Fri.Dec 20, 2024

article thumbnail

Editors' Panel: Cybersecurity 2024 - Thanks for the Memories

Data Breach Today

Looking Back on the Ransomware Attacks, Resilience Lessons and Tech Trends In the latest weekly update, ISMG editors discussed defining cybersecurity moments of 2024, from the CrowdStrike outage and its implications for vendor resilience to ransomware's continued evolution, and the shifting dynamics in the tech industry affecting startups and M&A activity.

article thumbnail

Want to save your old computer? Try these 6 Linux distros

Collaboration 2.0

Here's how to save money, reduce e-waste, and extend the life of your old hardware at the same time.

98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Alleged LockBit Coder Faces 41-Count Indictment in US

Data Breach Today

US Seeks Extradition of Dual Russian and Israeli Citizen Rostislav Panev from Israel A newly unsealed U.S. federal indictment against Rostislav Panev says the LockBit ransomware operation paid the Israeli national a $10,000 monthly salary for coding and consulting services. Federal prosecutors are seeking Panev's extradition from Israel following his August arrest.

article thumbnail

This free AI training from IBM could boost your resume in 10 hours

Collaboration 2.0

I spent a weekend earning my digital credential in AI from IBM. The last session was my favorite.

98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ascension Notifying 5.6 Million Affected by Ransomware Hack

Data Breach Today

Missouri-Based Hospital Chain Initially Reported That Attack Affected Only 500 Seven months after a ransomware disrupted its IT systems for weeks, Catholic hospital chain Ascension Health is now notifying nearly 5.6 million current and former patients and employees that the incident - which also involved data theft - potentially compromised their information.

More Trending

article thumbnail

Atos Completes Financial Restructuring

Data Breach Today

Paris IT Services Giant Reduces Debt by 2.1 Billion Euros French IT services giant Atos announced Thursday the completion of a financial restructuring plan designed to help the debt-ridden company stay afloat. "With no debt maturing before the end of 2029, Atos has the resources and flexibility to implement its mid-term strategy," the company said.

IT 130
article thumbnail

The best LastPass alternatives of 2024: Expert tested

Collaboration 2.0

Are you looking for an alternative password to LastPass? These are the best alternatives with strong security, easy-to-use features, and multi-platform support.

article thumbnail

Siemens Warns of a Critical Vulnerability in UMC

Data Breach Today

Heap Overflow Flaw Threatens Industrial Control Systems Globally Siemens issued a security advisory for a vulnerability affecting industrial control systems in its User Management Component that could enable attackers to execute arbitrary code. The heap-based buffer overflow flaw impacts products used in manufacturing and the energy sector.

article thumbnail

Amazon's AI Shopping Guides helps you research less and shop more. Here's how it works

Collaboration 2.0

The sheer abundance of deals during the holiday season can get overwhelming. Amazon's guides help US customers navigate more than 100 product types.

IT 75
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Federal Cyber Operations Would Downgrade Under Shutdown

Data Breach Today

Government Shutdown Could See Thousands of Federal Cyber Workers Furloughed A looming shutdown could sharply reduce the Cybersecurity and Infrastructure Security Agency's operations, furloughing two-thirds of its workforce and exposing critical federal networks to heightened cyber threats, especially as malicious actors target vulnerable systems during the holiday season.

article thumbnail

My favorite Android shortcut is a productivity cheat code - and works on older phones

Collaboration 2.0

On Google Pixel phones and other devices running stock Android, a swipe and tap is all it takes to revisit your notification history.

IT 74
article thumbnail

Managed XDR, AI and SMB Defense: Barracuda CEO Shares Vision

Data Breach Today

Barracuda CEO Hatem Naguib Shares Strategies for Email Protection, Managed Services With cyberthreats becoming more sophisticated, Barracuda CEO Hatem Naguib explains how managed XDR and AI-driven email protection help SMBs. From stopping phishing attacks to automating incident response, Naguib highlights solutions that streamline operations and address cloud adoption risks.

Phishing 130
article thumbnail

Consumer Financial Protection Bureau Releases Proposed Rule on Fair Credit Reporting Act

Data Matters

On December 3, 2024, the U.S. Consumer Financial Protection Bureau (the CFPB) announced a notice of proposed rulemaking that seeks to significantly expand the scope of the Fair Credit Reporting Act and its implementing regulation, Regulation V (collectively, the FCRA), and to impose new requirements on covered parties, such as data brokers (the Proposed Rule). 1 If implemented as currently drafted, the Proposed Rule would increase the amount of information defined as a consumer report and the nu

Privacy 88
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The best portable power stations of 2024: Expert tested and reviewed

Collaboration 2.0

Going off the grid or need power in a pinch during a power outage? I tested the best power stations to keep your devices running.

