Thu.Oct 10, 2024

article thumbnail

News alert: SpyCloud accelerates supply chain risk analysis with new ‘IDLink’ correlation capability

The Last Watchdog

Austin, TX, Oct. 10th, 2024, CyberNewswire — SpyCloud, the leader in Identity Threat Protection, announced that its SaaS Investigations solution has been enhanced with identity analytics that illuminate the scope of digital identities and accelerate successful outcomes of complex investigations from days or hours to minutes. SpyCloud Investigations is a powerful cybercrime and identity threat investigation solution used by analysts and investigators to discover and act on threats by naviga

Risk 285
article thumbnail

Marriott Pays $52M to Settle US States' Breach Litigation

Data Breach Today

World's Biggest Hotel Chain Also Settles with Federal Trade Commission The world's largest hotel chain agreed Wednesday to pay $52 million and submit to 20 years of third-party monitoring of its cybersecurity program to settle a rash of data breaches affecting millions of guests. The sizeable payout is part of a settlement reached with 50 U.S. attorneys general.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unstructured Data Defense: Navigating AI Compliance and Secure Data Architecture

AIIM

At the AIIM Information and Data Leadership Symposium on October 1, 2024, in Arlington, VA, James Crifasi (COO & CTO, RedZone Technologies) and Jay Leask (Principal Technical Architect, Microsoft) engaged in a fascinating discussion about defending and protecting unstructured data.

article thumbnail

How AI Shields Enterprises from Advanced Email Attacks

Data Breach Today

SEGs have performed admirably for many years, but they’re no match for this new generation of email attacks, and relying on outdated tools can have catastrophic consequences. By upgrading to a behavioral AI-based solution, you can defend against emerging threats and become more proactive in the fight against cybercrime.

258
258
article thumbnail

The Tumultuous IT Landscape is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Deebot Robot Vacuums Are Using Photos and Audio to Train Their AI

Schneier on Security

An Australian news agency is reporting that robot vacuum cleaners from the Chinese company Deebot are surreptitiously taking photos and recording audio, and sending that data back to the vendor to train their AIs. Ecovacs’s privacy policy— available elsewhere in the app —allows for blanket collection of user data for research purposes, including: The 2D or 3D map of the user’s house generated by the device Voice recordings from the device’s microphone Photos or vide

Privacy 112

More Trending

article thumbnail

Mozilla issued an urgent Firefox update to fix an actively exploited flaw

Security Affairs

Mozilla released an urgent Firefox update to fix a critical use-after-free vulnerability actively exploited in ongoing attacks. Mozilla released an emergency security update for its Firefox browser to address a critical use-after-free vulnerability, tracked as CVE-2024-9680, that is actively exploited in attacks. The vulnerability CVE-2024-9680 resides in Animation timelines.

Security 110
article thumbnail

Relyance AI Raises $32M to Take on AI Governance Challenges

Data Breach Today

Thomvest Ventures Leads Series B Funding to Support Privacy and Security Compliance Relyance AI raised $32 million in Series B funding to grow its data governance platform. The funds will be used to scale operations, enhance real-time data visibility, and support enterprises in complying with complex global privacy regulations, ensuring responsible AI adoption across industries.

article thumbnail

E-skimming campaign uses Unicode obfuscation to hide the Mongolian Skimmer

Security Affairs

Jscrambler researchers found a skimming campaign using unique JavaScript obfuscation with accented characters to hide a skimmer named Mongolian Skimmer. Jscrambler researchers uncovered a skimming campaign using unique JavaScript obfuscation with accented characters to hide a skimmer dubbed ‘Mongolian Skimmer.’ The attackers used unusual Unicode characters for variables and function names.

article thumbnail

How CKW Is Building a Smart Energy Grid

Data Breach Today

CKW's Yann Gosteli on Optimizing Communication Networks With Future-Proof Tech Swiss utility giant Centralschweizerische Kraftwerke has transformed its legacy operational communication network with a hybrid multiservice platform. Yann Gosteli, head of secondary systems at CKW, shares how the company has built an operationally efficient network infrastructure.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The Lenovo laptop I recommend for hybrid workers is still $1,000 off

Collaboration 2.0

Lenovo's ThinkPad X1 Carbon is a pro-level laptop with a light design and near-bezel-less display, and it's still 40% off following Amazon's October Prime Day.

IT 98
article thumbnail

Operation Cronos Is Disrupting LockBit, Says UK Official

Data Breach Today

Impact is "What We Would Have Hoped For, Says NCSC CTO Ollie Whitehouse A British cybersecurity official touted Operation Cronos, an international operation against LockBit, saying multiple strikes aimed at the ransomware-as-a-service have disrupted its ability to recruit hackers. The operation has resulted in indictments, sanctions, and server takedowns.

article thumbnail

How to use Gemini to generate higher-quality AI images now - for free

Collaboration 2.0

Upgrading its capabilities to Imagen 3, Google Gemini's new skills are accessible to both free and paid users. Here are 3 ways to try them today.

Access 98
article thumbnail

SSA Struggling to Modernize Fraud Prevention Tech, GAO Warns

Data Breach Today

GAO: SSA Fails to Meet Industry and Federal Electronic Verification System Goals The Social Security Administration is facing criticism for failing to update its fraud prevention technology, leaving financial institutions and federal authorities at risk of missing synthetic identity scams, according to a new Government Accountability Office report.

