Fri.Aug 02, 2024

article thumbnail

CrowdStrike Faces Class Action Lawsuit Over Global IT Outage

Data Breach Today

Investors Say Cybersecurity Company Made False and Misleading Statements About Tech CrowdStrike faces a putative class action lawsuit over the widespread global IT outage in late July that caused major disruptions at airports and hospitals after the company pushed through a faulty update to its Falcon platform, causing its stock prices to plummet.

IT 189
article thumbnail

News alert: Security Risk Advisors launchs VECTR Enterprise Edition for ‘purple team’ benchmarking

The Last Watchdog

Philadelphia, PA, Aug. 1, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition , a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking. VECTR Enterprise is designed to support organizations that want to mature and communicate the success of their purple team exercises with benchmarking and executive reporting features.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zeroing in on Zero Trust

Data Breach Today

How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.

article thumbnail

Avtech camera vulnerability actively exploited in the wild, CISA warns

Security Affairs

CISA warned that an Avtech camera vulnerability, which is still unpatched, is being actively exploited in the wild. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn of a vulnerability, tracked as CVE-2024-7029 (CVSS base score of 8.8), in Avtech camera that has been exploited in the wild. An attacker can exploit this flaw to inject and execute commands as the owner of the running process. “Successful exploitation of this vulnerability could a

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How AI Helps Strengthen Zero Trust Segmentation, Labeling

Data Breach Today

Illumio CEO Andrew Rubin Discusses the Role of Labeling in Effective Segmentation Illumio's Andrew Rubin explains how AI enhances zero trust security by improving labeling accuracy, which is essential for effective segmentation. Rubin discusses AI's potential to streamline security processes and covers key partnerships with firms such as Microsoft, Netscope and Wiz.

Security 162

More Trending

article thumbnail

US AI Safety Body to Get Early Access to OpenAI's Next Model

Data Breach Today

OpenAI Has Previously Been Criticized for Prioritizing Profits Over Safety OpenAI is "excited" to provide early access to its next foundational model to a U.S. federal body that assesses the safety of the technology, founder Sam Altman said on Thursday. OpenAI earlier essentially disbanded a "superalignment" security team set up to prevent AI systems from going rogue.

Access 147
article thumbnail

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

WIRED Threat Level

Social Security numbers, death certificates, voter applications, and other personal data were accessible on the open internet, highlighting the ongoing challenges in election security.

article thumbnail

Reimbursement Strategies Drive Down APP Scam Losses in UK

Data Breach Today

Customer Reimbursement Guidelines Are Convincing Banks to Scrutinize Transactions Despite making some progress in tackling APP scams, smaller payment firms still struggle with high fraud rates compared to large banks, as highlighted in a report by the U.K.’s Payment Systems Regulator. Customer reimbursement guidelines have prompted banks to scrutinize suspicious payments.

147
147
article thumbnail

Leaked GitHub Python Token

Schneier on Security

Here’s a disaster that didn’t happen : Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container hosted on Docker Hub, which granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF). JFrog discussed what could have happened : The implications of someone finding this leaked token could be extremely severe.

Libraries 103
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Android Malware BingoMod Steals Money, Wipes Devices

Data Breach Today

Malware Enables Overlay Attacks and Remote Access to Compromised Devices A newly discovered remote access Trojan is attacking Android users primarily to initiate money transfers on infected devices, but it has an additional capability: It can wipe the infected device once it's done. BingoMod masquerades as a mobile security tool.

Access 147
article thumbnail

Phishing Attacks Continue to Leverage URL Shorteners to Obfuscate Malicious Links

KnowBe4

Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services, concealing a links.

Phishing 111
article thumbnail

Feds Hit Ambulance Company With Big 'Right of Access' Fine

Data Breach Today

HHS OCR: The Firm Took More Than a Year to Provide a Patient With Requested Records Federal regulators smacked an ambulance firm with a $115,200 civil monetary penalty for failing to provide a patient with her requested health records for more than a year. The penalty is the U.S. Department of Health and Human Services' 49th HIPAA "right of access" enforcement action.

Access 130
article thumbnail

Prisoner Swap Includes Russian Hackers and KGB Assassin

KnowBe4

Included among the U.S. prisoners being sent back to Russia in the swap are two prominent convicted hackers, both of whom were serving lengthy sentences, and a KGB assassin.

