Mon.Oct 28, 2024

article thumbnail

Dutch Police and FBI Infiltrate Info-Stealer Infrastructure

Data Breach Today

Cops Recover Redline, Meta Infostealer Data; Promise Criminal Users: 'See You Soon' The Dutch National Police, working with the FBI, say they've disrupted the Redline and Meta info-stealing malware services after obtaining "full access" to them, including source code and extensive details pertaining to their users, with follow-on "legal actions" now "underway.

Access 313
article thumbnail

A crime ring compromised Italian state databases reselling stolen info

Security Affairs

Italian police arrested four and are investigating dozens, including Leonardo Maria Del Vecchio, for alleged unauthorized access to state databases. Italian authorities have arrested four individuals as part of an investigation into alleged illegal access to state databases. The police are also investigating dozens of other individuals, including the son of Luxottica founder Leonardo Maria Del Vecchio.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia Tied to Ukrainian Military Recruit Malware Targeting

Data Breach Today

Anti-Mobilization Messaging Lead to Malware-Pushing 'Civil Defense' Site Potential Ukrainian military recruits are being targeted by a "hybrid espionage and information operation" - likely Russian - involving Telegram anti-mobilization messaging and a "Civil Defense" website designed to distribute Windows and Android malware, warns Google's Threat Intelligence Group.

Military 300
article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A long supply chain adds third-party risks, as each partner’s security affects your own, making identity and access management more challenging. Identity-related attack vectors are a significant concern, with a substantial percentage of cyberattacks —often cited as over 70%—involving compromised credentials or identity theft. However, this problem primarily stems from a lack of visibility.

B2B 132
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Key Federal Cyber Panel to Probe Chinese Telecoms Hacking

Data Breach Today

Cyber Safety Review Board to Examine Beijing-Linked Telecom Breaches A key federal cybersecurity panel will investigate Chinese-linked hacks into United States telecom networks and wiretapping infrastructure amid growing concerns of vulnerabilities embedded into the nation's communications infrastructure, an official told Information Security Media Group.

More Trending

article thumbnail

Delta Air Lines Sues CrowdStrike Over July System Meltdown

Data Breach Today

Lawsuit Compares Botched Software Update to Hacking Delta Air Lines filed an acerbic lawsuit Friday afternoon against CrowdStrike that likens the endpoint security vendor's botched July 19 update to hacking. The suit accuses the cybersecurity company of "installing an exploit in Delta systems" by automatically rolling out an update.

article thumbnail

4 out of 10 Phishing Emails Are Sent From a Compromised Email Account

KnowBe4

Analysis of phishing emails in the second quarter of this year paints a picture of what security teams and vigilant recipients should expect from modern phishing attacks.

Phishing 128
article thumbnail

Claude's Computer Use May End Up a Cautionary Tale

Data Breach Today

Update to Anthropic Model Allows Automation Without Human Oversight Anthropic's updated Claude model can autonomously run tasks on computers it's used on, a feature the company positions as a perk. The feature has the potential to boost productivity, but security experts - and the AI giant itself - sound caution about its potential cybersecurity risks.

article thumbnail

Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

WIRED Threat Level

A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.

Security 126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Don't Let a Third-Party Data Breach Destroy Your Institution's Reputation

Data Breach Today

Strategies for Safeguarding Data and Reputation at Financial Institutions In today's increasingly digital world, trust isn't always easy to come by. Businesses no longer have complete control over their technology stack. Instead, they rely heavily on third-party solutions, applications and products to keep operations running smoothly. But those third parties pose risks.

article thumbnail

Cyber Attack Tools Now Being Used To Help Phishing Pages Avoid Detection

KnowBe4

Cybercriminals are offering tools to help phishing pages avoid detection by security tools, according to researchers at SlashNext.

Phishing 126
article thumbnail

Why Shoring Up Cyber at Rural and Small Hospitals Is Urgent

Data Breach Today

When a large hospital in an urban area is shut down by ransomware, the disruption can be significant, but when a rural hospital faces a similar cyber outage, the impact on patient safety and the community can be extreme, said Nitin Natarajan of the Cybersecurity and Infrastructure Security Agency.

article thumbnail

Threat Actors Compromise Valid Accounts Via Social Engineering

KnowBe4

Phishing remains a top initial access vector for cyberattacks, according to researchers at Cisco Talos.

