Wed.Oct 23, 2024

article thumbnail

Embargo Ransomware Disables Security Defenses

Data Breach Today

New Ransomware Group Deploys Rust-Based Tools in Attacks A recently constituted and apparently well-resourced ransomware player is developing and testing tools to disable security defenses, including a method that exploits a vulnerability in drivers. Embargo first surfaced in April amid an ongoing shakeup in the ransomware world.

article thumbnail

News alert: INE Security shares cyber hygiene guidance for small- and medium-sized businesses

The Last Watchdog

Cary, NC, Oct. 22, 2024, CyberNewswire — INE Security offers essential advice to protect digital assets and enhance security. As small businesses increasingly depend on digital technologies to operate and grow, the risks associated with cyber threats also escalate. INE Security , a leading provider of cybersecurity training and certifications, today shared its cybersecurity training for cyber hygiene practices for small businesses, underscoring the critical role of continuous education in

Security 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Industry Coalition Seeks to Codify US Safety Institute

Data Breach Today

Tech Giants, AI Firms, Academics Urge Congress to Take Action by Term-End A coalition of more than 60 AI industry players is pushing Congress to prioritize legislation that would codify the U.S. Artificial Intelligence Safety Institute. The letter says the action would allow U.S. to maintain influence in the development of science-backed standards for advanced AI systems.

article thumbnail

Why DSPM is Essential for Achieving Data Privacy in 2024

Security Affairs

Data Security Posture Management (DSPM) helps organizations address evolving data security and privacy requirements by protecting and managing sensitive information. Data Security Posture Management (DSPM) comes into play– an essential solution for addressing evolving data security and privacy requirements Data plays a significant role and will continue to do so in the future.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

White House Reviewing Updates to HIPAA Security Rule

Data Breach Today

Proposal Will Be Open for Public Comment Next, But Will It Go Anywhere? The Department of Health and Human Service last Friday submitted for White House review long-awaited updates to the 20-year-old HIPAA Security Rule containing modifications aimed at strengthening the cybersecurity of electronic protected health information.

Security 296

More Trending

article thumbnail

Cloud Defender Stream.Security Raises $30M, Eyes US Growth

Data Breach Today

AI-Powered Cloud Remediation, Multi-Cloud Support at Core of Series B Investment With a $30 million boost from Series B funding, Stream.Security will enhance its cloud security offerings. The company’s focus includes auto-remediation, faster, AI-driven threat responses, increased support for multi-cloud and hybrid environments, and boosted market presence in the U.S. and beyond.

Cloud 294
article thumbnail

Ransomware Gang Attack Tactics Have Shifted

KnowBe4

A recent analysis of the ransomware group Meow raises the notion that groups are evolving from using encryption as a tactic to more profitable and cost-effective methods.

article thumbnail

Why Vetting AI Vendor Security Is Critical in Healthcare

Data Breach Today

It's crucial for healthcare sector organizations to vet their artificial intelligence tech vendors in the same robust way they scrutinize the privacy and security practices of all their other third-party suppliers, said attorney Linda Malek of the law firm Crowell & Moring.

article thumbnail

Crooks are targeting Docker API servers to deploy SRBMiner

Security Affairs

Threat actors are targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances, Trend Micro warns. Trend Micro researchers observed attackers targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances. The threat actors used the gRPC protocol over h2c to bypass security and execute crypto mining on Docker hosts, manipulating Docker functionalities via gRPC methods. “The attacker first checked the availability and version o

Mining 125
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Fortinet Discloses Actively Exploited Zero-Day

Data Breach Today

U.S. Federal Government Gives Agencies Three Weeks to Patch or Mitigate Fortinet disclosed an actively exploited vulnerability in its centralized management platform following more than a week of online chatter that edge device manufacturer products have been under renewed attack. Cybersecurity researcher Kevin Beaumont christened the vulnerability "FortiJump.

article thumbnail

New Research: 140% Increase in Callback Phishing

KnowBe4

Researchers at Trustwave observed a 140% increase in callback phishing attacks between July and September 2024. Callback phishing is a social engineering tactic that involves emails and phone calls to trick users into handing over login credentials or other sensitive data or installing malware.

