Wed.Jun 26, 2024

article thumbnail

Bogus: LockBit's Claimed Federal Reserve Ransomware Hit

Data Breach Today

Actual Victim: Evolve Bank, Now Dealing With Open Banking Enforcement Action by Fed More reasons to beware breathless reporting about a ransomware group's latest supposed victim: LockBit's claim to have breached the U.S. Federal Reserve Bank. Instead, the actual victim is Evolve Bancorp, which is currently dealing with an enforcement action by - wait for it - the Fed.

article thumbnail

News Alert: FireTail unveils free access to its enterprise-level API security platform — to all

The Last Watchdog

McLean, Va., June 26, 2024, CyberNewsWire — FireTail today announced a free version of its enterprise-level API security tools, making them accessible to developers and organizations of all sizes. •FireTail’s unique combination of open-source code libraries, inline API call evaluation, security posture management, and centralized audit trails helps eliminate vulnerabilities and protect APIs in real-time.

Access 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Federal Agencies Still Struggle to Recruit Cyber Talent

Data Breach Today

Federal Officials Say There is ‘No Silver Bullet’ to Fixing the Cyber Workforce Gap U.S. federal agencies struggle to recruit and retain the next generation of cybersecurity talent, officials testified Wednesday, despite a range of initiatives meant to attract a diverse array of skills and perspectives to the cyber workforce.

article thumbnail

New P2Pinfect version delivers miners and ransomware on Redis servers

Security Affairs

Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads. Cado Security researchers warned that the P2Pinfect worm is employed in attacks against Redis servers, aimed at deploying both ransomware and cryptocurrency mining payloads. In July 2023, Palo Alto Networks Unit 42 researchers first discovered the P2P worm P2PInfect that targets Redis servers running on both Linux and Windows systems.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Quick to Exploit MOVEit Authentication Flaw

Data Breach Today

Progress Software: 'Newly Disclosed Third-Party Vulnerability Introduces New Risk' Hackers jumped on a new flaw in Progress Software's MOVEit managed file transfer application just hours after maker Progress Software publicly disclosed the critical flaw, which allowsattackers to bypass authentication. Customers of the Massachusetts company are no strangers to emergency patching.

More Trending

article thumbnail

OpenAI Drops ChatGPT Access for Users in China, Russia, Iran

Data Breach Today

Users of All OpenAI Services in Unsupported Countries Will Lose Access by July 9 OpenAI appears to be removing access to its services for users in China, Russia and Iran in the next two weeks. The company did not explain its decision, but it has disrupted influence campaigns and cybercrime based in those countries, and the U.S. government is restricting access to AI technology.

Access 147
article thumbnail

U.S. Commerce Department Issues First-of-Its-Kind Determination Banning Certain Software Products and Services

Data Matters

On June 20, 2024, the U.S. Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) published a first-of-its-kind Final Determination against Kapersky Lab, Inc., prohibiting the provision of its antivirus software and cybersecurity products in the United States or to U.S. persons. This Final Determination provides new insights into OICTS review of information and communications technology and services (ICTS) transactions and the prohibitions or r

IT 86
article thumbnail

Why Activist Investor Jana Is Pressing Rapid7 to Sell Itself

Data Breach Today

Activist Investors Are Rare in Cybersecurity, But Rapid7's Struggles Drew a Firm In Jana Partners announced a "significant" stake in Boston-based Rapid7 Wednesday and plans to push the vulnerability management firm to sell itself. The activist investor is working with investment firm Cannae Holdings, and wants Cannae to team up with a private equity firm to buy Rapid7.

article thumbnail

The Double-Edged Sword of AI: Empowering Cybercriminals and the Need for Heightened Cybersecurity Awareness

KnowBe4

The BBC recently reported that Booking.com is warning that AI is driving an explosion in travel scams. Up to 900% in their estimation - making it abundantly clear that while AI can be a force for good, it can also be a formidable weapon in the arsenal of cybercriminals.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Nuance Ex-Employee Indicted for Breach Affecting 1 Million

Data Breach Today

DOJ Says Vendor's Terminated Worker Unlawfully Accessed Geisinger Patient Info An ex-employee of Microsoft's Nuance Communications unit is at the center of a 2023 data breach that affected more than 1 million patients of Pennsylvania-based healthcare system Geisinger. The Department of Justice has criminally charged the former Nuance worker in the incident.

article thumbnail

Simulated Phishing Tests Matter

KnowBe4

If you had to choose between regular cybersecurity training and simulated phishing testing, the data shows you should choose simulated phishing tests.

article thumbnail

Keeping Track of the Cybersecurity Job Market

Data Breach Today

How Understanding Hiring Trends Can Boost Your Career in Cyber The journey to securing a career in cybersecurity can often feel daunting, and the job hunt can be frustrating. But learning to understand the current cybersecurity job market and industry trends can help you achieve your career goals more efficiently.

