Thu.Dec 21, 2023

article thumbnail

Cryptohack Roundup: Ledger to Reimburse Hack Victims

Data Breach Today

Also: $3M NFT Trader Theft; Binance's CTFC Settlement This week, Ledger looked to reimburse hack victims, NFT Trader suffered a $3 million theft, the U.S. DOJ announced the first criminal case involving a DeFi smart contract, a court approved Binance's settlement with the U.S. CFTC and a Nigerian court sentenced a pig -butchering scammer.

288
288
article thumbnail

The Future of Collaboration Is Today

AIIM

As organizations have settled into the business of the business, one thing seems clear: the new workplace is much different than the one we were used to. Remote work and virtual teams are now a prevalent way of working, with on-site employees often the exception rather than the rule. Now that work-from-home has proven to be a viable alternative, C-Suite executives and business owners are less likely to invest in the resources, infrastructure, and space needed for all of their workers to return t

163
163
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: MongoDB Blames Phishing Email for Breach

Data Breach Today

Also: Hackers Scrooge The North Face Holiday Shipments This week, MongoDB blamed a phishing email for causing unauthorized access to its corporate environment, hackers interrupted VF Corp. holiday shipping, Britain electrical grid operator National Grid dropped a Chinese supplier, German authorities shut down an online criminal bazaar, and more.

Phishing 303
article thumbnail

Real estate agency exposes details of 690k customers

Security Affairs

An exposed instance contained information for a customer relationship management (CRM) system that likely belongs to Goyzer, a real estate property management software maker, the Cybernews research team has discovered. The data was leaked via a publicly exposed and passwordless MongoDB database, which has since been closed. Businesses employ MongoDB to organize and store large swaths of document-oriented information.

Archiving 136
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cisco Announces Isovalent Acquisition to Boost Security

Data Breach Today

Cisco Continues Investments in New Cloud Security Offerings With Isovalent Deal Cisco announced plans to acquire another cloud security startup as part of a series of recent acquisitions and investments in the company’s multi-cloud networking capabilities and security offerings, including the major $28 billion acquisition of Splunk.

Security 274

More Trending

article thumbnail

NIST Report Spotlights Cyber, Privacy Risks in Genomic Data

Data Breach Today

A Multitude of Considerations for Entities As Use of Genomic Data Advances The explosion in applications using genomic data - from drug and vaccine development and consumer ancestry testing to law enforcement work - is heightening the need to carefully address critical privacy and security concerns around this sensitive data, government authorities say in a new report.

Privacy 260
article thumbnail

Phishing attacks use an old Microsoft Office flaw to spread Agent Tesla malware

Security Affairs

Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882, to spread the Agent Tesla malware. Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882 (CVSS score: 7.8), as part of phishing campaigns to spread the Agent Tesla malware. Agent Tesla is a spyware that is used to spy on the victims by collecting keystrokes, system clipboard, screenshots, and credentials from the infected system.

Phishing 131
article thumbnail

Google Flags 8th Chrome Zero-Day of the Year

Data Breach Today

Exploit for WebRTC Exists in the Wild Google rolled out security updates Wednesday for its Chrome web browser to fix a critical vulnerability exploited in the wild. The zero-day vulnerability is a heap-based buffer overflow bug in the WebRTC framework that allows real-time communication between different browsers and devices.

article thumbnail

ESET fixed a high-severity bug in the Secure Traffic Scanning Feature of several products

Security Affairs

ESET fixes a high-severity flaw in Secure Traffic Scanning Feature that could have been exploited to cause web browsers to trust sites that should not be trusted. ESET has addressed a vulnerability (CVE-2023-5594, CVSS score 7.5) in the Secure Traffic Scanning Feature, preventing potential exploitation that could lead web browsers to trust websites using certificates signed with outdated and insecure algorithms.

Security 129
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Cancer Center Patients Become Attempted Victims of Data Extortion

KnowBe4

Cybercriminals of the lowest kind breached as many as 800,000 patients and then sent emails threatening to sell their data if they didn’t pay a fee to block it from selling.

IT 114
article thumbnail

Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists

Schneier on Security

The Solntsepek group has taken credit for the attack. They’re linked to the Russian military, so it’s unclear whether the attack was government directed or freelance. This is one of the most significant cyberattacks since Russia invaded in February 2022.

Military 105
article thumbnail

Underground Cyber Crime Marketplaces are Now Showing Up on the Open Web

KnowBe4

Marketplaces such as OLVX are shifting from the dark web to the open web to take advantage of traditional web services to assist in marketing to and providing access to new customers.

