Wed.Jul 17, 2024

article thumbnail

Change Healthcare's Breach Costs Could Reach $2.5 Billion

Data Breach Today

Costs Have Already Hit $2 Billion, Parent Company UnitedHealth Group Reports Fallout from the February ransomware hit on Change Healthcare, including the theft of data pertaining to up to one-third of Americans, has so far led to $2 billion in costs and may yet reach $2.5 billion, says parent company UnitedHealth Group.

article thumbnail

The US Supreme Court Kneecapped US Cyber Strategy

WIRED Threat Level

After the Supreme Court limited the power of federal agencies to craft regulations, it’s likely up to Congress to keep US cybersecurity policy intact.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New AI System Shields Virtual Power Plants From Cyberattacks

Data Breach Today

German Government-Funded Detection System Stops Attacks at Individual Facilities A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.

article thumbnail

A critical flaw in Cisco SSM On-Prem allows attackers to change any user’s password

Security Affairs

A vulnerability in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers allows threat actors to change any user’s password. Cisco has addressed a critical vulnerability, tracked as CVE-2024-20419 (CVSS score of 10.0), in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers that allows attackers to change any user’s password.

Passwords 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Social Engineering Defense - An Emerging Career

Data Breach Today

Help Organizations Build Robust Defenses Against Human-Centric Threats Social engineering, which involves manipulating individuals into sharing confidential data or performing actions that compromise security, is a big threat. As organizations realize the importance of addressing human-centric security risks, the demand for social engineering defense experts will rise.

Risk 271

More Trending

article thumbnail

CEO Chris O'Malley on Why LogRhythm, Exabeam Opted to Merge

Data Breach Today

World's Largest Pure-Play SecOps Vendor Will Have Leading On-Prem, Cloud SIEM Tools Two SIEM stalwarts completed a merger Wednesday that their CEO said will bring industry-leading capabilities to customers on-premises and in the cloud. LogRhythm and Exabeam will standardize on the latter's New-Scale cloud SIEM given the market traction it has enjoyed since its October 2022 debut.

Cloud 182
article thumbnail

Void Banshee exploits CVE-2024-38112 zero-day to spread malware

Security Affairs

Void Banshee APT group exploited the Windows zero-day CVE-2024-38112 to execute code via the disabled Internet Explorer. An APT group tracked as Void Banshee was spotted exploiting the Windows zero-day CVE-2024-38112 (CVSS score of 7.5) to execute code through the disabled Internet Explorer. The vulnerability is a Windows MSHTML Platform Spoofing Vulnerability.

Archiving 135
article thumbnail

CISA Appoints New Cybersecurity, Stakeholder Group Leaders

Data Breach Today

Jeff Greene, Trent Frazier to Fill Critical Incident Response, Collaborative Roles The Cybersecurity and Infrastructure Security Agency announced Thursday it has appointed two new leaders with extensive public-private sector cybersecurity experience to serve in critical roles leading the agency’s cybersecurity division and developing further collaboration with industry.

article thumbnail

New Ransomware Threat Group Calls Attack Victims to Ensure Payments

KnowBe4

Analysis of new ransomware group Volcano Demon provides a detailed look into how and why calling victims ups the chances of ransomware payment.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Court's Web Tracker Ruling: What HIPAA Entities Should Know

Data Breach Today

Healthcare groups should consider several key points about a recent Texas federal court ruling and its impact on the use of online tracker technology on the healthcare websites of HIPAA-regulated organizations, said privacy attorney Iliana Peters of the law firm Polsinelli.

Privacy 173
article thumbnail

Malvertising Campaign Impersonates Microsoft Teams

KnowBe4

Researchers at Malwarebytes warn that a malvertising campaign is targeting Mac users with phony Microsoft Teams ads. T he ads are meant to trick users into installing Atomic Stealer, a commodity strain of malware designed to steal information from macOS systems.

126
126
article thumbnail

UK ICO Reprimands London Hackney Council for 2020 Hack

Data Breach Today

An 'Avoidable Error' Enabled Pysa Ransomware Group to Encrypt 440,000 Files The U.K.'s data watchdog on Wednesday reprimanded London's Hackney Council over its failure to protect the data of nearly 280,000 town residents from a ransomware hack that resulted in attackers leaking sensitive data. The Pysa ransomware group claimed credit for encrypting 440,000 files in 2020.

article thumbnail

Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious

Schneier on Security

6.8% , to be precise. From ZDNet : However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all mitigated traffic. The scale of these attacks is staggering. In the first quarter of 2024 alone, Cloudflare blocked 4.5 million unique DDoS attacks. That total is nearly a third of all the DDoS attacks they mitigated the previous year.

