Fri.Oct 04, 2024

article thumbnail

Meta Hit Again With Targeted Advertising Limits In Europe

Data Breach Today

European Court of Justice Says Meta May Not Indefinitely Retain User Data Targeted advertising may face additional restrictions following a ruling by the top European Union court that social media giant Meta cannot indefinitely retain user data. Nor can it use data for advertising "without distinction as to type of data," the European Court of Justice said Friday.

IT 310
article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. The malicious code was used to drop cryptocurrency miners and proxyjacking software.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Assumptions and Misconfigurations Threaten Healthcare Security

Data Breach Today

Common Cloud Assumptions and Takeaways for Healthcare Organizations As healthcare providers migrate their infrastructure and services to the cloud, they gain benefits such as increased flexibility, scalability and optimized patient data access and sharing. But misconceptions about cloud security are jeopardizing the security of electronic patient health information.

Cloud 298
article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

Passwords 133
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Mass Retail Hacks Affect Adobe Commerce and Magento Stores

Data Breach Today

4,387 Online Merchants Compromised, Including Cisco and National Geographic Stores Thousands of online stores running Adobe Commerce and Magento software have been hacked since the summer and infected with digital payment skimmers by attackers targeting a vulnerability known as CosmicSting. While patched by Adobe in June, users also need to forcibly invalidate stolen credentials.

Retail 304

More Trending

article thumbnail

Security Needs to Be Simple and Secure By Default: Google

Data Breach Today

Google Pushes for Gen AI and Platformization to Counter Sophisticated Threats Google asserts that platformization and consolidation can help contain today's sophisticated threats. Embedding generative AI into security is also required as the industry moves from assisted AI to semi-autonomous and, eventually, to autonomous security, with the goal of security by default.

Security 295
article thumbnail

This Lenovo business laptop is seeing a nearly $1,000 discount on Amazon ahead of October Prime Day

Collaboration 2.0

The twelfth-generation Lenovo ThinkPad X1 Carbon is a solid pro-level laptop thanks to its Intel Ultra 7 CPU, lightweight design, and near bezel-less display. It's available on Amazon for 40% off its original price ahead of the Prime Big Deals Days sale.

Sales 98
article thumbnail

Medical Group Pays $240K Fine for 3 Ransomware Attacks

Data Breach Today

Nonprofit Group Hit 3 Times in 3 Weeks in 2018, Affecting PHI of 85,000 Patients Federal regulators have hit a California physician services organization with a $240,000 HIPAA civil penalty following an investigation into three ransomware attacks that occurred within a three-week span in early 2018, compromising the sensitive information of 85,000 patients.

article thumbnail

This Video Game Controller Has Become the US Military’s Weapon of Choice

WIRED Threat Level

After decades of relying on buttons, switches, and toggles, the Pentagon has embraced simple, ergonomic video-game-style controllers already familiar to millions of potential recruits.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Irish DPC Probes Ryanair Over Facial Recognition

Data Breach Today

Company Has Long Running Fight Against Fare Scrappers The Irish data regulator launched an investigation into Dublin-based ultra low-cost carrier Ryanair to identify potential privacy violations related to the company's use of third-party facial recognition technology, stepping into a running fight Ryainair has fought against online ticket sellers.

Privacy 289
article thumbnail

Financial Services Industry Experiences a Massive Increase in Brand Abuse

KnowBe4

Industry analysis of the domains used behind phishing and brand impersonation attacks show financial institutions are being leveraged at an alarming rate.

article thumbnail

Illumio, ColorTokens, Cisco Lead Microsegmentation Rankings

Data Breach Today

Illumio, Akamai Stay Atop Forrester Wave, While ColorTokens, Cisco Join Leaderboard Illumio and Akamai remained atop Forrester's microsegmentation rankings, while ColorTokens and Cisco climbed into the leader space.The microsegmentation market has expanded beyond traditional on-premises networks to address modern public cloud workloads.

Marketing 278
article thumbnail

I bought the Google Pixel 9 Pro, and its most impressive feature was not the software

Collaboration 2.0

Google's Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out for me.

