Wed.Oct 23, 2024

article thumbnail

Embargo Ransomware Disables Security Defenses

Data Breach Today

New Ransomware Group Deploys Rust-Based Tools in Attacks A recently constituted and apparently well-resourced ransomware player is developing and testing tools to disable security defenses, including a method that exploits a vulnerability in drivers. Embargo first surfaced in April amid an ongoing shakeup in the ransomware world.

article thumbnail

News alert: INE Security shares cyber hygiene guidance for small- and medium-sized businesses

The Last Watchdog

Cary, NC, Oct. 22, 2024, CyberNewswire — INE Security offers essential advice to protect digital assets and enhance security. As small businesses increasingly depend on digital technologies to operate and grow, the risks associated with cyber threats also escalate. INE Security , a leading provider of cybersecurity training and certifications, today shared its cybersecurity training for cyber hygiene practices for small businesses, underscoring the critical role of continuous education in

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Industry Coalition Seeks to Codify US Safety Institute

Data Breach Today

Tech Giants, AI Firms, Academics Urge Congress to Take Action by Term-End A coalition of more than 60 AI industry players is pushing Congress to prioritize legislation that would codify the U.S. Artificial Intelligence Safety Institute. The letter says the action would allow U.S. to maintain influence in the development of science-backed standards for advanced AI systems.

article thumbnail

U.S. CISA adds Fortinet FortiManager flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiManager flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Fortinet FortiManager missing authentication vulnerability CVE-2024-47575 (CVSS v4 score: 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 125
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Why Vetting AI Vendor Security Is Critical in Healthcare

Data Breach Today

It's crucial for healthcare sector organizations to vet their artificial intelligence tech vendors in the same robust way they scrutinize the privacy and security practices of all their other third-party suppliers, said attorney Linda Malek of the law firm Crowell & Moring.

More Trending

article thumbnail

Fortinet Discloses Actively Exploited Zero-Day

Data Breach Today

U.S. Federal Government Gives Agencies Three Weeks to Patch or Mitigate Fortinet disclosed an actively exploited vulnerability in its centralized management platform following more than a week of online chatter that edge device manufacturer products have been under renewed attack. Cybersecurity researcher Kevin Beaumont christened the vulnerability "FortiJump.

article thumbnail

U.S. CISA adds Microsoft SharePoint flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft SharePoint flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Microsoft SharePoint Deserialization Vulnerability CVE-2024-38094 (CVSS v4 score: 7.2) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 121
article thumbnail

Cloud Defender Stream.Security Raises $30M, Eyes US Growth

Data Breach Today

AI-Powered Cloud Remediation, Multi-Cloud Support at Core of Series B Investment With a $30 million boost from Series B funding, Stream.Security will enhance its cloud security offerings. The company’s focus includes auto-remediation, faster, AI-driven threat responses, increased support for multi-cloud and hybrid environments, and boosted market presence in the U.S. and beyond.

Cloud 286
article thumbnail

Crooks are targeting Docker API servers to deploy SRBMiner

Security Affairs

Threat actors are targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances, Trend Micro warns. Trend Micro researchers observed attackers targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances. The threat actors used the gRPC protocol over h2c to bypass security and execute crypto mining on Docker hosts, manipulating Docker functionalities via gRPC methods. “The attacker first checked the availability and version o

Mining 116
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

White House Reviewing Updates to HIPAA Security Rule

Data Breach Today

Proposal Will Be Open for Public Comment Next, But Will It Go Anywhere? The Department of Health and Human Service last Friday submitted for White House review long-awaited updates to the 20-year-old HIPAA Security Rule containing modifications aimed at strengthening the cybersecurity of electronic protected health information.

Security 282
article thumbnail

SEC fined 4 companies for misleading disclosures about the impact of the SolarWinds attack

Security Affairs

The SEC fined Unisys, Avaya, Check Point, and Mimecast for misleading disclosures about the impact of the SolarWinds Orion hack. The US Securities and Exchange Commission (SEC) charged four companies, Unisys, Avaya, Check Point, and Mimecast for misleading public disclosures related to the supply chain attack on SolarWinds. The SEC fined the four companies for having downplayed the impact of the attack.

article thumbnail

How to Thrive in a Distributed Team

Data Breach Today

Tips for Employers on Securing the Home Environment and Promoting Better Hygiene Remote work is a critical part of the future of cybersecurity and many other industries. For those who continue to work remotely or in a hybrid model, the need for robust cybersecurity practices needs to be a priority. But one of the biggest obstacles to that is isolation.

article thumbnail

New Research: 140% Increase in Callback Phishing

KnowBe4

Researchers at Trustwave observed a 140% increase in callback phishing attacks between July and September 2024. Callback phishing is a social engineering tactic that involves emails and phone calls to trick users into handing over login credentials or other sensitive data or installing malware.