Marketing 107
article thumbnail

2023 Retrospective: One year at CILIP & 125 years of Chartership

CILIP

2023 Retrospective: One year at CILIP & 125 years of Chartership 125 years since we received our Royal Charter from Queen Victoria, 2023 has been a year of advocacy, action, and new beginnings for CILIP. To celebrate this century and a quarter of Royal Chartership, we created the CILIP 125, a group of 125 cross-sector librarians and info-pros who have shown outstanding work and talent in our field, that were announced CILIP’s leadership-focussed conference in July.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Interest in AI-Generated ‘Undressing’ Increases 2000% as it Becomes a Mainstream Online Business

KnowBe4

The advent of non-consensual intimate imagery (NCII) as a monetized business on the Internet has shifted pornography into the realm of undressing anyone you like.

IT 111
article thumbnail

FinOps and GreenOps drive efficient and green spending 

OpenText Information Management

Cloud operations are an essential part of everyday business for most companies today. And for some organizations, it can be a significant portion of the budget, which means that without proper oversight or discipline, waste and inefficiencies can cost them a lot of money. It can also result in environmentally inefficient IT operations. OpenText … The post FinOps and GreenOps drive efficient and green spending appeared first on OpenText Blogs.

Cloud 64
article thumbnail

Missing the Lock Icon in Chrome’s Address Bar? It’s a Move to Make You More Secure

KnowBe4

In response to what Google calls “over trust” in the web address lock icon to indicate that a site is authentic and its’ communications are secure, they’ve swapped the lock out in an attempt to engage Chrome users in thinking about their own secure browsing.

Security 104
article thumbnail

Mastering Data Management and Collaboration in Legal Tech - Insights from 2023

Hanzo Learning Center

The second part of our 2023 legal tech review series explores the intricate world of data management and collaboration within the legal sector. As the legal industry navigates through the digital transformation, challenges arise in effectively managing and analyzing the ever-growing volumes of collaboration data. This segment delves into how these complexities are being addressed and the role of AI in streamlining data management processes, particularly in the context of pre-litigation scenarios

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Artificial Intelligence: An Opportunity to Augment How Companies Manage Knowledge

Information Matters

A new study published in Business Horizons explores how emerging artificial intelligence (AI) capabilities can enhance knowledge management within enterprises. It articulates AI’s potential role across fundamental dimensions including creating, Read more The post Artificial Intelligence: An Opportunity to Augment How Companies Manage Knowledge appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Analysing Data Breaches Caused by Human Error

IT Governance

A deep dive into the ICO’s numbers We often hear the terms ‘accidental breach’ and ‘internal threat’, but how common are these phenomena? To find out, we looked at the ICO’s (Information Commissioner’s Office) public data set , specifically looking into four data breach types caused by human error: Data emailed to incorrect recipient. Data posted or faxed to incorrect recipient.

article thumbnail

POST-HOLIDAY NETWORKING AND CHARITY EVENT via ARMA New England

IG Guru

Register Here The post POST-HOLIDAY NETWORKING AND CHARITY EVENT via ARMA New England first appeared on IG GURU.

86
article thumbnail

Jamf to archive NoMAD open-source projects

Jamf

By the end of December 2023, multiple NoMAD projects will become read-only and will no longer be maintained.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Reshoring manufacturing to the US: The role of AI, automation and digital labor

IBM Big Data Hub

Reshoring manufacturing to the US ­ has been a significant trend in recent years, driven by geopolitical tensions, supply chain disruptions, proximity to customers and markets, eco-system synergies and the need for positive impact on the domestic economy. However, reshoring presents several challenges—mainly workforce, technical and economic issues.

article thumbnail

Grading my 2023 Predictions: The Batting Average Dips

John Battelle's Searchblog

Well that was one hell of a year. As I do each December, it’s time to grade my own homework. And the past twelve months certainly started out well. But unless a certain fascistic presidential candidate has a change of heart in the next few days (he won’t), I’m afraid I didn’t break.500 this year (last year I was smokin’ hot , I must say).

article thumbnail

Senate Confirms Biden's Pick to Lead NSA and CYBERCOM

Data Breach Today

Senate Approves Pentagon Nominees After Republican Lawmaker Drops 10-Month Blockade Air Force Lt. Gen. Timothy Haugh has been confirmed as the next head of the NSA and U.S. Cyber Command after Sen. Tommy Tuberville, R-Ala., ended a 10-month protest over a Pentagon policy allowing service members to seek travel reimbursement and paid time off when in need of an abortion.

260
260