Fri.Oct 11, 2024

article thumbnail

DOD Unveils Final CMMC Rule for Defense Contractors

Data Breach Today

New Cybersecurity Maturity Model Certification Rule Paves Way for Implementation The Department of Defense is set to implement significant changes to the Cybersecurity Maturity Model Certification program, effective October 15, streamlining compliance for contractors by introducing a tiered system while enhancing security standards.

article thumbnail

Iran and China-linked actors used ChatGPT for preparing attacks

Security Affairs

OpenAI disrupted 20 cyber and influence operations in 2023, revealing Iran and China-linked actors used ChatGPT for planning ICS attacks. OpenAI announced the disruption of over 20 cyber and influence operations this year, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks.

Phishing 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Prowling For Unencrypted BIG-IP Cookies, Warns CISA

Data Breach Today

Agency Says Cookies Could Help Attackers Find Network Assets, Vulnerabilities Unencrypted cookies tied to a suite of secure gateway technology from F5 are gateways for hackers to reach internal devices on corporate networks, warns the Cybersecurity and Infrastructure Security Agency. BIG-IP uses persistent cookies as a traffic load-balancing convenience.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

Passwordless Authentication without Secrets! divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel frustrated with frequent password resets. This highlights an increasing demand for advanced authentication methods like passkeys and multi-factor authentication (MFA), which provide robust security for most use cases.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Regulating AI Catastophic Risk Isn't Easy

Data Breach Today

AI, Security Experts Discuss Who Defines the Risks, Mitigation Efforts An attempt by the California statehouse to tame the potential of artificial intelligence catastrophic risks hit a roadblock when Governor Gavin Newsom vetoed the measure late last month. One obstacle is lack of a widely-accepted definition for "catastrophic" AI risks.

Risk 297

More Trending

article thumbnail

Beyond Proof of Concepts: Will Gen AI Live Up to the Hype?

Data Breach Today

How Gen AI Is Evolving From Experimentation to Driving Major Business Impact As gen AI moves from hype to reality, 30% of projects are predicted to be abandoned after the proof-of-concept phase. Despite gen AI's enormous potential to boost revenue and productivity and reduce costs, organizations must perform a thorough assessment before committing to large-scale investments.

297
297
article thumbnail

Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks

Security Affairs

Sophos reports ransomware operators are exploiting a critical code execution flaw in Veeam Backup & Replication. Sophos researchers warn that ransomware operators are exploiting the critical vulnerability CVE-2024-40711 in Veeam Backup & Replication to create rogue accounts and deploy malware. In early September 2024, Veeam released security updates to address multiple vulnerabilities impacting its products, the company fixed 18 high and critical severity flaws in Veeam Backup & Repl

article thumbnail

Rhysida Leaks Nursing Home Data, Demands $1.5M From Axis

Data Breach Today

Ransomware Gang Could Have Axis Health's Mental Health, Drug Abuse Records Ransomware gang Rhysida is threatening to dump data on the dark web that belongs to a Colorado provider of mental health, substance abuse and other healthcare services unless it pays nearly $1.5 million. The group is leaking records it claims to have stolen from a Mississippi nursing home.

article thumbnail

Trinity Ransomware Targets the Healthcare Sector

KnowBe4

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ISMG Editors: Chinese Hackers Raise Stakes in Cyberespionage

Data Breach Today

Also: AI Safety Bill Vetoed, Global Ransomware Response Guide Gets Some Revisions In the latest weekly update, ISMG editors discussed the implications of the U.S. investigation into Chinese hackers targeting telecom wiretap systems, the catastrophic risks of AI and the recent veto of an AI safety bill in the U.S., and the latest global ransomware response guidance.

article thumbnail

GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution

Security Affairs

GitLab issued updates for CE and EE to address multiple flaws, including a critical bug allowing CI/CD pipeline runs on unauthorized branches. GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE) to address multiple vulnerabilities, including a critical bug, tracked as CVE-2024-9164 (CVSS score of 9.6), allowing CI/CD pipeline runs on unauthorized branches. “An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, st

Analytics 127
article thumbnail

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

KnowBe4

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions.

