Fri.Oct 04, 2024

article thumbnail

Meta Hit Again With Targeted Advertising Limits In Europe

Data Breach Today

European Court of Justice Says Meta May Not Indefinitely Retain User Data Targeted advertising may face additional restrictions following a ruling by the top European Union court that social media giant Meta cannot indefinitely retain user data. Nor can it use data for advertising "without distinction as to type of data," the European Court of Justice said Friday.

IT 312
article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. The malicious code was used to drop cryptocurrency miners and proxyjacking software.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mass Retail Hacks Affect Adobe Commerce and Magento Stores

Data Breach Today

4,387 Online Merchants Compromised, Including Cisco and National Geographic Stores Thousands of online stores running Adobe Commerce and Magento software have been hacked since the summer and infected with digital payment skimmers by attackers targeting a vulnerability known as CosmicSting. While patched by Adobe in June, users also need to forcibly invalidate stolen credentials.

Retail 311
article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

Passwords 138
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Irish DPC Probes Ryanair Over Facial Recognition

Data Breach Today

Company Has Long Running Fight Against Fare Scrappers The Irish data regulator launched an investigation into Dublin-based ultra low-cost carrier Ryanair to identify potential privacy violations related to the company's use of third-party facial recognition technology, stepping into a running fight Ryainair has fought against online ticket sellers.

Privacy 308

More Trending

article thumbnail

Russia Arrests 100 in Cryptex Crypto Exchange Crackdown

Data Breach Today

US-Sanctioned Crypto Exchange Founder Sergey Ivanov Included in Sweeping Arrests Russia’s primary federal investigative agency announced a rare and sweeping investigation into the United States-sanctioned cryptocurrency exchange Cryptex and other platforms used to carry out illegal transactions and launder millions from ransomware groups.

article thumbnail

Financial Services Industry Experiences a Massive Increase in Brand Abuse

KnowBe4

Industry analysis of the domains used behind phishing and brand impersonation attacks show financial institutions are being leveraged at an alarming rate.

article thumbnail

Ivanti Confirms Exploitation of an Old Critical Vuln

Data Breach Today

Remote Code Execution Bug Exploited in Limited Attacks Ivanti confirmed that hackers are exploiting an SQL injection vulnerability in its Ivanti Endpoint Manager enabling remote code execution, despite the company addressing the issue with a patch in May. The flaw allows unauthenticated attackers within the same network to execute arbitrary code.

IT 300
article thumbnail

Infostealer Threat Group “Marko Polo” Evolving Into an “Empire”

KnowBe4

Detailed research by Recorded Future's threat research division, Insikt Group on the threat group Marko Polo demonstrates just how advanced the group’s.

114
114
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cloud Assumptions and Misconfigurations Threaten Healthcare Security

Data Breach Today

Common Cloud Assumptions and Takeaways for Healthcare Organizations As healthcare providers migrate their infrastructure and services to the cloud, they gain benefits such as increased flexibility, scalability and optimized patient data access and sharing. But misconceptions about cloud security are jeopardizing the security of electronic patient health information.

Cloud 299
article thumbnail

This Lenovo business laptop is seeing a nearly $1,000 discount on Amazon ahead of October Prime Day

Collaboration 2.0

The twelfth-generation Lenovo ThinkPad X1 Carbon is a solid pro-level laptop thanks to its Intel Ultra 7 CPU, lightweight design, and near bezel-less display. It's available on Amazon for 40% off its original price ahead of the Prime Big Deals Days sale.

Sales 98
article thumbnail

Security Needs to Be Simple and Secure By Default: Google

Data Breach Today

Google Pushes for Gen AI and Platformization to Counter Sophisticated Threats Google asserts that platformization and consolidation can help contain today's sophisticated threats. Embedding generative AI into security is also required as the industry moves from assisted AI to semi-autonomous and, eventually, to autonomous security, with the goal of security by default.

Security 298
article thumbnail

I bought the Google Pixel 9 Pro, and its most impressive feature was not the software

Collaboration 2.0

Google's Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out for me.

