Fri.Oct 18, 2024

article thumbnail

North Korean IT Scam Workers Shift to Extortion Tactics

Data Breach Today

Report Reveals North Korean Workers Expanding into Intellectual Property Theft North Korean threat actors posing as remote information technology workers are increasingly extorting ransom from Western companies after securing jobs under false pretenses, according to a new report from Secureworks' counter threat unit.

IT 254
article thumbnail

Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach

Krebs on Security

Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being “ USDoD ,” a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI’s InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a significant portion of the U.S. population.

Passwords 188
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CyberArk CEO on Why Venafi's Machine Identity Chops Matter

Data Breach Today

Matt Cohen on How CyberArk Plans to Unify Machine, Human Identity Security by 2026 CyberArk's $1.54 billion acquisition of Venafi strengthens its leadership in identity security, integrating machine identity management with its current human identity platform, according to CEO Matt Cohen. The deal will address growing threats from ephemeral workloads and complex infrastructures.

Security 236
article thumbnail

Top 9 Trends In Cybersecurity Careers for 2025

eSecurity Planet

Technologies that were figments of the imagination a dozen years ago, if they were conceived of at all, quickly become mainstream — think generative artificial intelligence (GenAI) or blockchain. As they do, they create more security vulnerabilities and inherent business, changing the nature of cybersecurity careers. According to research by IBM Corp. and the Ponemon Institute, the average security breach cost reached $4.88 million in 2024 — 10% more than the previous year and the highest averag

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

BlackBerry Cuts Cylance Spend to Focus on Profitable Areas

Data Breach Today

Company Shifts Cyber Focus to QNX and Secure Communications as Key Growth Drivers As Cylance continues to incur significant losses, BlackBerry is reallocating resources toward its more promising QNX and secure communications teams. The company expects its cybersecurity unit to stabilize and become profitable by the end of the fiscal year thanks to strategic bets and cost cuts.

More Trending

article thumbnail

Military Exercises Trigger Russian DDoS Attacks on Japan

Data Breach Today

Russian Actors Disrupt Websites of Political Party, Business and Government Groups Plans by Japan and U.S. to conduct military exercises near the coast of eastern Russia prompted Russia-linked threat actors to unleash a series of denial-of-service attacks this week against a dozen websites in Japan including the majority political party, business groups and governments.

Military 216
article thumbnail

macOS HM Surf flaw in TCC allows bypass Safari privacy settings

Security Affairs

Microsoft disclosed a flaw in the macOS Apple’s Transparency, Consent, and Control (TCC) framework that could allow it to bypass privacy settings and access user data. Microsoft discovered a vulnerability, tracked as CVE-2024-44133 and code-named ‘HM Surf’, in Apple’s Transparency, Consent, and Control (TCC) framework in macOS.

Privacy 104
article thumbnail

ISMG Editors: DSPM, DLP Converge to Reshape Data Security

Data Breach Today

Also: Impact of NIS2 Directive in Europe, Cloud Governance Challenges In the latest weekly update, ISMG editors discussed the strategic convergence of data security posture management and data loss prevention technologies, evolving priorities of security leaders and the urgent readiness challenges posed by the NIS2 Directive.

Security 206
article thumbnail

Thinktanks issue UK ‘wake-up’ call to danger posed by scientific racism

The Guardian Data Protection

Guardian and Hope Not Hate investigation has ‘raised the stakes’ over threat posed by rightwing ideology Health institutions and policymakers need to “wake up” to the danger posed by scientific racism and attempts to normalise an ideology that poses a significant threat to minority communities, thinktanks have warned. The Institute of Race Relations, the Race Equality Foundation and Race on the Agenda say they have been raising their voices about the return of “race science” beliefs as a subject

104
104
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

BianLian Ransomware Gang Claims Heist of Pediatric Data

Data Breach Today

Boston Children's Health Physicians Says Incident Involved Unnamed IT Vendor Ransomware gang BianLian has listed Boston Children's Health Physicians - a pediatric group that practices in New York and Connecticut - on its dark web site, threatening to release stolen patient and employee data. The practice said the September incident involved an IT vendor.

article thumbnail

The Disinformation Warning Coming From the Edge of Europe

WIRED Threat Level

Moldova is facing a tide of disinformation unprecedented in complexity and aggression, the head of a new center meant to combat it tells WIRED. And platforms like Facebook, TikTok, Telegram and YouTube could do more.

IT 93
article thumbnail

UK Company Hacked After Accidentally Hiring North Korean Cybercriminal

KnowBe4

In a shocking turn of events, an unnamed company based in the UK has fallen victim to a sophisticated cyber attack after inadvertently hiring a North Korean hacker as a remote IT worker.

IT 89
article thumbnail

Buy 3 months of Xbox Game Pass Ultimate for 28% off with this deal

Collaboration 2.0

Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.

