leader in the Passwordless Authentication Market madhav Thu, 10/03/2024 - 06:26 The KuppingerCole Leadership Compass for Enterprises has recognized Thales OneWelcome as an Overall, Innovation, Product, and Market Leader in the Passwordless Authentication market. Analysts praise the platform for offering a versatile set of features designed to facilitate passwordless experiences for all user groups.

article thumbnail

Businesses can reach decision dominance using AI. Here's how

Collaboration 2.0

How can a company assess faster and more effectively than its competitors? The answer is spelled SUDA - the ability to Sense, Understand, Decide, Act. Here's how it works in an AI powered economy.

IT 75
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Supply chain visibility: 3 reasons tech investments fail to deliver ROI  

OpenText Information Management

Supply chain visibility is a key focus area for many organizations. Therefore, it’s no wonder that visibility, monitoring, analytics, and forecasting tools continue to be at the top of the list when it comes to supply chain technology investments. Despite companies understanding the importance of visibility and investing in tools to improve it, the results have not been great.

article thumbnail

Buy a Samsung Galaxy A35 and get a free pair of Buds FE ahead of October Prime Day

Collaboration 2.0

Amazon's October Prime Day is just around the corner, and Samsung is offering an excellent bundle deal: if you buy a Galaxy A35 smartphone, you'll get a pair of Buds FE earbuds for free -- and who doesn't love free stuff?

75
article thumbnail

OpenText Threat Intelligence™ (BrightCloud): Empowering proactive cyber defense 

OpenText Information Management

In today’s rapidly evolving, AI-driven cybersecurity landscape, threats are growing more sophisticated by the day. To stay ahead of the curve—whether you are a networking, endpoint security, cloud services, or cybersecurity provider—choosing the right threat intelligence partner can secure and enhance your offerings, differentiate your products, and provide the premium solutions your customers demand.