72
article thumbnail

Raccoon Infostealer operator sentenced to 60 months in prison

Security Affairs

Raccoon Infostealer operator Mark Sokolovsky was sentenced to 60 months in US prison and ordered to pay over $910,000 in restitution. The US Department of Justice sentenced the Ukrainian national Mark Sokolovsky (28) for his role in the distribution of the Raccoon Infostealer malware. “Ukrainian national Mark Sokolovsky was sentenced today to 60 months in federal prison for one count of conspiracy to commit computer intrusion.” reads the DoJ’s press release. “As part of h

Sales 68
article thumbnail

ZDNET's product of the year: Oura Ring 4 bested Samsung, Apple, and others in 2024

Collaboration 2.0

Blending precision health tracking with elegant design, the Oura Ring 4 underscores the growing importance of health tech in our daily lives.

72
article thumbnail

James Bond-Style Scamming Profits Explode

KnowBe4

There is a type of scam where victims are contacted by someone fraudulently posing as a popular trusted entity (e.g., Amazon, U.S. Post Office, etc.), law enforcement, or an intelligence agency that initially claims to have evidence linking the victim to a global, spy-like scam.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The best HDMI splitters of 2024: Expert recommended

Collaboration 2.0

We tested and researched the best HDMI splitters that provide a convenient and efficient way to distribute HDMI signals to multiple displays. These are our favorites.

64
article thumbnail

Video: Brain Cipher Ransomware Hacks Deloitte

eSecurity Planet

Deloitte has been hacked in a massive data breach attributed to the Brain Cipher ransomware group, exposing 1TB of sensitive information. In this video, our cybersecurity expert dives into the details of the breach, how it happened, and what Deloitte is doing to contain the damage. The post Video: Brain Cipher Ransomware Hacks Deloitte appeared first on eSecurity Planet.

article thumbnail

The best cheap portable power stations of 2024: Expert tested and reviewed

Collaboration 2.0

I tested the best cheap portable power stations that are great for camping, workshops, and power outages. Here's how to pick an excellent system without spending thousands of dollars.

63
article thumbnail

Attackers Abuse HubSpot’s Free Form Builder to Craft Phishing Pages

KnowBe4

A threat actor is abusing HubSpots Free Form Builder service to craft credential-harvesting phishing pages, according to Palo Alto Networks Unit 42.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection flaw, tracked as CVE-2024-12356 (CVSS score of 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 63
article thumbnail

Mobile Phishing Attacks Use New Tactic to Bypass Security Measures

KnowBe4

ESET has published its threat report for the second half of 2024, outlining a new social engineering tactic targeting mobile banking users.

article thumbnail

This Roku Ultra streaming device gave my TV 4K superpowers - and it's on sale right now

Collaboration 2.0

Looking for a fast, reliable streaming device that's easy to use with any smartphone? The Roku Ultra is as good as these gadgets get.

Sales 56
article thumbnail

OpenText Content Cloud Virtual Summit 2025

OpenText Information Management

GenAI is the key to unlocking smarter, more efficient ways to harness your most valuable assetstalent and data. But just how do you elevate your knowledge worker productivity and efficiency and modernize with AI content management? Join the OpenText Content Cloud Summit 2025 on February 13-14, Noon to 3:30 pm EST , a 2-day virtual event packed with opportunities to learn how your teams can leverage intelligent content management to enhance productivity, streamline processes, and unlock business

Cloud 52
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

7 Android widgets to make your phone or tablet more useful

Collaboration 2.0

If you like your Android home screen to give you quick access to information, services, and apps, you should consider adding a small collection of widgets.

Access 52
article thumbnail

Why Automation Is Now Essential

HID Global

With Apple and Google leading the shift to shorter TLS lifespans, IT teams must embrace automation to stay secure and avoid downtime.

article thumbnail

Finally, a luxury soundbar that's compact and delivers immersive audio (and it's $500 off)

Collaboration 2.0

If you don't have much room but still want a rich, elegant look and sound, the Sennheiser Ambeo Soundbar Plus is for you.

IT 51