IT 98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Russia Arrests 100 in Cryptex Crypto Exchange Crackdown

Data Breach Today

US-Sanctioned Crypto Exchange Founder Sergey Ivanov Included in Sweeping Arrests Russia’s primary federal investigative agency announced a rare and sweeping investigation into the United States-sanctioned cryptocurrency exchange Cryptex and other platforms used to carry out illegal transactions and launder millions from ransomware groups.

article thumbnail

Infostealer Threat Group “Marko Polo” Evolving Into an “Empire”

KnowBe4

Detailed research by Recorded Future's threat research division, Insikt Group on the threat group Marko Polo demonstrates just how advanced the group’s.

94
article thumbnail

Ivanti Confirms Exploitation of an Old Critical Vuln

Data Breach Today

Remote Code Execution Bug Exploited in Limited Attacks Ivanti confirmed that hackers are exploiting an SQL injection vulnerability in its Ivanti Endpoint Manager enabling remote code execution, despite the company addressing the issue with a patch in May. The flaw allows unauthenticated attackers within the same network to execute arbitrary code.

IT 277
article thumbnail

YouTube Shorts are changing in 5 unique ways, and I love the new creative freedom

Collaboration 2.0

YouTube is expanding the runtimes of its short-form content and giving users an easy way to remix their favorite clips.

IT 96
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Ex-CEO Adam Geller Returns to Product Leadership at Zscaler

Data Breach Today

Former Exabeam CEO Aims to Strengthen Data-Driven Strategy for Security Operations Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.

Security 264
article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Collaboration 2.0

Several new features are coming to Facebook, and they may help you explore your local community more.

97
article thumbnail

Migrate EWS Apps to Microsoft Graph for Exchange Online in D365 Finance and Operations

Ascent Innovations

Migrate EWS Apps to Microsoft Graph for Exchange Online in D365 Finance and Operations Exchange Web Services (EWS) is a legacy protocol that has been in use since Exchange Server 2007. In August 2018, Microsoft announced that there won’t be any active investment in EWS APIs for Exchange Online. We recommend that you migrate your EWS apps that access Exchange Online to Microsoft Graph.

Access 52
article thumbnail

My favorite USB-C accessory of all time got a magnetic upgrade (and it's 30% off)

Collaboration 2.0

USB-C ports can be fragile, and a ripped cord can seriously damage your laptop. This clever MagSafe-like gadget keeps your laptop safe, and is on sale ahead of October Prime Day.

Sales 75
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Warehouse Robotics Firm Dexory Raises £60 Million in Series B Funding

Information Matters

Dexory, a London-based startup developing autonomous robots for warehouse operations, has secured $80 million (£60 million) in a Series B funding round. The investment, a combination of equity and debt Read more The post Warehouse Robotics Firm Dexory Raises £60 Million in Series B Funding appeared first on Information Matters - AI in the UK.

article thumbnail

The 4 biggest challenges of AI-generated code that Gartner left out of its latest report

Collaboration 2.0

Gartner says AI will require 80% of developers to upskill, but that's not the whole story. From buggy AI code to endless revisions, here's what wasn't mentioned in the report.

IT 98
article thumbnail

S.U.P.E.R.M.A.N. III

Jamf

In this JNUC session, MacAdmins learn about the S.U.P.E.R.M.A.N. app and how it can make short work of even the most complex macOS update and upgrade workflows. Plus, how to deploy it via Jamf Pro for greater, automated control over enterprise OS update/upgrade projects.

IT 40
article thumbnail

One of the best entry-level portable batteries I've tested is $100 off for October Prime Day

Collaboration 2.0

If you're looking for a lightweight, portable battery that'll get you out of a pinch without breaking the bank, check out the EcoFlow River 3, especially at only $159 ahead of October Prime Day.

75
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

S.U.P.E.R.M.A.N. III

Jamf

In this JNUC session, MacAdmins learn about the S.U.P.E.R.M.A.N. app and how it can make short work of even the most complex macOS update and upgrade workflows. Plus, how to deploy it via Jamf Pro for greater, automated control over enterprise OS update/upgrade projects.

IT 40
article thumbnail

The most immersive speaker system I've ever tested is now on sale at Best Buy

Collaboration 2.0

The SteelSeries Arena 9 can connect with up to three devices simultaneously, making it an excellent choice for multi-use media spaces. And it's on sale now during Best Buy's competing Prime Day event.

Sales 75
article thumbnail

How to keep your CISO happy with IT during security audits

Jamf

Learn how to meet endpoint security compliance with Jamf and partners. Generate data that an auditor wants to see, and an audit that your CIO can be proud of.