Fri.Jun 28, 2024

article thumbnail

Identity Theft Reports Fall, But Attempts at ID Misuse Rise

Data Breach Today

James E. Lee of ITRC Discusses Key Trends Revealed in the 2023 Identity Report Fewer victims reported identity crimes in 2023, but the number of attempts to commit multiple identity crimes grew, according to the trends report released by the Identity Theft Resource Center. That means criminals are diversifying their methods and attempting to perform multiple types of misuse.

286
286
article thumbnail

A cyberattack shut down the University Hospital Centre Zagreb in Croatia

Security Affairs

A cyber attack started targeting the University Hospital Centre Zagreb (KBC Zagreb) on Wednesday night, reported the Croatian Radiotelevision. A cyber attack began targeting the University Hospital Centre Zagreb (KBC Zagreb), the largest Croatian hospital, on Wednesday night, according to a report by Croatian Radiotelevision. The hospital has shut down its IT infrastructure in response to the cyber attack.

Paper 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Startup Odaseva Raises $54M to Bolster Global Expansion, R&D

Data Breach Today

Silver Lake Leads Series C Round for California-Based Data Security Startup Odaseva With 65% of its revenue coming from the United States, data security startup Odaseva will use its $54 million Series C funding round to enhance R&D, expand its product line and strengthen its market presence in compliance, failover management and zero trust protection.

article thumbnail

5 WordPress Plugins Compromised; Millions of Websites at Risk

eSecurity Planet

Millions of WordPress websites are under threat after a critical security breach involving several popular plugins. Security researchers discovered malicious code injected into these plugins, granting hackers the ability to create unauthorized administrator accounts. This compromise can lead to severe consequences for website owners, including data breaches and total website takeovers.

Risk 113
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cryptohack Roundup: Conviction in Home Invasions Case

Data Breach Today

Also: $5M for Info on the Crypto Queen; Attacks on BtcTurk and CoinStats This week, crypto stealer convicted, reward for info on Crypto Queen increased, BtcTurk and CoinStats suffered cyberattacks, Lazarus blamed for Alex Lab hack, Nigeria refuted allegations of ill treatment, sentencing in Hydrogen Technology case, Binance fined in India, and FBI warned of crypto scams.

246
246

More Trending

article thumbnail

Collaborate on Shifting Left: Why 'AppSec Is a Team Sport'

Data Breach Today

Developers are using more and more open-source code because they "want to move fast," said Cycode's Lotem Guy. But the speed of development and the continuous deployment that follows means security teams have to catch up to the fast-moving development life cycle.

Security 224
article thumbnail

TeamViewer Corporate Network Breached in Alleged APT Attack

KnowBe4

In a concerning development, TeamViewer, one of the world's leading remote access software providers, has disclosed a cyber attack that breached its corporate network environment.

Access 103
article thumbnail

Breaches Due to Credential Stuffing: Who's Accountable?

Data Breach Today

The Theft of Snowflake's Customers' Data Shows That Vendors Need Robust Defenses Who's responsible for the data breaches experienced by customers of the data warehousing platform Snowflake due to credential stuffing attacks? While users have security responsibilities, multiple platforms - including Snowflake - have shortcomings they must urgently address.

article thumbnail

KnowBe4 Recognized as Cyber Security Educator of the Year at IT Europa Awards 2024

KnowBe4

It's a great honor for KnowBe4 to be named the Cyber Security Educator of the Year at the prestigious IT Europa Channel Awards 2024.

Education 107
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Multiple Vulnerabilities Found in Gas Chromatographs

Data Breach Today

Critical-Severity Flaws Expose Emerson Devices to Cyberattacks Multiple critical vulnerabilities in Emerson Rosemount 370XA gas chromatographs could allow malicious actors to access sensitive data, cause denial-of-service conditions and execute arbitrary commands. Emerson recommends that end users update the firmware on the products.

Access 173
article thumbnail

Your KnowBe4 Fresh Content Updates from June 2024

KnowBe4

Check out the 29 new pieces of training content added in June, alongside the always fresh content update highlights, events and new features.

article thumbnail

Chatbots Will Break Guardrails If the Info Is 'Educational'

Data Breach Today

Microsoft Dubs the Technique 'Skeleton Key' Artificial intelligence researchers say they came up with a new way to trick chatbots into circumventing safeguards and dispensing information that otherwise goes against their programming. They tell the bots that the information is for educational purposes and ask it to append warnings.

Education 162
article thumbnail

Inside a Violent Gang's Ruthless Crypto-Stealing Home Invasion Spree

WIRED Threat Level

More than a dozen men threatened, assaulted, tortured, or kidnapped 11 victims in likely the worst-ever crypto-focused serial extortion case of its kind in the US.

IT 82
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

On Point: Risk Management Strategies for AI Tools

Data Breach Today

What to Do to Protect the Sensitive Data You Submit to Online AI Tools Artificial intelligence tools are both a blessing and a curse for companies. They enable staff to be more efficient and get tasks done quicker, but they also allow an ever-increasing amount of sensitive data to walk out of the organization. Risk management controls need to be in place.

