Fri.Aug 02, 2024

article thumbnail

Zeroing in on Zero Trust

Data Breach Today

How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.

article thumbnail

News alert: Security Risk Advisors launchs VECTR Enterprise Edition for ‘purple team’ benchmarking

The Last Watchdog

Philadelphia, PA, Aug. 1, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition , a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking. VECTR Enterprise is designed to support organizations that want to mature and communicate the success of their purple team exercises with benchmarking and executive reporting features.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CrowdStrike Faces Class Action Lawsuit Over Global IT Outage

Data Breach Today

Investors Say Cybersecurity Company Made False and Misleading Statements About Tech CrowdStrike faces a putative class action lawsuit over the widespread global IT outage in late July that caused major disruptions at airports and hospitals after the company pushed through a faulty update to its Falcon platform, causing its stock prices to plummet.

IT 189
article thumbnail

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

WIRED Threat Level

Social Security numbers, death certificates, voter applications, and other personal data were accessible on the open internet, highlighting the ongoing challenges in election security.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How AI Helps Strengthen Zero Trust Segmentation, Labeling

Data Breach Today

Illumio CEO Andrew Rubin Discusses the Role of Labeling in Effective Segmentation Illumio's Andrew Rubin explains how AI enhances zero trust security by improving labeling accuracy, which is essential for effective segmentation. Rubin discusses AI's potential to streamline security processes and covers key partnerships with firms such as Microsoft, Netscope and Wiz.

Security 162

More Trending

article thumbnail

US AI Safety Body to Get Early Access to OpenAI's Next Model

Data Breach Today

OpenAI Has Previously Been Criticized for Prioritizing Profits Over Safety OpenAI is "excited" to provide early access to its next foundational model to a U.S. federal body that assesses the safety of the technology, founder Sam Altman said on Thursday. OpenAI earlier essentially disbanded a "superalignment" security team set up to prevent AI systems from going rogue.

Access 147
article thumbnail

Investors sued CrowdStrike over false claims about its Falcon platform

Security Affairs

Investors have sued CrowdStrike because the cybersecurity firm made false claims about its Falcon platform. Investors have sued CrowdStrike because the company made false and misleading claims on the testing of its Falcon platform. In July, a faulty update released by CrowdStrike Falcon caused Windows systems to display a BSoD screen. The incident caused widespread global disruptions, impacting critical infrastructure such as airports, hospitals, and TV stations.

IT 131
article thumbnail

Reimbursement Strategies Drive Down APP Scam Losses in UK

Data Breach Today

Customer Reimbursement Guidelines Are Convincing Banks to Scrutinize Transactions Despite making some progress in tackling APP scams, smaller payment firms still struggle with high fraud rates compared to large banks, as highlighted in a report by the U.K.’s Payment Systems Regulator. Customer reimbursement guidelines have prompted banks to scrutinize suspicious payments.

147
147
article thumbnail

Phishing Attacks Continue to Leverage URL Shorteners to Obfuscate Malicious Links

KnowBe4

Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services, concealing a links.

Phishing 126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Android Malware BingoMod Steals Money, Wipes Devices

Data Breach Today

Malware Enables Overlay Attacks and Remote Access to Compromised Devices A newly discovered remote access Trojan is attacking Android users primarily to initiate money transfers on infected devices, but it has an additional capability: It can wipe the infected device once it's done. BingoMod masquerades as a mobile security tool.

Access 147
article thumbnail

Prisoner Swap Includes Russian Hackers and KGB Assassin

KnowBe4

Included among the U.S. prisoners being sent back to Russia in the swap are two prominent convicted hackers, both of whom were serving lengthy sentences, and a KGB assassin.

115
115
article thumbnail

Feds Hit Ambulance Company With Big 'Right of Access' Fine

Data Breach Today

HHS OCR: The Firm Took More Than a Year to Provide a Patient With Requested Records Federal regulators smacked an ambulance firm with a $115,200 civil monetary penalty for failing to provide a patient with her requested health records for more than a year. The penalty is the U.S. Department of Health and Human Services' 49th HIPAA "right of access" enforcement action.

Access 130
article thumbnail

New Research: Smaller Companies Receiving Higher Rates Of Phishing Emails

KnowBe4

Researchers at Barracuda have found that smaller companies tend to receive a higher rate of phishing attacks spread across the organization, according to a report looking at the phishing attack surfaces of companies of different sizes.

