Mon.Oct 28, 2024

article thumbnail

Key Federal Cyber Panel to Probe Chinese Telecoms Hacking

Data Breach Today

Cyber Safety Review Board to Examine Beijing-Linked Telecom Breaches A key federal cybersecurity panel will investigate Chinese-linked hacks into United States telecom networks and wiretapping infrastructure amid growing concerns of vulnerabilities embedded into the nation's communications infrastructure, an official told Information Security Media Group.

article thumbnail

News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training

The Last Watchdog

Cary, NC, Oct. 28, 2024, CyberNewswire — As the year-end approaches, it’s common for enterprises to discover they still have funds that must be utilized. Often, these L&D dollars are “use or lose,” meaning they will be returned to the general fund if not invested. Recognizing this, INE Security is launching an initiative to guide organizations in investing in technical training before the year end.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia Tied to Ukrainian Military Recruit Malware Targeting

Data Breach Today

Anti-Mobilization Messaging Lead to Malware-Pushing 'Civil Defense' Site Potential Ukrainian military recruits are being targeted by a "hybrid espionage and information operation" - likely Russian - involving Telegram anti-mobilization messaging and a "Civil Defense" website designed to distribute Windows and Android malware, warns Google's Threat Intelligence Group.

Military 290
article thumbnail

A crime ring compromised Italian state databases reselling stolen info

Security Affairs

Italian police arrested four and are investigating dozens, including Leonardo Maria Del Vecchio, for alleged unauthorized access to state databases. Italian authorities have arrested four individuals as part of an investigation into alleged illegal access to state databases. The police are also investigating dozens of other individuals, including the son of Luxottica founder Leonardo Maria Del Vecchio.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Dutch Police and FBI Infiltrate Info-Stealer Infrastructure

Data Breach Today

Cops Recover Redline, Meta Infostealer Data; Promise Criminal Users: 'See You Soon' The Dutch National Police, working with the FBI, say they've disrupted the Redline and Meta info-stealing malware services after obtaining "full access" to them, including source code and extensive details pertaining to their users, with follow-on "legal actions" now "underway.

Access 267

More Trending

article thumbnail

Delta Air Lines Sues CrowdStrike Over July System Meltdown

Data Breach Today

Lawsuit Compares Botched Software Update to Hacking Delta Air Lines filed an acerbic lawsuit Friday afternoon against CrowdStrike that likens the endpoint security vendor's botched July 19 update to hacking. The suit accuses the cybersecurity company of "installing an exploit in Delta systems" by automatically rolling out an update.

article thumbnail

France’s second-largest telecoms provider Free suffered a cyber attack

Security Affairs

French internet service provider (ISP) Free disclosed a cyber attack, threat actors allegedly had access to customer personal information. Free S.A.S. is a French telecommunications company, subsidiary of Iliad S.A. that provides voice, video, data, and Internet telecommunications to consumers in France. The company is the second-largest ISP in France with over 22.9 million mobile and fixed subscribers.

article thumbnail

Claude's Computer Use May End Up a Cautionary Tale

Data Breach Today

Update to Anthropic Model Allows Automation Without Human Oversight Anthropic's updated Claude model can autonomously run tasks on computers it's used on, a feature the company positions as a perk. The feature has the potential to boost productivity, but security experts - and the AI giant itself - sound caution about its potential cybersecurity risks.

article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A long supply chain adds third-party risks, as each partner’s security affects your own, making identity and access management more challenging. Identity-related attack vectors are a significant concern, with a substantial percentage of cyberattacks —often cited as over 70%—involving compromised credentials or identity theft. However, this problem primarily stems from a lack of visibility.

B2B 125
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Don't Let a Third-Party Data Breach Destroy Your Institution's Reputation

Data Breach Today

Strategies for Safeguarding Data and Reputation at Financial Institutions In today's increasingly digital world, trust isn't always easy to come by. Businesses no longer have complete control over their technology stack. Instead, they rely heavily on third-party solutions, applications and products to keep operations running smoothly. But those third parties pose risks.

article thumbnail

CFPB Releases Final Rule on Personal Financial Data Rights

Data Matters

On October 22, 2024, the U.S. Consumer Financial Protection Bureau (CFPB) issued a final rule under Section 1033 of the Consumer Financial Protection Act of 2010. 1 The final rule includes several important changes from the proposed rule. This client alert focuses on those changes. For an analysis of the proposed rule, please see our Sidley Update here.

Privacy 100
article thumbnail

Armis Secures $200M to Drive M&A and Federal Market Growth

Data Breach Today

Series D Funding on $4.2B Valuation to Support OT, Medical Device Security Growth Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.

Marketing 255
article thumbnail

4 out of 10 Phishing Emails Are Sent From a Compromised Email Account

KnowBe4

Analysis of phishing emails in the second quarter of this year paints a picture of what security teams and vigilant recipients should expect from modern phishing attacks.