Risk 210
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

I recycled all my USB-C cables minutes after trying out this wireless charger

Collaboration 2.0

Twelve South's HiRise 2 Deluxe wireless charger is a sophisticated charging solution for two devices at once.

98
article thumbnail

Cryptohack Roundup: Australia Nabs Crypto in Ghost Takedown

Data Breach Today

Also: Taiwan AML Rules, IcomTech Sentencing This week, Australia seized crypto from alleged Ghost mastermind, Taiwan drafts new AML rules, IcomTech founder sentenced, U.S. looks to recover stolen crypto, EigenLayer's erroneous fund transfer, FTX's bankruptcy plan approved, Bitfinex hack update and regulatory push for a lawsuit against Nvidia.

207
207
article thumbnail

How to encrypt a file on Linux, MacOS, and Windows - and why

Collaboration 2.0

Have a private document on your desktop OS? Here's how to keep it secure on Linux, MacOS, and Windows.

article thumbnail

Breach Roundup: Gobal Signal Exchange to Curb Online Fraud

Data Breach Today

Also: A Fidelity Breach, Mamba Phishing This week, the Global Signal Exchange hopes to dent online crime, a Fidelity data breach, phishing platform targets Microsoft 365 users, October Patch Tuesday, Pavel Durov said he's always cooperated with police, Highline Public Schools and CreditRiskMonitor updates, ADT and Casio suffered breaches

Phishing 199
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

U.S. CISA adds Ivanti CSA and Fortinet bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti CSA and Fortinet bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-23113 Fortinet Multiple Products Format String Vulnerability CVE-2024-9379 Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability CVE-2024-9380 Ivanti Cloud Services Appliance (

IT 72
article thumbnail

European Council Adopts Cyber Resilience Act

Data Breach Today

Act Imposes Mandatory Patching for IoT Devices The European Council adopted Thursday security-by-design regulation that makes patching and vulnerability updates mandatory for connected devices. The regulation will ensure that "products with digital components are made secure throughout the supply chain and throughout their lifecycle.

IoT 193
article thumbnail

OpenText™ Cybersecurity 2024 Global Ransomware Survey: Supply chain and AI-powered attack fears intensify

OpenText Information Management

Whether a small business or a large enterprise, all organizations are feeling the impact of ransomware. Attackers have honed their tactics, taking advantage of generative AI to make phishing attacks exceedingly clever while continuing their focus on disruptive supply chain attacks. The next generation of threats are more targeted, and with the assistance of AI and a thriving cybercrime as a service market, the barrier to entry for aspiring cybercriminals has never been lower.

article thumbnail

Best Prime Day laptop deals to shop in October 2024

Collaboration 2.0

Amazon's October Prime Day has officially ended, but there are still some last minute deals on laptops out there. We've rounded up the 30 best sales on devices from Apple, Lenovo, Dell, and more.

Sales 75
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Best Anti-Malware Software for Mac 2025

eSecurity Planet

Keeping your Mac safe from malicious threats is increasingly important as cyberattacks become more sophisticated and prevalent. With malware increasingly targeting macOS, many users wonder how to protect their devices best. The answer is simple: invest in the right anti-malware and anti-virus software designed specifically for Mac users in 2025. This guide will explore the essential tools to help you secure your Mac against malware threats.

article thumbnail

The best Prime Day phone deals to shop while the deals still last

Collaboration 2.0

Amazon's October Prime Day may be over, but you can still take advantage of huge savings. These are the best deals on the latest iPhones, Samsung Galaxy phones, Google Pixels, and more that you can shop while the sales last.

Sales 75
article thumbnail

Master trends and tackle challenges in performance engineering

OpenText Information Management

How can you elevate your understanding of performance engineering? In an age where digital transformation drives business success, mastering performance engineering challenges is essential. As technology progresses, so do the complexities and challenges of performance engineering. You might be experiencing challenges such as complexity of systems, security concerns, performance metrics selection, or resource constraints.

article thumbnail

Sign up for Costco and get a free $20 gift card with this deal - here's how

Collaboration 2.0

Don't miss this deal to buy your own Costco membership and get a free $20 gift card, effectively cutting the price to $45 for the year. (I bought one and highly recommend it.

IT 76
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Diamond Assets: keeping pace with innovation

Jamf

Diamond McKenna, Paula Currie and Tim Schigur of Diamond Assets discuss how schools and enterprises can get the most from their device fleet and stay ahead of technology innovation with Diamond Assets.

40
article thumbnail

Get a free Sony Bar 8 when you buy a Sony Bravia 7 TV at Amazon

Collaboration 2.0

If you've been waiting to upgrade your home theater, now is your chance to snag an awesome bundle deal from Sony that includes a Bravia 7 Mini LED TV and a Sony Bravia Bar 8. But you'll have to hurry, a bundle deal this good won't last long.

98
article thumbnail

Achieving tailored event monitoring and implementing behavioral baselines

Jamf

In this session, discover the challenges specific to macOS event monitoring and why it’s critical to organizational cybersecurity. Also, learn which questions help IT/Security admins decide on the SIEM solution that works best for them, and finally, follow the guided demo that uses a custom analytic/rule to mitigate malware on macOS.