Fri.Jun 28, 2024

article thumbnail

A cyberattack shut down the University Hospital Centre Zagreb in Croatia

Security Affairs

A cyber attack started targeting the University Hospital Centre Zagreb (KBC Zagreb) on Wednesday night, reported the Croatian Radiotelevision. A cyber attack began targeting the University Hospital Centre Zagreb (KBC Zagreb), the largest Croatian hospital, on Wednesday night, according to a report by Croatian Radiotelevision. The hospital has shut down its IT infrastructure in response to the cyber attack.

Paper 322
article thumbnail

Identity Theft Reports Fall, But Attempts at ID Misuse Rise

Data Breach Today

James E. Lee of ITRC Discusses Key Trends Revealed in the 2023 Identity Report Fewer victims reported identity crimes in 2023, but the number of attempts to commit multiple identity crimes grew, according to the trends report released by the Identity Theft Resource Center. That means criminals are diversifying their methods and attempting to perform multiple types of misuse.

288
288
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quora’s Chatbot Platform Poe Allows Users to Download Paywalled Articles on Demand

WIRED Threat Level

WIRED was able to download stories from publishers like The New York Times and The Atlantic using Poe’s Assistant bot. One expert calls it “prima facie copyright infringement,” which Quora disputes.

IT 207
article thumbnail

Cryptohack Roundup: Conviction in Home Invasions Case

Data Breach Today

Also: $5M for Info on the Crypto Queen; Attacks on BtcTurk and CoinStats This week, crypto stealer convicted, reward for info on Crypto Queen increased, BtcTurk and CoinStats suffered cyberattacks, Lazarus blamed for Alex Lab hack, Nigeria refuted allegations of ill treatment, sentencing in Hydrogen Technology case, Binance fined in India, and FBI warned of crypto scams.

265
265
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Inside a Violent Gang's Ruthless Crypto-Stealing Home Invasion Spree

WIRED Threat Level

More than a dozen men threatened, assaulted, tortured, or kidnapped 11 victims in likely the worst-ever crypto-focused serial extortion case of its kind in the US.

IT 167

More Trending

article thumbnail

KnowBe4 Recognized as Cyber Security Educator of the Year at IT Europa Awards 2024

KnowBe4

It's a great honor for KnowBe4 to be named the Cyber Security Educator of the Year at the prestigious IT Europa Channel Awards 2024.

Education 122
article thumbnail

Collaborate on Shifting Left: Why 'AppSec Is a Team Sport'

Data Breach Today

Developers are using more and more open-source code because they "want to move fast," said Cycode's Lotem Guy. But the speed of development and the continuous deployment that follows means security teams have to catch up to the fast-moving development life cycle.

Security 246
article thumbnail

5 WordPress Plugins Compromised; Millions of Websites at Risk

eSecurity Planet

Millions of WordPress websites are under threat after a critical security breach involving several popular plugins. Security researchers discovered malicious code injected into these plugins, granting hackers the ability to create unauthorized administrator accounts. This compromise can lead to severe consequences for website owners, including data breaches and total website takeovers.

Risk 115
article thumbnail

Breaches Due to Credential Stuffing: Who's Accountable?

Data Breach Today

The Theft of Snowflake's Customers' Data Shows That Vendors Need Robust Defenses Who's responsible for the data breaches experienced by customers of the data warehousing platform Snowflake due to credential stuffing attacks? While users have security responsibilities, multiple platforms - including Snowflake - have shortcomings they must urgently address.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

TeamViewer Corporate Network Breached in Alleged APT Attack

KnowBe4

In a concerning development, TeamViewer, one of the world's leading remote access software providers, has disclosed a cyber attack that breached its corporate network environment.

Access 111
article thumbnail

Multiple Vulnerabilities Found in Gas Chromatographs

Data Breach Today

Critical-Severity Flaws Expose Emerson Devices to Cyberattacks Multiple critical vulnerabilities in Emerson Rosemount 370XA gas chromatographs could allow malicious actors to access sensitive data, cause denial-of-service conditions and execute arbitrary commands. Emerson recommends that end users update the firmware on the products.

Access 173
article thumbnail

Your KnowBe4 Fresh Content Updates from June 2024

KnowBe4

Check out the 29 new pieces of training content added in June, alongside the always fresh content update highlights, events and new features.

article thumbnail

Chatbots Will Break Guardrails If the Info Is 'Educational'

Data Breach Today

Microsoft Dubs the Technique 'Skeleton Key' Artificial intelligence researchers say they came up with a new way to trick chatbots into circumventing safeguards and dispensing information that otherwise goes against their programming. They tell the bots that the information is for educational purposes and ask it to append warnings.

Education 162
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

James Bamford on Section 702 Extension

Schneier on Security

Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act (FISA).

