Fri.Aug 09, 2024

article thumbnail

UK proposes New Cyber Security and Resilience Bill to Boost the UK’s Cyber Defences

Data Matters

During the King’s Speech on 17 July 2024, the newly appointed UK Prime Minister announced the UK Government’s intention to introduce a new Cyber Security and Resilience Bill to strengthen the UK’s defences against the global rise in cyberattacks and to protect the UK’s critical infrastructure. In background briefing notes published together with the King’s Speech, the UK Government stated that the new Cyber Security and Resilience Bill will “strengthen our defences and ensure that more essential

Security 166
article thumbnail

ISMG Editors: Is Russia Waging War Through Ransomware?

Data Breach Today

Also: Lone-Wolf Operators, Attacks on Medical Supply Chains – What's Next? In the latest weekly update, ISMG editors explore evolving ransomware threats, including rising attacks in healthcare and other critical sectors, a shift from cybercrime groups such as LockBit to lone-wolf operators, and why Russian ransomware gangs are dominating the global stage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

WIRED Threat Level

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.

IT 145
article thumbnail

How New Global AI Standards Can Shape Ethical AI Practices

Data Breach Today

Craig Civil of BSI on Implementing ISO/IEC 42001 Standard Within the Organization ISO/IEC 42001, launched in late 2023, is the world's first AI management system standard, offering a framework to ensure responsible AI practices. Craig Civil, director of data science and AI at BSI, discusses the importance of AI policies and BSI's plans to implement the standard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Sonos smart speakers flaw allowed to eavesdrop on users

Security Affairs

NCC Group discovered vulnerabilities in Sonos smart speakers, including a flaw that could have allowed to eavesdrop on users. Researchers from NCC Group have discovered multiple vulnerabilities in Sonos smart speakers, including a flaw, tracked as CVE-2023-50809, that could have allowed eavesdropping on users. The researchers have disclosed the vulnerabilities during the BLACK HAT USA 2024 conference.

More Trending

article thumbnail

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

WIRED Threat Level

A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.

article thumbnail

Rhysida Claims Major Data Theft From 2 More Health Systems

Data Breach Today

Group Threatens to Sell Data From Bayhealth and Community Care Alliance on Dark Web Ransomware group Rhysida is shaking down at least two new victims in the healthcare sector - Bayhealth and Community Care Alliance - threatening to sell or dump patients' sensitive health and personal information on the dark web. Bayhealth confirmed that it is investigating a recent cyberattack.

article thumbnail

ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look

WIRED Threat Level

Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.

Security 132
article thumbnail

Delta Versus CrowdStrike and Microsoft: Accusations Fly

Data Breach Today

After IT Outage, Firms Question Why Delta's Competitors Recovered So Much Faster Delta Air Lines' war of words against CrowdStrike and Microsoft over its extended IT outage continue to escalate, with the airline threatening litigation to recover $500 million in lost revenue and expenses. CrowdStrike and Microsoft have pledged to vigorously fight any such litigation.

IT 147
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Five zero-days impacts EoL Cisco Small Business IP Phones. Replace them with newer models asap!

Security Affairs

Cisco warns of critical remote code execution zero-day vulnerabilities impacting end-of-life Small Business SPA 300 and SPA 500 series IP phones. Cisco warns of multiple critical remote code execution zero-day vulnerabilities in end-of-life Small Business SPA 300 and SPA 500 series IP phones. “Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an attacker to execute arbi

IT 128
article thumbnail

Not Just Us: North Korean Remote IT Fraudster Arrested in Tennessee

KnowBe4

Just when we thought we had something special with our very own North Korean hacker , it turns out this type of fraud has made it to the Volunteer State.

IT 124
article thumbnail

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

WIRED Threat Level

The vulnerabilities, which have been patched, may have novel appeal to attackers as an avenue to compromising phones.

Security 115
article thumbnail

A Whopping 33% of Young American Are Exposed to Political Lies on TikTok

KnowBe4

Excellent reporting by the Wall Street Journal! They wrote about a disturbing trend. "Amid a deluge of election news and memes on TikTok, WSJ found thousands of videos with political lies and hyperbole.

