Fri.Aug 09, 2024

article thumbnail

ISMG Editors: Is Russia Waging War Through Ransomware?

Data Breach Today

Also: Lone-Wolf Operators, Attacks on Medical Supply Chains – What's Next? In the latest weekly update, ISMG editors explore evolving ransomware threats, including rising attacks in healthcare and other critical sectors, a shift from cybercrime groups such as LockBit to lone-wolf operators, and why Russian ransomware gangs are dominating the global stage.

article thumbnail

UK proposes New Cyber Security and Resilience Bill to Boost the UK’s Cyber Defences

Data Matters

During the King’s Speech on 17 July 2024, the newly appointed UK Prime Minister announced the UK Government’s intention to introduce a new Cyber Security and Resilience Bill to strengthen the UK’s defences against the global rise in cyberattacks and to protect the UK’s critical infrastructure. In background briefing notes published together with the King’s Speech, the UK Government stated that the new Cyber Security and Resilience Bill will “strengthen our defences and ensure that more essential

Security 163
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How New Global AI Standards Can Shape Ethical AI Practices

Data Breach Today

Craig Civil of BSI on Implementing ISO/IEC 42001 Standard Within the Organization ISO/IEC 42001, launched in late 2023, is the world's first AI management system standard, offering a framework to ensure responsible AI practices. Craig Civil, director of data science and AI at BSI, discusses the importance of AI policies and BSI's plans to implement the standard.

article thumbnail

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

WIRED Threat Level

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.

IT 145
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Iran Amplifies US Election Influence Campaign

Data Breach Today

Microsoft Says Tehran Has Stepped Up Activity As November Election Day Approaches Iranian operatives stepped up influence and hacking operations against U.S. targets as presidential election ramps up for its final months, warned Microsoft on Thursday. Iran is one of a handful of authoritarian countries that use hacking and disinformation to undermine American democracy.

IT 147

More Trending

article thumbnail

Rhysida Claims Major Data Theft From 2 More Health Systems

Data Breach Today

Group Threatens to Sell Data From Bayhealth and Community Care Alliance on Dark Web Ransomware group Rhysida is shaking down at least two new victims in the healthcare sector - Bayhealth and Community Care Alliance - threatening to sell or dump patients' sensitive health and personal information on the dark web. Bayhealth confirmed that it is investigating a recent cyberattack.

article thumbnail

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

WIRED Threat Level

A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.

article thumbnail

Delta Versus CrowdStrike and Microsoft: Accusations Fly

Data Breach Today

After IT Outage, Firms Question Why Delta's Competitors Recovered So Much Faster Delta Air Lines' war of words against CrowdStrike and Microsoft over its extended IT outage continue to escalate, with the airline threatening litigation to recover $500 million in lost revenue and expenses. CrowdStrike and Microsoft have pledged to vigorously fight any such litigation.

IT 147
article thumbnail

People-Search Site Removal Services Largely Ineffective

Schneier on Security

Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are largely ineffective. Private information about each participant on the people-search sites decreased after using the people-search removal services. And, not surprisingly, the removal services did save time compared with manually opting out.

Privacy 104
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Sonos smart speakers flaw allowed to eavesdrop on users

Security Affairs

NCC Group discovered vulnerabilities in Sonos smart speakers, including a flaw that could have allowed to eavesdrop on users. Researchers from NCC Group have discovered multiple vulnerabilities in Sonos smart speakers, including a flaw, tracked as CVE-2023-50809, that could have allowed eavesdropping on users. The researchers have disclosed the vulnerabilities during the BLACK HAT USA 2024 conference.

article thumbnail

How to use Apple Pay in stores and online (and why you should)

Collaboration 2.0

It's super convenient, more secure than swiping a card, and so simple to set up. Enjoy fast, contactless checkout with your iPhone - or Apple Watch - most anywhere you shop.

article thumbnail

Not Just Us: North Korean Remote IT Fraudster Arrested in Tennessee

KnowBe4

Just when we thought we had something special with our very own North Korean hacker , it turns out this type of fraud has made it to the Volunteer State.