Cloud 124
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK Labour Introduces Cyber Security and Resilience Bill

Data Breach Today

Bill Gives Regulators Broader Powers, Seeks to Improve UK Cyber Preparedness In its initial legislative agenda, the United Kingdom's newly elected Labour government has introduced a new cybersecurity bill in a bid to address rising cyberthreats to the country. The bill seeks to reduce the severity of cyberattacks on essential services and improve cybersecurity preparedness.

article thumbnail

[NEW FREE TOOL]: Reveal Your Network's Hidden Weaknesses with KnowBe4's BreachSim Data Exfiltration Simulator

KnowBe4

As cyber threats evolve, the target has become crystal clear: your data. A staggering 90% of ransomware attacks now include a data exfiltration component. With this in mind, KnowBe4 has introduced a robust free tool, BreachSim, to identify your network's vulnerabilities and shore up your cyber defenses.

article thumbnail

Securing AI in the Cloud: Insights From Orca Security's CEO

Data Breach Today

Gil Geron on Cloud Innovations and Integrating AI Into Security Posture Management Orca Security CEO Gil Geron outlines the integration of AI for advanced security posture management. He emphasizes the importance of deep visibility into cloud environments, customer adoption and preventing security issues early in the development life cycle.

Cloud 162
article thumbnail

NATO Announces New Integrated Cyber Defence Centre

eSecurity Planet

The North Atlantic Treaty Organization (NATO), a military alliance formed in 1949 to counter the Soviet threat during the Cold War, has traditionally focused on deterring and defending against conventional military attacks. However, the warfare landscape has undergone a significant transformation in recent decades. The rise of cyberthreats has emerged as a major concern for NATO and its member states.

Military 120
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Inside Arctic Wolf's SecOps Growth Strategy From MDR to ITDR

Data Breach Today

CEO Nick Schneider on the Company's Security Operations Cloud and Concierge Model CEO Nick Schneider explains Arctic Wolf's success with MDR and ITDR services, highlighting the company's unique security operations cloud and concierge delivery model. He also discusses Arctic Wolf's rapid expansion across Europe, Asia and Australia/New Zealand.

Cloud 162
article thumbnail

Alleged ‘Maniac Murder Cult’ Leader Indicted Over Plot to Kill Jews

WIRED Threat Level

US prosecutors have charged Michail Chkhikvishvili, also known as “Commander Butcher,” with a litany of crimes, including alleged attempts to poison Jewish children in NYC.

Security 117
article thumbnail

Aqua Security Lays Off 10% of Workforce Amid CNAPP Upheaval

Data Breach Today

2nd Round of Layoffs Since 2022 Comes Amid Expected Exits by Rivals Lacework, Wiz Aqua Security carried out its second round of layoffs since 2022 as the future prospects for stand-alone cloud security vendors look increasingly uncertain. Aqua said axing 10% of its workforce will ensure Aqua continues on a path to profitability that's aligned with current economic conditions.

Security 162
article thumbnail

Addressing mobile security needs

Jamf

Explore how to secure your organization's mobile devices in remote work landscape. Learn about threats, the benefits of Apple devices and essential strategies.

Security 105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

GUEST ESSAY: Consumers, institutions continue to shoulder burden for making mobile banking secure

The Last Watchdog

The rapid adoption of mobile banking has revolutionized how we manage our finances. Related: Deepfakes aimed at mobile banking apps With millions of users worldwide relying on mobile apps for their banking needs, the convenience is undeniable. However, this surge in digital banking also brings about substantial security concerns. Alarmingly, 85% of banks are predicted to be at risk from rising cyber threats.

Security 100
article thumbnail

This 3-in-1 MagSafe dock will charge your Apple devices while keeping them cool (and now get a cool 20% for Amazon Prime Day)

Collaboration 2.0

ESR's HaloLock 3-in-1 charging station will keep your iPhone and accessories optimized for all environments. And this Amazon Prime Day you can enjoy 20% off.

98
article thumbnail

Ensuring AI-readiness with secure information management (SIM) 

OpenText Information Management

According to McKinsey , the enterprise use of Generative AI could generate an astounding $2.6 trillion to $4.4 trillion annually across more than 60 use cases. Additionally, Accenture analyzed 12 developed economies and found that AI has the potential to double their annual economic growth rates by 2035. Given these impressive projections, it is clear that AI, particularly Large Language Models (LLMs), is set to revolutionize numerous industries.

article thumbnail

This Anker power bank has a genius feature that makes it irreplaceable for me, and this Amazon Prime Day get it for 20% less!

Collaboration 2.0

The fast USB-C charging is great, but the cable's layout makes the Anker Nano power bank a mainstay in my everyday carry. And this Amazon Prime day you can get it for $32.

IT 98
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Echo Pop vs Echo Dot: With Prime Day in its final hours, which deal should you choose?

Collaboration 2.0

Amazon's most affordable smart speakers boast some of the biggest discounts ever during Prime Day 2024, but what are the biggest differences between these two models?

IT 98
article thumbnail

The Oura Ring is finally on sale through Prime Day (and that rarely happens)

Collaboration 2.0

The Horizon Oura Ring is up $67 off during Prime Day, a rare discount on a product that rarely goes on sale.

Sales 98
article thumbnail

This great cordless vacuum is just $47 during Prime Day sale

Collaboration 2.0

The 15,000Pa-suction Monozel handheld cordless vacuum is said to rival a Dyson, and it's 80% off right now during Amazon's Prime Day event.

Sales 98