118
118
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

People-Search Site Removal Services Largely Ineffective

Schneier on Security

Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are largely ineffective. Private information about each participant on the people-search sites decreased after using the people-search removal services. And, not surprisingly, the removal services did save time compared with manually opting out.

Privacy 112
article thumbnail

Have you used Cash App in the last 6 years? You might be eligible for $2,500

Collaboration 2.0

As part of a $15 million class action settlement, Cash App users who experienced losses from a data breach can get some money back. Here's how.

article thumbnail

[WHOA] - This 'Unpatch Attack' Is A New One To Me!

KnowBe4

In a startling revelation at Black Hat 2024, SafeBreach security researcher Alon Leviev demonstrated a critical vulnerability in Windows systems, dubbed the "Windows Downdate" attack.

article thumbnail

How to use Apple Pay in stores and online (and why you should)

Collaboration 2.0

It's super convenient, more secure than swiping a card, and so simple to set up. Enjoy fast, contactless checkout with your iPhone - or Apple Watch - most anywhere you shop.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

OpenText Analytics Database: The ELT Advantage

OpenText Information Management

The choice between ETL (Extract, Transform, Load) and ELT (Extract, Load, Transform) is crucial in the modern data management landscape. OpenText Analytics Database (Vertica), with its advanced analytics database, emerges as a powerful ally for businesses leaning towards the ELT methodology. Here's why: Seamless Integration with ELT Processes The OpenText Analytics Database (Vertica) is designed to thrive in an ELT-centric environment.

article thumbnail

Bluetti slashes power station prices in big summer sale

Collaboration 2.0

Save hundreds of dollars on many of Bluetti's most popular power stations - and power station/solar panel bundles. We've got exclusive discount codes, too.

Sales 76
article thumbnail

6 VPN Security Best Practices for Secure Connection

eSecurity Planet

Every network connection, every device, every user—well-meaning or not—exposes a network to risk. But you can’t do business in an unconnected silo. Online commerce drives the velocity of business from front-end to back-end. Types of devices using network access have proliferated. This has made businesses more responsive, more agile—and more vulnerable.

article thumbnail

The best laptops of 2024: Expert tested and reviewed

Collaboration 2.0

We've gone hands-on with dozens of laptops this year from Apple, Dell, LG, and more so you can find the best fit.

76
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

Schneier on Security

Yet another SQUID acronym : SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how AI models analyze the genome. Compared with other analysis tools, SQUID is more consistent, reduces background noise , and can lead to more accurate predictions about the effects of genetic mutations.

IT 102
article thumbnail

The best iPhone models of 2024: Expert tested and reviewed

Collaboration 2.0

ZDNET has tested every iPhone model available on the market, including the Pro Max and Mini. Here are your best options.

article thumbnail

You can upgrade your old PC to Windows 11 - even if Microsoft says it's 'incompatible'. Here's how

Collaboration 2.0

You don't have to throw away a perfectly good PC just because it doesn't meet Microsoft's strict Windows 11 compatibility standards. Here's how you can work around the restrictions and safely upgrade a Windows 10 PC.

IT 76
article thumbnail

This stereo amp made me feel like I was listening to my favorite songs for the first time

Collaboration 2.0

As an audiophile, I appreciate high-quality products that don't break the bank, and Outlaw Audio's RR 2160 Mk II retro stereo receiver is exactly that.

75
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Intel has news - good, bad and ugly - about Raptor Lake bug patch. Here's what to know

Collaboration 2.0

Users must download and install a BIOS update as the patch won't be made available via Windows Update.

75
article thumbnail

This rugged power bank is one of the fastest I've used - and it's so close to perfect

Collaboration 2.0

I completed a 850-mile road trip in 24 hours, and the BioLite Charge 100 Max kept my devices powered with no sweat.

IT 75
article thumbnail

Free ChatGPT users can now create images with DALL-E 3, but there's a catch

Collaboration 2.0

Previously, image generation via DALL-E 3 was available only to paid ChatGPT Plus subscribers.

75