IT 98
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Illumio, ColorTokens, Cisco Lead Microsegmentation Rankings

Data Breach Today

Illumio, Akamai Stay Atop Forrester Wave, While ColorTokens, Cisco Join Leaderboard Illumio and Akamai remained atop Forrester's microsegmentation rankings, while ColorTokens and Cisco climbed into the leader space.The microsegmentation market has expanded beyond traditional on-premises networks to address modern public cloud workloads.

Marketing 295
article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Collaboration 2.0

Several new features are coming to Facebook, and they may help you explore your local community more.

97
article thumbnail

Medical Group Pays $240K Fine for 3 Ransomware Attacks

Data Breach Today

Nonprofit Group Hit 3 Times in 3 Weeks in 2018, Affecting PHI of 85,000 Patients Federal regulators have hit a California physician services organization with a $240,000 HIPAA civil penalty following an investigation into three ransomware attacks that occurred within a three-week span in early 2018, compromising the sensitive information of 85,000 patients.

article thumbnail

YouTube Shorts are changing in 5 unique ways, and I love the new creative freedom

Collaboration 2.0

YouTube is expanding the runtimes of its short-form content and giving users an easy way to remix their favorite clips.

IT 96
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Ex-CEO Adam Geller Returns to Product Leadership at Zscaler

Data Breach Today

Former Exabeam CEO Aims to Strengthen Data-Driven Strategy for Security Operations Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.

Security 284
article thumbnail

Advisor to the CJEU Confirms GDPR Fines For Subsidiary Infringements Should Reflect Group Turnover

Data Matters

On 12 September 2024, Advocate General Medina issued their Opinion in Case C-383/23 in which they confirmed that supervisory data protection authorities must, when calculating the fine for a GDPR infringement committed by a subsidiary, take into account the total annual turnover of the entire group—a concept known as parental liability. The post Advisor to the CJEU Confirms GDPR Fines For Subsidiary Infringements Should Reflect Group Turnover appeared first on Data Matters Privacy Blog.

GDPR 88
article thumbnail

Buy a Microsoft Office license for Mac or Windows for $25 right now

Collaboration 2.0

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 89% off.

Access 76
article thumbnail

Migrate EWS Apps to Microsoft Graph for Exchange Online in D365 Finance and Operations

Ascent Innovations

Migrate EWS Apps to Microsoft Graph for Exchange Online in D365 Finance and Operations Exchange Web Services (EWS) is a legacy protocol that has been in use since Exchange Server 2007. In August 2018, Microsoft announced that there won’t be any active investment in EWS APIs for Exchange Online. We recommend that you migrate your EWS apps that access Exchange Online to Microsoft Graph.

Access 52
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Best Prime Day impulse buys to shop in October 2024

Collaboration 2.0

The October Prime Day sale is coming. Discover the quirky side of Amazon deals for spontaneous joy and creative vibes.

Sales 76
article thumbnail

Warehouse Robotics Firm Dexory Raises £60 Million in Series B Funding

Information Matters

Dexory, a London-based startup developing autonomous robots for warehouse operations, has secured $80 million (£60 million) in a Series B funding round. The investment, a combination of equity and debt Read more The post Warehouse Robotics Firm Dexory Raises £60 Million in Series B Funding appeared first on Information Matters - AI in the UK.

article thumbnail

These discounted Meta Ray-Ban smart glasses are my favorite Prime Day deal so far

Collaboration 2.0

They may be refurbished, but ongoing feature updates and any form of discount make the Ray-Ban smart glasses worthy of your consideration.

75
article thumbnail

How to keep your CISO happy with IT during security audits

Jamf

Learn how to meet endpoint security compliance with Jamf and partners. Generate data that an auditor wants to see, and an audit that your CIO can be proud of.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

World Wide Web Foundation to close, as Berners-Lee shifts focus to Solid Protocol

Collaboration 2.0

The web's founder isn't stopping advocating for a safer, better web. He's just redirecting his energy.

76
article thumbnail

Migrating to Jamf Pro

Jamf

Learn how Abnormal Security migrated from Kandji to Jamf Pro. Discover the reasons, preparation, execution and key lessons for a successful MDM migration.

MDM 40
article thumbnail

The 4 biggest challenges of AI-generated code that Gartner left out of its latest report

Collaboration 2.0

Gartner says AI will require 80% of developers to upskill, but that's not the whole story. From buggy AI code to endless revisions, here's what wasn't mentioned in the report.

IT 75