Risk 147
article thumbnail

Fatima Payman admits she ‘upset a few colleagues’ by crossing the floor – as it happened

The Guardian Data Protection

This blog is now closed. Albanese says ‘no place for extremism in Australia’ after teen allegedly enters MP’s office with ‘intention to kill’ Get our morning and afternoon news emails , free app or daily news podcast Housing minister Julie Collins is speaking to the ABC RN about Labor’s build-to-rent bill which was knocked back in the Senate yesterday, with the Greens and the Coalition combining to delay it: What we want to do is get this done.

IT 70
article thumbnail

LevelBlue Lays Off 15% of Employees After Being Sold by AT&T

Data Breach Today

Job Cuts Come Less Than 2 Months After WillJam Ventures-Owned Company Rebranded LevelBlue laid off 15% of its 1,000-person workforce just months after AT&T sold a majority stake in the managed cybersecurity services firm to WillJam Ventures. The cuts will allow LevelBlue to refocus its resources on improving the depth, quality and delivery of its managed security services.

article thumbnail

James Bamford on Section 702 Extension

Schneier on Security

Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act (FISA).

Privacy 75
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Insurance Software Vendor Notifies 6.1 Million of 2023 Hack

Data Breach Today

InfoSys McCamish Systems Earlier Alerted 57,000 Bank of America Clients of Breach Infosys McCamish Systems, an insurance software product and services vendor, is notifying nearly 6.1 million people of a 2023 ransomware incident that potentially comprised their sensitive data, including Social Security numbers, medical treatment, and financial and biometric information.

Insurance 130
article thumbnail

Security Trends for 2024 and Beyond

IT Governance

Expert insight from our head of security testing As we get deeper into 2024, we felt it was time to sit down with our head of security testing, James Pickard, to talk about what trends in cyber security he’s seeing. He pointed to the rise of AI, and how this is changing cyber security, particularly in terms of social engineering attacks. We also covered other areas, including ransomware trends and how organisations can protect themselves.

article thumbnail

Gartner: 55% of Firms Now Rely on AI Governance Boards

Data Breach Today

Poll Shows AI Risk Concerns Rising; 25% of CIOs Are Now in Charge of AI Initiatives A new Gartner poll shows 55% of organizations have established AI boards to govern artificial intelligence initiatives. As AI's influence grows across business functions, these boards can help reduce risks and drive value by establishing regulation and governance.

article thumbnail

What Is Cloud Workload Security? Ultimate Guide

eSecurity Planet

Cloud workload security, or cloud workload protection (CWP), refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. It secures virtual machines, databases, containers, and applications against common threats. CWP platforms, now commonly included in cloud-native application protection platforms (CNAPPs), safeguard workloads in public, hybrid, and multi-cloud environments.

Cloud 62
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Microsoft Is Warning More Customers About Russian State Hack

Data Breach Today

Company Is Sending Email Alerts to Customers Whose Data Was Accessed by Hackers Microsoft is alerting its customers whose data may have been accessed by Russian state hackers following a January attack that compromised the emails of company executives. Microsoft also shared a link to a custom-built secure system that customers can use to review their stolen data.

Access 130
article thumbnail

Invitation to tender: Delivery of anti-racist library collections training

CILIP

Invitation to Tender - Anti-Racist Library Collections training for Wales Invitation to tender: Delivery of anti-racist library collections training to public library staff in Wales Indicative contract fee: £22,000 Timescale for delivery: 1st September – 30th November CILIP is looking for external providers to deliver anti-racist library collection training to public library staff across Wales.

article thumbnail

ISMG Editors: Growing Fallout From the Snowflake Breach

Data Breach Today

Also: Tackling Online Fraud; Highlights From ISMG's Midwest Summit In the latest weekly update, ISMG editors discussed the fallout from the recent Snowflake breach and its impact on 165 companies and their users, the ongoing challenges in combating online fraud, and takeaways from ISMG's cybersecurity summit in Chicago.

article thumbnail

How AI is impacting data governance via InfoWorld

IG Guru

Check out the article here The post How AI is impacting data governance via InfoWorld first appeared on IG GURU.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Palo Alto Networks, Cisco Dominate OT Defense Forrester Wave

Data Breach Today

Palo Alto Reaches OT Leaderboard While Claroty, Tenable Fall to Strong Performer Cisco remained atop Forrester's OT security rankings, Palo Alto Networks climbed into the leader space, and Claroty and Tenable fell to strong performer. The transition from a network-centric to an asset- and data-centric security model has introduced challenges, especially with legacy equipment.

Security 130
article thumbnail

Friday Squid Blogging: New Squid Species

Schneier on Security

A new squid species—of the Gonatidae family—was discovered. The video shows her holding a brood of very large eggs. Research paper.

Paper 74