Marketing 130
article thumbnail

War Crime Prosecutions Enter a New Digital Age

WIRED Threat Level

A custom platform developed by SITU Research aided the International Criminal Court’s prosecution in a war crimes trial for the first time. It could change how justice is enacted on an international scale.

IT 92
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Atos Takeover Bid Hits New Roadblock

Data Breach Today

Shareholder Onepoint Withdraws From Confirmed Restructuring Plan A takeover bid of debt-ridden French IT consultancy Atos hit a roadblock after a key company shareholder withdrew from a financial restructuring plan designed to help the firm recover from its 3.9-billion-euro liability, saying, "Conditions were not ripe to reach an agreement.

IT 130
article thumbnail

Future-Proof Your Crypto Strategy for the Post-Quantum Age: Insights from CNSA 2.0 and FIPS 140-3

Thales Cloud Protection & Licensing

Future-Proof Your Crypto Strategy for the Post-Quantum Age: Insights from CNSA 2.0 and FIPS 140-3 josh.pearson@t… Thu, 06/27/2024 - 00:42 Encryption Shaun Chen | AVP - Sales Engineering, APAC More About This Author > Imagine a world where hackers could easily crack the encryption protecting your most sensitive information. With the potential challenge of quantum computing on the horizon, such a scenario could become a reality.

article thumbnail

How to leave a group chat on your iPhone or Android device

Collaboration 2.0

Yes, you can always escape a group text chat that no longer appeals to you. Is deleting too final? Here's how to hide notifications.

97
article thumbnail

Apple Says Its AI Sets a ‘New Standard’ for Privacy and Invites Security Experts to Test It via CNET

IG Guru

Check out the article here The post Apple Says Its AI Sets a ‘New Standard’ for Privacy and Invites Security Experts to Test It via CNET first appeared on IG GURU.

Privacy 83
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Production CS and CF Printing returns to normal trajectory 

Info Source

By Eirini Louizou, Head of Production & Industrial Printing at Infosource Production printers are high-speed printers, starting at a speed of 60 pages per minute (ppm), used for high-volume print applications at low cost and superior quality. A common categorization is based on the production printing method, with production printers distinguished as Production Cut-sheet (CS) and Continuous-feed (CF).

Sales 52
article thumbnail

Db2 for z/OS: Getting From Function Level 500 to 510 in a Db2 12 Environment

Robert's Db2

It's pretty well known that getting the activated function level of a Db2 12 for z/OS system to V12R1M510 is required prior to migrating that Db2 12 system to Db2 13 (I blogged about that a couple of years ago ). At present (June, 2024), there are still a good number of sites running Db2 12 for z/OS with an activated function level of V12R1M500. I sometimes get, from people at such sites, a question like this: "How should we go from Db2 12 function level 500 to function level 510?

Access 62
article thumbnail

DocuWare accelerates AI strategy with natif.AI acquisition

Info Source

Document management and workflow automation solutions provider, DocuWare, has acquired German software startup, natif.ai, to strengthen its artificial intelligence (AI) data extraction capabilities. natif.ai offers AI-enabled intelligent Capture, advanced image recognition and optical character recognition (OCR) technologies. The deal is yet another example of the blurring lines between the Capture & Intelligent Document Processing (IDP), intelligent automation and enterprise content managem

ECM 40
article thumbnail

The US Is Banning Kaspersky

Schneier on Security

This move has been coming for a long time. The Biden administration on Thursday said it’s banning the company from selling its products to new US-based customers starting on July 20, with the company only allowed to provide software updates to existing customers through September 29. The ban—­the first such action under authorities given to the Commerce Department in 2019­—follows years of warnings from the US intelligence community about Kaspersky being a national security threat be

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Developments in the Russian printer and scanner market 

Info Source

By Petr Kramerius and Boris Kuschev, Regional Managers at Infosource. Printer sales through official channels in Russia—the largest printer market in the Eurasian Economic Union (EEU)—shrank in 2023 and the first quarter of 2024 as sanctions continued to bite. The toner-based MFP market decreased by 25% to around 508,000 units in 2023 and declined 19% year-over-year in the first quarter of 2024.