Phishing 114
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Meta Tests Facial Recognition to Curb Deepfake Scams

Data Breach Today

Firm Won't Deploy Feature in the EU, UK Due to Data Collection Norms Meta is rolling out facial recognition technology on its social media platforms to spot scam ads featuring celebrity deepfakes. Meta took down 8,000 of the "celeb bait" scam ads. The feature also aims to verify the identities of users locked out of their Facebook or Instagram accounts.

article thumbnail

Ransomware Gang Attack Tactics Have Shifted

KnowBe4

A recent analysis of the ransomware group Meow raises the notion that groups are evolving from using encryption as a tactic to more profitable and cost-effective methods.

article thumbnail

Strategies for Securing Your Supply Chain

IT Governance

What to do when your ‘supply chain’ is really a ‘supply loop’ When I asked Bridget Kenyon – CISO (chief information security officer) for SSCL, lead editor for ISO 27001:2022 and author of ISO 27001 Controls – what she’d like to cover in an interview, she suggested supply chain security. I asked her whether she was thinking about the CrowdStrike incident (which happened just a few weeks prior).

article thumbnail

Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions

WIRED Threat Level

Russia, Iran, and China are targeting the US election with an evolving array of influence operations in the last days of campaign season.

Security 118
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Running out of Gmail storage? How to get another 15GB for free (and not lose anything)

Collaboration 2.0

Whether you're a digital hoarder or separating from a work or school account, you can archive your Google messages and media with this free and clever workaround.

Archiving 137
article thumbnail

Are Automatic License Plate Scanners Constitutional?

Schneier on Security

An advocacy groups is filing a Fourth Amendment challenge against automatic license plate readers. “The City of Norfolk, Virginia, has installed a network of cameras that make it functionally impossible for people to drive anywhere without having their movements tracked, photographed, and stored in an AI-assisted database that enables the warrantless surveillance of their every move.

article thumbnail

Get one of the best battery-powered Ring video doorbells for only $100

Collaboration 2.0

If you're a Ring user looking to upgrade to a battery-powered video doorbell, the Ring Battery Doorbell Plus is the perfect choice, especially at 33% off with this limited time deal.

92
article thumbnail

Nigeria Drops Charges Against Tigran Gambaryan, Jailed Binance Exec and Former IRS Agent

WIRED Threat Level

After eight months, one of the US's most prominent crypto-crime investigators may finally be coming home.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The ultimate Windows 11 upgrade guide: Everything you need to know

Collaboration 2.0

New to Windows 11? We've got answers to all your questions - from system requirements to TPMs, Windows 12 expectations, and more - including those you didn't think to ask.

122
122
article thumbnail

Get customer insights and advice at OpenText World 2024

OpenText Information Management

As OpenText World 2024 rapidly approaches, we’re finalizing plans to make this the best event ever. Goose, our AI-generated friend, and his colleagues are excited to guide you through the world of information management in Las Vegas November 18-21. In addition to inspiring keynotes , breakout sessions , pre-conference training , certification opportunities , and networking events , we’re announcing a full slate of customer speakers.

article thumbnail

Have a Windows problem that you just can't fix? Try this ultimate troubleshooting trick

Collaboration 2.0

If you keep bumping into annoying Windows problems, the solution might be easier than you think. Skip the clean install and try this fix instead. It's fast and easy, and the results can be nearly miraculous.

IT 92
article thumbnail

Will the real trusted advisor please stand up?

CGI

I’ve been in business development my entire career, and I’m passionate about sales ethics and meeting my clients' expectations. Recently, I’ve been engaged in conversations about what it means to be a “trusted advisor.” A trusted advisor used to mean something specific; now it seems everyone claims to be one. Yet being a trusted advisor—or trusted partner—isn’t something you can just claim.

Sales 52
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Raspberry Pi just released its own high-performance SSDs and SSD kits

Collaboration 2.0

Here's the perfect way to add high-performance storage to your Raspberry Pi 5 project.

IT 122
article thumbnail

New York hospitals have new cybersecurity requirements

Data Protection Report

On October 2, 2024, the New York State Department of Health (DOH) published a new cybersecurity regulation (10 NYCRR 405.46) for all general hospitals licensed pursuant to article 28 of the Public Health Law. Although most of the regulation will take effect in one year, on October 2, 2025, the requirement that covered hospitals provide notice to DOH within 72 hours of a “Cybersecurity incident” (which can include third party incidents) went into effect upon publication.

article thumbnail

The best wired earbuds of 2024: Expert recommended

Collaboration 2.0

When it comes down to the wire, we've got your back. We've tested and researched the best wired earbuds on the market to help you choose the right pair.