101
101
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Preparing for the New EU AI Act: Key Compliance Steps

Data Breach Today

Attorney Jonathan Armstrong Discusses the AI Act's Impact on Global Organizations This week, the European Union's AI Act has gone into force, marking a significant step in AI development. Starting Aug. 1, 2024, it will enforce strict rules on high-risk AI systems and prohibit harmful practices, to ensure transparency and protect fundamental rights.

article thumbnail

New Research: Smaller Companies Receiving Higher Rates Of Phishing Emails

KnowBe4

Researchers at Barracuda have found that smaller companies tend to receive a higher rate of phishing attacks spread across the organization, according to a report looking at the phishing attack surfaces of companies of different sizes.

article thumbnail

ISMG Editors: IBM Report Says Data Breach Costs Are Rising

Data Breach Today

Also: Check Point's New CEO; How the US Election Will Affect Federal Cyber Policy In the latest weekly update, Information Security Media Group editors discussed insights from IBM's data breach report, significant leadership changes at Check Point, and the potential impact of the upcoming U.S. election on federal cybersecurity policy.

article thumbnail

How to replace Windows with Linux Mint on your PC

Collaboration 2.0

Are you sick of Windows fouling up? Do you want to try something different? Then, it's time to try the best Linux desktop, Linux Mint 22.

IT 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

EU AI Act Enters Into Force

Data Breach Today

Regulatory Requirements Will Become Enforceable in Phases The world's first-ever binding regulation on artificial intelligence came into force on Thursday. The law's requirements are set to be enforced in a phased manner. The ban on high-risk AI systems is set to be actionable first, six months after the enforcement date.

article thumbnail

Global Cyber Attacks See Highest Increases in the Last Two Years

KnowBe4

New analysis of Q2 2024 cyberattacks shows a material growth in the number of attacks experienced weekly by organizations globally with specific.

article thumbnail

Russian Cybercriminals to Be Released in Major Prisoner Swap

Data Breach Today

US Agrees to Release Them in Exchange for Wrongfully Detained Americans, Others The United States and its allies agreed to release eight Russian nationals held in prisons around the world for cybercrimes and other criminal activity in exchange for 16 people in the largest post-Cold War prisoner swap between Washington and the Kremlin.

IT 130
article thumbnail

AI can help businesses design for positive externalities

Collaboration 2.0

By leveraging AI's predictive and analytical capabilities, companies can make more informed decisions that benefit not only their bottom line but also society and the environment.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Powering the transformation from telco to techco

CGI

As a global expert for the communications and media industry at CGI, I am fascinated with the pivotal transformation facing traditional telecom companies (telcos) as they evolve into technology companies (techcos).

article thumbnail

I changed these 5 soundbar settings to instantly improve the audio quality

Collaboration 2.0

If you already have a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are a few steps to take things up a notch.

98
article thumbnail

U.S. released Russian cybercriminals in diplomatic prisoner exchange

Security Affairs

Today, 24 prisoners were released in an international swap between Russia and Western countries, including convicted Russian cybercriminals. In the recent international prisoner swap two notorious Russian cybercriminals, Roman Seleznev (40) and Vladislav Klyushin (42), are among those released. Today the United States, the Russian Federation, and Germany did a prisoner swap.

Military 130
article thumbnail

Have a soundbar? I found 5 ways to maximize your audio quality

Collaboration 2.0

If you already have a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are some simple steps to make it sound even better.

IT 98
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Friday Squid Blogging: Treating Squid Parasites

Schneier on Security

A newly discovered parasite that attacks squid eggs has been treated. Blog moderation policy.

92
article thumbnail

5 Linux terminal apps that are better than your default

Collaboration 2.0

The Linux terminal isn't something every user has to deal with. But when you do, you'll want a terminal that either makes the job a bit easier or is awesome enough to make you not mind using it. Here are five options.

IT 98
article thumbnail

Apple Watch Series 9 vs. Series 8: Which model should you buy?

Collaboration 2.0

You can pick up an Apple Watch Series 9 for just $329 at Walmart, but is it worth the upgrade? We break down the features of the Apple Watch 9 and the Watch Series 8 to help you decide which is the best fit.

IT 98