Phishing 116
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Why Shoring Up Cyber at Rural and Small Hospitals Is Urgent

Data Breach Today

When a large hospital in an urban area is shut down by ransomware, the disruption can be significant, but when a rural hospital faces a similar cyber outage, the impact on patient safety and the community can be extreme, said Nitin Natarajan of the Cybersecurity and Infrastructure Security Agency.

article thumbnail

Vulnerability Recap 10/28/24 – Phishing, DoS, RCE & a Zero-Day

eSecurity Planet

Like last week, this week’s theme continues to be vulnerabilities, discovered months ago, that are still rearing their head. A July Microsoft SharePoint issue has been added to the Cybersecurity Infrastructure and Security Agency’s catalog of known exploitable vulnerabilities. Additionally, VMware released a patch for an already-patched vulnerability from last month due to an insufficient heap overflow fix.

Phishing 102
article thumbnail

Deepfake Phone Scams for Less Than a Dollar a Pop

Data Breach Today

Academics Build AI Agent With OpenAI to Execute Phone Scams at Scale Hackers can use OpenAI's real-time voice API to carry out for less than a dollar deepfake scams involving voice impersonations of government officials or bank employees to swindle victims, said researchers at the University of Illinois Urbana-Champaign.

article thumbnail

Google Chromecast vs Roku: Which streaming device platform is right for you?

Collaboration 2.0

The Google Chromecast and Roku streaming devices are wildly popular among cord-cutters, but which one is right for you? We break down the differences and help you decide.

104
104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

US Bans Investments Into Cutting Edge Chinese Tech

Data Breach Today

US Treasury Issues Regulations Restricting Investments in Foreign Semiconductors, AI The U.S. Department of Treasury published final regulations Monday for investors planting dollars abroad that aims to restrict investments from the United States into sensitive technologies developed by foreign adversaries while continuing to ensure open investments practices remain intact.

233
233
article thumbnail

The £3 Million Daily Heist

KnowBe4

A recent report from UK Finance covered by the BBC paints a concerning picture of the evolving landscape of financial fraud. With a 16% rise in fraud cases and criminals stealing over £3 million daily, it's clear that awareness of cybersecurity threats has never been more crucial.

article thumbnail

Forrester's 2025 Predictions: Gen AI Investments to Decline

Data Breach Today

Forrester's Cody Scott on Why 2025 Will Be Pivotal for Security Leaders Forrester's 2025 Predictions for Cybersecurity, Risk and Privacy report forecasts that security leaders will scale back generative AI investments by 10%. AI productivity gains have fallen short of expectations, forcing CISOs to reprioritize budgets and reassess gen AI’s role in security operations.

Privacy 196
article thumbnail

The Windows 11 24H2 bug list grows again: 9 reasons to avoid this update for now

Collaboration 2.0

Microsoft's official 24H2 update for Windows 11 has been saddled with one bug after another. Here's what you may find if you jump to the new version right now.

135
135
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Criminals Are Blowing up ATMs in Germany

Schneier on Security

It’s low tech , but effective. Why Germany? It has more ATMs than other European countries, and—if I read the article right—they have more money in them.

IT 91
article thumbnail

Grab the 4TB Samsung T5 portable SSD for almost 50% off at Amazon

Collaboration 2.0

The Samsung T5 Evo 4TB portable SSD is almost $200 off at Amazon, saving you 46% on all the storage space you'll need for games, documents, photos, and videos. But you'll have to hurry, you might not see an SSD deal this good again until Black Friday.

126
126
article thumbnail

Cyber Attack Tools Now Being Used To Help Phishing Pages Avoid Detection

KnowBe4

Cybercriminals are offering tools to help phishing pages avoid detection by security tools, according to researchers at SlashNext.

Phishing 105
article thumbnail

I switched from Intel to AMD - here's why I'm never going back

Collaboration 2.0

I find AMD's Ryzen CPUs far more reliable than any Intel-based system I've ever used. But that's not the only thing to make me a convert.

109
109
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

WIRED Threat Level

A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.

article thumbnail

How Claude's new AI data analysis tool compares to ChatGPT's version (hint: it doesn't)

Collaboration 2.0

I tested Claude's new free data-crunching AI tool. Unfortunately, it rejects even moderately sized datasets - and the paid version isn't much better.

IT 104
article thumbnail

What’s new in OpenText™ Aviator IoT 24.3

OpenText Information Management

The Internet of Things (IoT) is transforming industries, and at OpenText, we've been at the forefront of this evolution. Today, we are excited to introduce OpenText Aviator IoT 24.3, the latest release that elevates our IoT solution from a powerful middleware to a comprehensive, AI-driven, end-to-end IoT platform. Whether you want to enhance industrial assets' operational efficiency or tap into advanced analytics for better decision-making, this release can accelerate your IoT strategy.

IoT 78