Phishing 130
article thumbnail

How to Thrive in a Distributed Team

Data Breach Today

Tips for Employers on Securing the Home Environment and Promoting Better Hygiene Remote work is a critical part of the future of cybersecurity and many other industries. For those who continue to work remotely or in a hybrid model, the need for robust cybersecurity practices needs to be a priority. But one of the biggest obstacles to that is isolation.

article thumbnail

Nigeria Drops Charges Against Tigran Gambaryan, Jailed Binance Exec and Former IRS Agent

WIRED Threat Level

After eight months, one of the US's most prominent crypto-crime investigators may finally be coming home.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Meta Tests Facial Recognition to Curb Deepfake Scams

Data Breach Today

Firm Won't Deploy Feature in the EU, UK Due to Data Collection Norms Meta is rolling out facial recognition technology on its social media platforms to spot scam ads featuring celebrity deepfakes. Meta took down 8,000 of the "celeb bait" scam ads. The feature also aims to verify the identities of users locked out of their Facebook or Instagram accounts.

article thumbnail

Strategies for Securing Your Supply Chain

IT Governance

What to do when your ‘supply chain’ is really a ‘supply loop’ When I asked Bridget Kenyon – CISO (chief information security officer) for SSCL, lead editor for ISO 27001:2022 and author of ISO 27001 Controls – what she’d like to cover in an interview, she suggested supply chain security. I asked her whether she was thinking about the CrowdStrike incident (which happened just a few weeks prior).

Security 103
article thumbnail

Raspberry Pi just released its own high-performance SSDs and SSD kits

Collaboration 2.0

Here's the perfect way to add high-performance storage to your Raspberry Pi 5 project.

IT 122
article thumbnail

SEC fined 4 companies for misleading disclosures about the impact of the SolarWinds attack

Security Affairs

The SEC fined Unisys, Avaya, Check Point, and Mimecast for misleading disclosures about the impact of the SolarWinds Orion hack. The US Securities and Exchange Commission (SEC) charged four companies, Unisys, Avaya, Check Point, and Mimecast for misleading public disclosures related to the supply chain attack on SolarWinds. The SEC fined the four companies for having downplayed the impact of the attack.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Running out of Gmail storage? How to get another 15GB for free (and not lose anything)

Collaboration 2.0

Whether you're a digital hoarder or separating from a work or school account, you can archive your Google messages and media with this free and clever workaround.

Archiving 105
article thumbnail

U.S. CISA adds Fortinet FortiManager flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiManager flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Fortinet FortiManager missing authentication vulnerability CVE-2024-47575 (CVSS v4 score: 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 132
article thumbnail

Raspberry Pi just released its own high-performance SSDs and SSD kits

Collaboration 2.0

Here's the perfect way to add high-performance storage to your Raspberry Pi 5 project.

IT 98
article thumbnail

U.S. CISA adds Microsoft SharePoint flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft SharePoint flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Microsoft SharePoint Deserialization Vulnerability CVE-2024-38094 (CVSS v4 score: 7.2) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 128
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

I upgraded my Pixel 9 Pro to Android 15. Here are my 5 favorite features so far

Collaboration 2.0

These features might persuade you to finally make the upgrade if you're still hesitant about the Android 15.

97
article thumbnail

Get customer insights and advice at OpenText World 2024

OpenText Information Management

As OpenText World 2024 rapidly approaches, we’re finalizing plans to make this the best event ever. Goose, our AI-generated friend, and his colleagues are excited to guide you through the world of information management in Las Vegas November 18-21. In addition to inspiring keynotes , breakout sessions , pre-conference training , certification opportunities , and networking events , we’re announcing a full slate of customer speakers.

article thumbnail

The ultimate Windows 11 upgrade guide: Everything you need to know

Collaboration 2.0

New to Windows 11? We've got answers to all your questions - from system requirements to TPMs, Windows 12 expectations, and more - including those you didn't think to ask.

94
article thumbnail

New York hospitals have new cybersecurity requirements

Data Protection Report

On October 2, 2024, the New York State Department of Health (DOH) published a new cybersecurity regulation (10 NYCRR 405.46) for all general hospitals licensed pursuant to article 28 of the Public Health Law. Although most of the regulation will take effect in one year, on October 2, 2025, the requirement that covered hospitals provide notice to DOH within 72 hours of a “Cybersecurity incident” (which can include third party incidents) went into effect upon publication.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Get one of the best battery-powered Ring video doorbells for only $100

Collaboration 2.0

If you're a Ring user looking to upgrade to a battery-powered video doorbell, the Ring Battery Doorbell Plus is the perfect choice, especially at 33% off with this limited time deal.

92
article thumbnail

Cybersecurity Month Checklist: Fortify Your Digital Defenses

Thales Cloud Protection & Licensing

Cybersecurity Month Checklist: Fortify Your Digital Defenses madhav Thu, 10/24/2024 - 05:32 October is Cybersecurity Awareness Month, an international initiative that educates everyone about online safety and empowers people and businesses to protect their data from malicious actors. As tales of devastating data breaches and cyberattacks litter the headlines, the month reminds us that there are simple, effective ways to stay safe online, protect data, and ultimately help “Secure Our World” - the

article thumbnail

Have a Windows problem that you just can't fix? Try this ultimate troubleshooting trick

Collaboration 2.0

If you keep bumping into annoying Windows problems, the solution might be easier than you think. Skip the clean install and try this fix instead. It's fast and easy, and the results can be nearly miraculous.

IT 92