98
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Phishing Attacks Are Abusing Legitimate Services to Avoid Detection

KnowBe4

Microsoft warns that threat actors are abusing legitimate file-hosting services to launch phishing attacks. These attacks are more likely to bypass security filters and appear more convincing to employees who frequently use these services.

article thumbnail

Justice Department Indicts Tech CEO for Falsifying Security Certifications

Schneier on Security

The Wall Street Journal is reporting that the CEO of a still unnamed company has been indicted for creating a fake auditing company to falsify security certifications in order to win government business.

article thumbnail

What the US Army’s 1959 ‘Soldier of Tomorrow’ Got Right About the Future of Warfare

WIRED Threat Level

Sixty-five years ago, the Army's leaders unveiled its “ultimate weapon” for the age of atomic warfare. Here’s how the service’s vision stands up to today's reality.

IT 91
article thumbnail

Iran-linked actors target critical infrastructure organizations

Security Affairs

U.S. and allies warn of attacks from Iran-linked actors targeting critical infrastructure through brute-force attacks in a year-long campaign. Intelligence and cybersecurity agencies from the U.S., Australia, and Canada, warn about a year-long campaign carried out by Iran-linked threat actors to break into critical infrastructure organizations via brute force and password spraying attacks.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

FBI Warns Scammers Are Targeting Law Firms For Phony Debt Collections

KnowBe4

The U.S. FBI warns that scammers are attempting to trick law firms into transferring money as part of a phony debt collection scheme.

article thumbnail

This 4-in-1 keychain charger is my new essential travel accessory

Collaboration 2.0

Rolling Square's InCharge XS charges via USB-C, USB-A, and iPhone Lightning in one versatile cable that's small enough to fit on your keychain.

98
article thumbnail

OpenText World 2024: Are supply chain control towers enough?

OpenText Information Management

As one of the busiest airports in the U.S., Harry Reid International Airport in Las Vegas handles a large volume of commercial, private, and charter flights. The airport's air traffic control tower is critical in managing these flows and keeping the busy air space safe and organized. At 352 feet (107 meters) tall, the control tower at Harry Reid International is one of the tallest in the United States.

article thumbnail

Save $20 on an Apple AirTag 4-Pack with this deal

Collaboration 2.0

If you're an iPhone user, you could probably use these trackers to monitor your keys, wallet, luggage, and even your young kids, especially with this $20 discount.

98
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

CILIP writes to Helen Hayes MP, Chair, Education Select Committee

CILIP

CILIP writes to Helen Hayes MP, Chair, Education Select Committee Banner image of lanterns outside parliament by Ryan Hurril via Flickr. CILIP CEO, Louis Coiffait-Gunn writes to Helen Hayes MP to congratulate on her appointment as Chair, Education Select Committee, and invite her the Libraries Change Lives Parliamentary Event In the letter, Louis highlights Helen Hayes' commitment to championing the interests of children, young people, parents, and those seeking to retrain.

article thumbnail

Cash App users have less than a month to claim up to a $2,500 settlement payout

Collaboration 2.0

If you experienced losses from Cash App's data breaches, you may be able to get some money back as part of a $15 million class action settlement. Here's how.

article thumbnail

Compare Antivirus Software 2025: Bitdefender vs ESET

eSecurity Planet

An antivirus can provide peace of mind for users worried about accidentally encountering malware while scrolling online. A good antivirus can successfully detect and, in some cases, remove malware before it can seriously damage your device. While the antivirus industry can feel overwhelmingly large, we only look at two providers today: Bitdefender and ESET Antivirus.

article thumbnail

The 2-in-1 laptop I recommend most is not a Lenovo or a Dell (and it's on sale right now)

Collaboration 2.0

HP's 2024 Envy x360 2-in-1 strikes a perfect balance by having well-optimized hardware, a vibrant display, and, most importantly, a low price tag. The base model is currently selling at a discount.

Sales 75
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

FCA Unveils AI Lab to Facilitate Industry Implementation

Information Matters

In a move to address the challenges of artificial intelligence adoption in the financial sector, the Financial Conduct Authority (FCA) has launched its AI Lab initiative. This development, announced by Read more The post FCA Unveils AI Lab to Facilitate Industry Implementation appeared first on Information Matters - AI in the UK.

article thumbnail

The Ring Battery Doorbell Plus is the perfect video doorbell for Ring fans

Collaboration 2.0

If you're a Ring user looking to upgrade to a battery-powered video doorbell, the Ring Battery Doorbell Plus is the perfect choice.

97
article thumbnail

Tech Nation Spotlights Rising AI Stars in Future Fifty 2024 Report

Information Matters

The influential Tech Nation Future Fifty 2024 report, released Friday, highlights 50 of the fastest-growing and most promising tech companies in the UK. Notably, the cohort features a strong showing Read more The post Tech Nation Spotlights Rising AI Stars in Future Fifty 2024 Report appeared first on Information Matters - AI in the UK.

52