Mon.Jan 22, 2024

article thumbnail

LoanDepot Ransomware Attack: 16.6 Million Customers Affected

Data Breach Today

Customers 'Sensitive Personal Information' Stolen, Large Mortgage Lender Reports Non-bank mortgage lending giant LoanDepot says hackers stole "sensitive personal information" pertaining to 16.6 million customers when they breached its systems earlier this month as part of a ransomware attack. The company said it will directly notify all affected customers.

article thumbnail

Cops Used DNA to Predict a Suspect’s Face—and Tried to Run Facial Recognition on It

WIRED Threat Level

Leaked records reveal what appears to be the first known instance of a police department attempting to use facial recognition on a face generated from crime-scene DNA. It likely won’t be the last.

IT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Hit on Tietoevry Causes IT Outages Across Sweden

Data Breach Today

Finnish IT Services Previews Days or Weeks of Disruption, Ties Attack to Akira An Akira ransomware attack that hit a data center run by Finnish IT software and services firm Tietoevry has led to widespread outages across Sweden. Healthcare, local governments, retail outlets and the country's largest cinema chain are among the organizations experiencing ongoing disruptions.

article thumbnail

Mother of all breaches – a historic data leak reveals 26 billion records: check what’s exposed

Security Affairs

Cybersecurity researcher Bob Dyachenko and CyberNews researchers discovered the largest data leak ever discovered. The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records. The leak is almost certainly the largest ever discovered. There are data leaks, and then there’s this.

Phishing 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

France's OFAC to Tackle Cyberthreats Ahead of Olympics

Data Breach Today

French Police Office for Cybercrime Has a Staff of 180 A dedicated cybercrime unit under the French National Police is set to scale up operations ahead of the upcoming Olympics as authorities warn that cyberattacks are among the greatest threats to the event. Authorities on Friday unveiled the unit's new headquarters in Parisian suburb Nanterre.

296
296

More Trending

article thumbnail

Microsoft's Latest Hack Sparks Major Security Concerns

Data Breach Today

Experts Warn Tech Giant Faces Potential for Future Cyberattacks After Email Hacking Security experts told ISMG they were concerned Microsoft could suffer future cyberattacks and threats to its customers after a Russian state hacking group managed to evade detection for several weeks while targeting accounts associated with the company’s top executives.

Security 291
article thumbnail

Threat actors exploit Apache ActiveMQ flaw to deliver the Godzilla Web Shell

Security Affairs

Researchers warn of a spike in attacks exploiting a now-patched flaw in Apache ActiveMQ to deliver the Godzilla web shell. Trustwave researchers observed a surge in attacks exploiting a now-patched flaw in Apache ActiveMQ, in many cases aimed at delivering a malicious code that borrows the code from the open-source web shell Godzilla. Threat actors conceal the web shell within an unknown binary format evading security and signature-based scanners.

article thumbnail

On Point: Offensive Security for Mobile Network Operators

Data Breach Today

Build Resiliency by Simulating Real-World Attacks and Gaining Insight Into Threats As cyberthreats evolve, mobile network operators need offensive security to maintain resilience. Traditional security, such as firewalls and encryption, is not sufficient on its own. Offensive security is proactive; it mimics the strategies of real attackers to stay ahead of potential threats.

Security 289
article thumbnail

Apple fixed actively exploited zero-day CVE-2024-23222

Security Affairs

Apple addressed the first zero-day vulnerability that impacts iPhones, Macs, and Apple TVs. The issue is actively exploited in the wild. Apple released security updates to address a zero-day vulnerability, tracked as CVE-2024-23222, that impacts iPhones, Macs, and Apple TVs. This is the first actively exploited zero-day vulnerability fixed by the company this year.

Security 142
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Prosecutors Add to Evidence Against Alleged Vastaamo Hacker

Data Breach Today

Extortion Money Found in Bank Account of Aleksanteri Kivimaki, Prosecutors Say Prosecutors trying the case of a Finnish national accused of attempting to extort tens of thousands of psychotherapy patients and of later posting therapy notes online said Monday that they have traced the cryptocurrency wallet used by the blackmailer to the accused man.