Privacy 90
article thumbnail

On Point: Risk Management Strategies for AI Tools

Data Breach Today

What to Do to Protect the Sensitive Data You Submit to Online AI Tools Artificial intelligence tools are both a blessing and a curse for companies. They enable staff to be more efficient and get tasks done quicker, but they also allow an ever-increasing amount of sensitive data to walk out of the organization. Risk management controls need to be in place.

Risk 147
article thumbnail

Fatima Payman admits she ‘upset a few colleagues’ by crossing the floor – as it happened

The Guardian Data Protection

This blog is now closed. Albanese says ‘no place for extremism in Australia’ after teen allegedly enters MP’s office with ‘intention to kill’ Get our morning and afternoon news emails , free app or daily news podcast Housing minister Julie Collins is speaking to the ABC RN about Labor’s build-to-rent bill which was knocked back in the Senate yesterday, with the Greens and the Coalition combining to delay it: What we want to do is get this done.

IT 84
article thumbnail

LevelBlue Lays Off 15% of Employees After Being Sold by AT&T

Data Breach Today

Job Cuts Come Less Than 2 Months After WillJam Ventures-Owned Company Rebranded LevelBlue laid off 15% of its 1,000-person workforce just months after AT&T sold a majority stake in the managed cybersecurity services firm to WillJam Ventures. The cuts will allow LevelBlue to refocus its resources on improving the depth, quality and delivery of its managed security services.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How AI is impacting data governance via InfoWorld

IG Guru

Check out the article here The post How AI is impacting data governance via InfoWorld first appeared on IG GURU.

article thumbnail

Insurance Software Vendor Notifies 6.1 Million of 2023 Hack

Data Breach Today

InfoSys McCamish Systems Earlier Alerted 57,000 Bank of America Clients of Breach Infosys McCamish Systems, an insurance software product and services vendor, is notifying nearly 6.1 million people of a 2023 ransomware incident that potentially comprised their sensitive data, including Social Security numbers, medical treatment, and financial and biometric information.

Insurance 130
article thumbnail

Security Trends for 2024 and Beyond

IT Governance

Expert insight from our head of security testing As we get deeper into 2024, we felt it was time to sit down with our head of security testing, James Pickard, to talk about what trends in cyber security he’s seeing. He pointed to the rise of AI, and how this is changing cyber security, particularly in terms of social engineering attacks. We also covered other areas, including ransomware trends and how organisations can protect themselves.

article thumbnail

Gartner: 55% of Firms Now Rely on AI Governance Boards

Data Breach Today

Poll Shows AI Risk Concerns Rising; 25% of CIOs Are Now in Charge of AI Initiatives A new Gartner poll shows 55% of organizations have established AI boards to govern artificial intelligence initiatives. As AI's influence grows across business functions, these boards can help reduce risks and drive value by establishing regulation and governance.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

What Is Cloud Workload Security? Ultimate Guide

eSecurity Planet

Cloud workload security, or cloud workload protection (CWP), refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. It secures virtual machines, databases, containers, and applications against common threats. CWP platforms, now commonly included in cloud-native application protection platforms (CNAPPs), safeguard workloads in public, hybrid, and multi-cloud environments.

Cloud 64
article thumbnail

Microsoft Is Warning More Customers About Russian State Hack

Data Breach Today

Company Is Sending Email Alerts to Customers Whose Data Was Accessed by Hackers Microsoft is alerting its customers whose data may have been accessed by Russian state hackers following a January attack that compromised the emails of company executives. Microsoft also shared a link to a custom-built secure system that customers can use to review their stolen data.

Access 130
article thumbnail

How AI is impacting data governance via InfoWorld

IG Guru

Check out the article here

article thumbnail

ISMG Editors: Growing Fallout From the Snowflake Breach

Data Breach Today

Also: Tackling Online Fraud; Highlights From ISMG's Midwest Summit In the latest weekly update, ISMG editors discussed the fallout from the recent Snowflake breach and its impact on 165 companies and their users, the ongoing challenges in combating online fraud, and takeaways from ISMG's cybersecurity summit in Chicago.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Invitation to tender: Delivery of anti-racist library collections training

CILIP

Invitation to Tender - Anti-Racist Library Collections training for Wales Invitation to tender: Delivery of anti-racist library collections training to public library staff in Wales Indicative contract fee: £22,000 Timescale for delivery: 1st September – 30th November CILIP is looking for external providers to deliver anti-racist library collection training to public library staff across Wales.

article thumbnail

Palo Alto Networks, Cisco Dominate OT Defense Forrester Wave

Data Breach Today

Palo Alto Reaches OT Leaderboard While Claroty, Tenable Fall to Strong Performer Cisco remained atop Forrester's OT security rankings, Palo Alto Networks climbed into the leader space, and Claroty and Tenable fell to strong performer. The transition from a network-centric to an asset- and data-centric security model has introduced challenges, especially with legacy equipment.

Security 130
article thumbnail

Friday Squid Blogging: New Squid Species

Schneier on Security

A new squid species—of the Gonatidae family—was discovered. The video shows her holding a brood of very large eggs. Research paper.

Paper 88