IT 110
article thumbnail

Have you used Cash App in the last 6 years? You might be eligible for $2,500

Collaboration 2.0

As part of a $15 million class action settlement, Cash App users who experienced losses from a data breach can get some money back. Here's how.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

A Whopping 33% of Young American Are Exposed to Political Lies on TikTok

KnowBe4

Excellent reporting by the Wall Street Journal! They wrote about a disturbing trend. "Amid a deluge of election news and memes on TikTok, WSJ found thousands of videos with political lies and hyperbole.

101
101
article thumbnail

ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look

WIRED Threat Level

Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.

article thumbnail

You can upgrade your old PC to Windows 11 - even if Microsoft says it's 'incompatible'. Here's how

Collaboration 2.0

You don't have to throw away a perfectly good PC just because it doesn't meet Microsoft's strict Windows 11 compatibility standards. Here's how you can work around the restrictions and safely upgrade a Windows 10 PC.

IT 76
article thumbnail

OpenText Analytics Database: The ELT Advantage

OpenText Information Management

The choice between ETL (Extract, Transform, Load) and ELT (Extract, Load, Transform) is crucial in the modern data management landscape. OpenText Analytics Database (Vertica), with its advanced analytics database, emerges as a powerful ally for businesses leaning towards the ELT methodology. Here's why: Seamless Integration with ELT Processes The OpenText Analytics Database (Vertica) is designed to thrive in an ELT-centric environment.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

I compared the Google Pixel 8a with every major sub-$500 Android phone - here's my buying advice

Collaboration 2.0

The latest Pixel has standout features, including a comfortable design and reliable cameras, but can its AI features separate it from a crowded mid-range market?

article thumbnail

6 VPN Security Best Practices for Secure Connection

eSecurity Planet

Every network connection, every device, every user—well-meaning or not—exposes a network to risk. But you can’t do business in an unconnected silo. Online commerce drives the velocity of business from front-end to back-end. Types of devices using network access have proliferated. This has made businesses more responsive, more agile—and more vulnerable.

article thumbnail

Bluetti slashes power station prices in big summer sale

Collaboration 2.0

Save hundreds of dollars on many of Bluetti's most popular power stations - and power station/solar panel bundles. We've got exclusive discount codes, too.

Sales 98
article thumbnail

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

WIRED Threat Level

The vulnerabilities, which have been patched, may have novel appeal to attackers as an avenue to compromising phones.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

This stereo amp made me feel like I was listening to my favorite songs for the first time

Collaboration 2.0

As an audiophile, I appreciate high-quality products that don't break the bank, and Outlaw Audio's RR 2160 Mk II retro stereo receiver is exactly that.

98
article thumbnail

[WHOA] - This 'Unpatch Attack' Is A New One To Me!

KnowBe4

In a startling revelation at Black Hat 2024, SafeBreach security researcher Alon Leviev demonstrated a critical vulnerability in Windows systems, dubbed the "Windows Downdate" attack.

article thumbnail

Microsoft's Clipchamp video editor is getting free AI features - and they're very useful

Collaboration 2.0

Available to Microsoft 365 Insiders, noise suppression and image background removal will upgrade your video quality. Here's how to use both.

75
article thumbnail

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

Schneier on Security

Yet another SQUID acronym : SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how AI models analyze the genome. Compared with other analysis tools, SQUID is more consistent, reduces background noise , and can lead to more accurate predictions about the effects of genetic mutations.

IT 94
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

One of the best LG OLED TVs I've tested is now hundreds of dollars off, permanently

Collaboration 2.0

LG's G3 OLED TV may not be the latest model, but it's a sleek, top-of-the-line smart TV with some visually stunning features.

IT 75
article thumbnail

The best iPhone models of 2024: Expert tested and reviewed

Collaboration 2.0

ZDNET has tested every iPhone model available on the market, including the Pro Max and Mini. Here are your best options.

article thumbnail

How safe is OpenAI's GPT-4o? Here are the scores for privacy, copyright infringement, and more

Collaboration 2.0

The AI giant's latest System Card tracks performance across key categories like cybersecurity, model autonomy, and more.

Privacy 75