287
287
article thumbnail

Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web

Security Affairs

Resecurity researchers warn of massive leak of stolen Thai personally identifiable information (PII) on the dark web by cybercriminals. Resecurity has detected a noticeable increase in data leaks from consumer-focused platforms in Thailand, confirming that threat actors are actively targeting the personal data of citizens now at the beginning of 2024.

article thumbnail

Report: Hackers Scammed $7.5M From HHS Grant Payment System

Data Breach Today

Money Meant for Poor Communities Stolen as Authorities Issued Phishing Scam Alerts Hackers have reportedly stolen about $7.5 million from a Department of Health and Human Services grant payment system in a series of cyberattacks last year. The news comes in the midst of HHS and other authorities warnings about rising threats involving social engineering and payment scams.

Phishing 286
article thumbnail

“My Slice”, an Italian adaptive phishing campaign

Security Affairs

Adaptive phishing campaigns are emerging as an increasingly sophisticated threat in the cybersecurity landscape. The phenomenon This phenomenon represents an evolution of traditional phishing tactics, as attackers seek to overcome defenses using more personalized and targeted approaches. In an adaptive phishing campaign, attackers gather specific information about victims through various sources, such as social media, public websites, and previous data breaches.

Phishing 140
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Facebook Phishing Scams Target Concerned Friends and Family

KnowBe4

BleepingComputer describes a phishing scam that’s been running rampant on Facebook for the past several months, in which threat actors use hacked accounts to post links to phony articles implying that someone has been killed in an accident.

Phishing 131
article thumbnail

AI Bots on X (Twitter)

Schneier on Security

You can find them by searching for OpenAI chatbot warning messages, like: “I’m sorry, I cannot provide a response as it goes against OpenAI’s use case policy.” I hadn’t thought about this before: identifying bots by searching for distinctive bot phrases.

IT 119
article thumbnail

Russian State-Sponsored Threat Actor Targets High Profile Individuals in Phishing Campaign

KnowBe4

The Russian state-sponsored threat actor “COLDRIVER” is launching phishing campaigns against “high profile individuals in NGOs, former intelligence and military officers, and NATO governments,” according to researchers at Google’s Threat Analysis Group (TAG).

Phishing 122
article thumbnail

News alert: Deloitte, Memcyco partner to deliver real-time ‘digital impersonation’ solutions

The Last Watchdog

New York, NY, Jan. 22, 2024 — Memcyco Inc , the real-time digital impersonation detection and prevention solution provider, and Deloitte , the leading consulting, advisory, and audit services firm, today announced their strategic partnership in the cybersecurity sector. The partnership enables Deloitte to extend this range of solutions offering customers Memcyco’s industry-leading anti-impersonation software.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

AI Does Not Scare Me, But It Will Make The Problem Of Social Engineering Much Worse

KnowBe4

I am not scared of AI. What I mean is that I do not think AI is going to kill humanity Terminator-style. I think AI is going to be responsible for more cybercrime and more realistic phishing messages, but it is already pretty bad. Social engineering, without AI, is already involved in 70% - 90% of successful cyber attacks.

IT 119
article thumbnail

VulnRecap 1/22/24 – Watch Chrome, Ivanti, Citrix Issues

eSecurity Planet

This week’s vulnerability news include GitHub credential access, a new Chrome fix, and hidden malware from pirated applications hosted on Chinese websites. Citrix and Ivanti are seeing more problems, too, as more vulnerabilities have cropped up in Netscaler and Endpoint Manager Mobile. Make sure your security teams are regularly checking vendors’ software and hardware updates for any patches, and keep a particular eye on networking equipment.