Phishing 114
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Preparing for the New EU AI Act: Key Compliance Steps

Data Breach Today

Attorney Jonathan Armstrong Discusses the AI Act's Impact on Global Organizations This week, the European Union's AI Act has gone into force, marking a significant step in AI development. Starting Aug. 1, 2024, it will enforce strict rules on high-risk AI systems and prohibit harmful practices, to ensure transparency and protect fundamental rights.

article thumbnail

Global Cyber Attacks See Highest Increases in the Last Two Years

KnowBe4

New analysis of Q2 2024 cyberattacks shows a material growth in the number of attacks experienced weekly by organizations globally with specific.

Security 111
article thumbnail

ISMG Editors: IBM Report Says Data Breach Costs Are Rising

Data Breach Today

Also: Check Point's New CEO; How the US Election Will Affect Federal Cyber Policy In the latest weekly update, Information Security Media Group editors discussed insights from IBM's data breach report, significant leadership changes at Check Point, and the potential impact of the upcoming U.S. election on federal cybersecurity policy.

article thumbnail

Leaked GitHub Python Token

Schneier on Security

Here’s a disaster that didn’t happen : Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container hosted on Docker Hub, which granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF). JFrog discussed what could have happened : The implications of someone finding this leaked token could be extremely severe.

Libraries 111
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

EU AI Act Enters Into Force

Data Breach Today

Regulatory Requirements Will Become Enforceable in Phases The world's first-ever binding regulation on artificial intelligence came into force on Thursday. The law's requirements are set to be enforced in a phased manner. The ban on high-risk AI systems is set to be actionable first, six months after the enforcement date.

article thumbnail

How to replace Windows with Linux Mint on your PC

Collaboration 2.0

Are you sick of Windows fouling up? Do you want to try something different? Then, it's time to try the best Linux desktop, Linux Mint 22.

IT 98
article thumbnail

Russian Cybercriminals to Be Released in Major Prisoner Swap

Data Breach Today

US Agrees to Release Them in Exchange for Wrongfully Detained Americans, Others The United States and its allies agreed to release eight Russian nationals held in prisons around the world for cybercrimes and other criminal activity in exchange for 16 people in the largest post-Cold War prisoner swap between Washington and the Kremlin.

IT 130
article thumbnail

I changed these 5 soundbar settings to instantly improve the audio quality

Collaboration 2.0

If you already have a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are a few steps to take things up a notch.

76
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Powering the transformation from telco to techco

CGI

As a global expert for the communications and media industry at CGI, I am fascinated with the pivotal transformation facing traditional telecom companies (telcos) as they evolve into technology companies (techcos).

article thumbnail

Apple Watch Series 9 vs. Series 8: Which model should you buy?

Collaboration 2.0

You can pick up an Apple Watch Series 9 for just $329 at Walmart, but is it worth the upgrade? We break down the features of the Apple Watch 9 and the Watch Series 8 to help you decide which is the best fit.

IT 76
article thumbnail

U.S. released Russian cybercriminals in diplomatic prisoner exchange

Security Affairs

Today, 24 prisoners were released in an international swap between Russia and Western countries, including convicted Russian cybercriminals. In the recent international prisoner swap two notorious Russian cybercriminals, Roman Seleznev (40) and Vladislav Klyushin (42), are among those released. Today the United States, the Russian Federation, and Germany did a prisoner swap.

Military 139
article thumbnail

Have a soundbar? I found 5 ways to maximize your audio quality

Collaboration 2.0

If you already have a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are some simple steps to make it sound even better.

IT 76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Friday Squid Blogging: Treating Squid Parasites

Schneier on Security

A newly discovered parasite that attacks squid eggs has been treated. Blog moderation policy.

100
100
article thumbnail

The brightest flashlights of 2024: Expert recommended

Collaboration 2.0

Ranging from 1,700 to 200,000 lumens, these are the brightest flashlights that experts say illuminate just about anything, for emergencies and more.

76
article thumbnail

The best earbuds I've ever listened to are not by Bose or Sony (and they're on sale)

Collaboration 2.0

The Denon PerL earbuds retain the same ultra high-quality sound as the Pro version, but are half the price, at $160 on Amazon.

Sales 76