Phishing 125
article thumbnail

More on My AI and Democracy Book

Schneier on Security

In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are hard at work writing. At this point, we would like feedback on titles. Here are four possibilities: Rewiring Democracy: How AI Will Transform our Politics, Government, and Citizenship The Thinking State: How AI Can Improve Democracy Better Run: How AI Can Make our Politics, Government, Citizenship More Efficient, Effective and Fair AI a

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Tesla heralds 'unsupervised' self-driving AI by 2027, but skeptics abound

Collaboration 2.0

During a robotic taxi demonstration, Elon Musk says the fully autonomous car will drive while you sleep.

76
article thumbnail

Indian Fishermen Are Catching Less Squid

Schneier on Security

Fishermen in Tamil Nadu are reporting smaller catches of squid. Blog moderation policy.

84
article thumbnail

Microsoft blocked your Windows 11 upgrade? This just-released tool can get the job done

Collaboration 2.0

A new version of the popular Rufus utility once again bypasses Microsoft's strict hardware compatibility requirements for Windows 11 upgrades. But the way it's implemented might make some people nervous.

IT 76
article thumbnail

Celebrating the human touch: how Autoscore impacts customer service quality

OpenText Information Management

With artificial intelligence (AI) handling an increasing number of customer interactions, the role of human agents is more crucial than ever as we celebrate Customer Service Week 2024. Today, we're exploring how the OpenText â„¢ Contact Center Analytics solution, specifically its AutoScore module, is helping organizations identify and celebrate exceptional human-driven customer service in the age of AI.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The Samsung tablet I most recommend is not a flagship - and it's still available for sale for October Prime Day

Collaboration 2.0

The Galaxy Tab S9 FE and S9 FE+ are excellent large-screen tablets for work and play. During Amazon's post-Big Deal Days sales event, you can buy the Galaxy Tab S9 FE+ for over $80 off.

Sales 75
article thumbnail

Self Service+: Empowering Productivity and Security through a Unified App Experience

Jamf

Truly delighting end users with genuinely helpful apps tailored to their needs is the focus of Sam Allcock, Director of Product Management and Kyle Hammond, Principal Software Engineer at Jamf at JNUC 2024.

article thumbnail

Fidelity breach exposed the personal data of 77,000 customers - what to do if you're affected

Collaboration 2.0

The investment giant is offering those impacted 24 months of free credit monitoring to help them check for any unusual activity.

article thumbnail

IronNet Has Shut Down

Schneier on Security

After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time while still in the military. That always troubled me. Whatever ideas he had, they were developed on public time using public resources: he shouldn’t have been able to leave military service with them in his back pocket.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

I changed 11 settings on my Android phone to dramatically improve battery life

Collaboration 2.0

There are numerous ways to improve your Android's battery life, and I've sifted through them all to highlight the most effective options - plus an obvious bonus.

76
article thumbnail

Managed software updates make Apple patch management easier

Jamf

Apple patch management and macOS and iOS upgrades just got much easier to manage. Learn how to deliver a seamless end-user experience during updates.

40
article thumbnail

Ham radio is alive and well - and still a lifeline in disasters

Collaboration 2.0

When disaster strikes, and conventional communication systems fail, amateur ham radio operators step in to bridge the gap, providing a crucial link between those in affected areas and the outside world.

article thumbnail

How and When to Responsibly Dispose of Healthcare Documents

Record Nations

Today, effective management and disposal of healthcare documents are vital. They ensure efficiency, compliance, and data security in healthcare. Healthcare facilities manage vast amounts of sensitive data, including patient records and billing documents. As facilities grow, so do their document archives. That’s why it’s essential to regularly review, organize, and dispose of outdated or unnecessary.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Where AI avatars are at your service 24/7

Collaboration 2.0

In South Korea, DeepBrain AI's hyper-realistic avatars are playing a variety of roles - store clerk, bank teller, tutor, even financial analyst. Exactly how is that working out so far?

76
article thumbnail

The Importance of Data Fidelity in Healthcare and How to Achieve it

Record Nations

The current healthcare landscape requires facilities to create and store more data than ever before. The enormous amount of patient health records, diagnostic imaging, and lab results involved in the average day can be overwhelming. This data could collectively transform care delivery, but it’s also a challenge to manage effectively. One of the most pressing.

IT 40
article thumbnail

ChatGPT's productivity upgrade and your new AI coworkers

Collaboration 2.0

The exponential growth of AI assistants -- from ChatGPT to full-blown agentic systems -- rule the Innovation Index this week. Here's what they're up to.

75