article thumbnail

How to handle a ransomware attack 

IBM Big Data Hub

It’s the news no organization wants to hear―you’ve been the victim of a ransomware attack, and now you’re wondering what to do next. The first thing to keep in mind is you’re not alone. Over 17 percent of all cyberattacks involve ransomware —a type of malware that keeps a victim’s data or device locked unless the victim pays the hacker a ransom.

article thumbnail

News alert: Sternum and ChargePoint collaborate to enhance ChargePoint Home Flex Security

The Last Watchdog

Tel Aviv, Israel – Jan. 23, 2024 — Sternum, the pioneer in embedded IoT security and observability, today announced enhanced security for the ChargePoint Home Flex. In a comprehensive research project, Sternum identified a potential vulnerability involving the reverse SSH tunnel and deprecated NTP client and HTTP servers. ChargePoint, with its last firmware update, has disabled the HTTP server and updated the NTP client to address the issues.

IoT 100
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The dynamic forces behind data center re-transformation 

IBM Big Data Hub

Data centers are undergoing significant evolution. Initially, they were massive, centralized facilities that were complex, costly and difficult to replicate or restore. Now, advancements in hardware and software as well as increased focus on sustainability are driving rapid transformation. Catalysts and conundrums A dramatic shift in development and operations is making data centers more agile and cost-effective.

Cloud 100
article thumbnail

The best of times, the worst of times for public libraries

CILIP

The best of times, the worst of times for public libraries Isobel Hunter, CEO of Libraries Connected, discusses how the sector is demonstrating its best innovation while facing its worst financial crisis. ISOBEL Hunter became the first Chief Executive of Libraries Connected in 2018. As a reincarnation of the Association of Chief Librarians, one of Libraries Connected’s achievements was to use professional staff as well as volunteer members.

article thumbnail

GDPR compliance checklist

IBM Big Data Hub

The General Data Protection Regulation (GDPR) is a European Union (EU) law that governs how organizations collect and use personal data. Any company operating in the EU or handling EU residents’ data must adhere to GDPR requirements. However, GDPR compliance is not necessarily a straightforward matter. The law outlines a set of data privacy rights for users and a series of principles for the processing of personal data.

GDPR 79
article thumbnail

Digital Onboarding: Convenience Meets Security in Banking

Thales Cloud Protection & Licensing

Digital Onboarding: Convenience Meets Security in Banking madhav Tue, 01/23/2024 - 06:34 What onboarding in consumer banking was five years ago, where it stands today, and where it's heading is a business-critical change worth both understanding and optimizing. Because while the goal – opening a bank account – remains the same, consumer expectations, the process itself, and the security measures involved have all been redefined.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Copyright: The demise of ‘skill, labour and effort’?

CILIP

Copyright: The demise of ‘skill, labour and effort’? Is a photograph or digital image of a 2D artwork that is itself out of copyright, protected by copyright? This is a topic of heated debate often linked to the fees charged by museums and other publicly funded institutions for use of their images. This blog is by Sean Waterman, Head of Intellectual Property Naomi Korn Associates.

Access 76
article thumbnail

EU Reaches Political Agreement on Cyber Resilience Act for Digital and Connected Products

Data Matters

On 30 November 2023, the EU reached political agreement on the Cyber Resilience Act (“ CRA ”), the first legislation globally to regulate cybersecurity for digital and connected products that are designed, developed, produced and made available on the EU market. The CRA was originally proposed by the European Commission in September 2022. Alongside the recently adopted Data Act , Digital Operational Resilience Act (“ DORA ”), Critical Entities Resilience Act (“ CER ”), Network and Information Sy

article thumbnail

Industry analyst recognition round-up

OpenText Information Management

Innovation sits at the heart of OpenText as we continue to power and protect information to help businesses gain the information advantage. With this in mind, OpenText is honored to receive positive recognition for our solutions from many of the leading industry analyst firms we actively collaborate with. These reports play a pivotal role in … The post Industry analyst recognition round-up appeared first on OpenText Blogs.

72