Phishing 124
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Armis Secures $200M to Drive M&A and Federal Market Growth

Data Breach Today

Series D Funding on $4.2B Valuation to Support OT, Medical Device Security Growth Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.

Marketing 269
article thumbnail

8 ways I prepped my iPhone for iOS 18.1 - and I recommend you do too

Collaboration 2.0

For the smoothest, safest upgrade, take these steps before you update your iPhone.

122
122
article thumbnail

Deepfake Phone Scams for Less Than a Dollar a Pop

Data Breach Today

Academics Build AI Agent With OpenAI to Execute Phone Scams at Scale Hackers can use OpenAI's real-time voice API to carry out for less than a dollar deepfake scams involving voice impersonations of government officials or bank employees to swindle victims, said researchers at the University of Illinois Urbana-Champaign.

article thumbnail

How iOS 18 turned my Apple Watch into the productivity tool of my sci-fi dreams

Collaboration 2.0

I can now do serious writing work easily and from anywhere - on my Apple Watch. Here's how you can, too.

116
116
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

US Bans Investments Into Cutting Edge Chinese Tech

Data Breach Today

US Treasury Issues Regulations Restricting Investments in Foreign Semiconductors, AI The U.S. Department of Treasury published final regulations Monday for investors planting dollars abroad that aims to restrict investments from the United States into sensitive technologies developed by foreign adversaries while continuing to ensure open investments practices remain intact.

241
241
article thumbnail

The £3 Million Daily Heist

KnowBe4

A recent report from UK Finance covered by the BBC paints a concerning picture of the evolving landscape of financial fraud. With a 16% rise in fraud cases and criminals stealing over £3 million daily, it's clear that awareness of cybersecurity threats has never been more crucial.

article thumbnail

Forrester's 2025 Predictions: Gen AI Investments to Decline

Data Breach Today

Forrester's Cody Scott on Why 2025 Will Be Pivotal for Security Leaders Forrester's 2025 Predictions for Cybersecurity, Risk and Privacy report forecasts that security leaders will scale back generative AI investments by 10%. AI productivity gains have fallen short of expectations, forcing CISOs to reprioritize budgets and reassess gen AI’s role in security operations.

Privacy 225
article thumbnail

I switched from Intel to AMD - here's why I'm never going back

Collaboration 2.0

I find AMD's Ryzen CPUs far more reliable than any Intel-based system I've ever used. But that's not the only thing to make me a convert.

109
109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Criminals Are Blowing up ATMs in Germany

Schneier on Security

It’s low tech , but effective. Why Germany? It has more ATMs than other European countries, and—if I read the article right—they have more money in them.

IT 98
article thumbnail

This Linux distribution doesn't require installation, and still remembers where you left off

Collaboration 2.0

If you're looking for a Linux distribution you can carry with you, PorteuX might be just the ticket to the freedom you've been looking for.

105
105
article thumbnail

France’s second-largest telecoms provider Free suffered a cyber attack

Security Affairs

French internet service provider (ISP) Free disclosed a cyber attack, threat actors allegedly had access to customer personal information. Free S.A.S. is a French telecommunications company, subsidiary of Iliad S.A. that provides voice, video, data, and Internet telecommunications to consumers in France. The company is the second-largest ISP in France with over 22.9 million mobile and fixed subscribers.

article thumbnail

Take Google's new AI course, write better prompts

Collaboration 2.0

The self-paced 'Prompting Essentials' course requires no previous experience and is available now on Coursera.

105
105
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Vulnerability Recap 10/28/24 – Phishing, DoS, RCE & a Zero-Day

eSecurity Planet

Like last week, this week’s theme continues to be vulnerabilities, discovered months ago, that are still rearing their head. A July Microsoft SharePoint issue has been added to the Cybersecurity Infrastructure and Security Agency’s catalog of known exploitable vulnerabilities. Additionally, VMware released a patch for an already-patched vulnerability from last month due to an insufficient heap overflow fix.

article thumbnail

The Windows 11 24H2 bug list grows again: 9 reasons to avoid this update for now

Collaboration 2.0

Microsoft's official 24H2 update for Windows 11 has been saddled with one bug after another. Here's what you may find if you jump to the new version right now.

104
104
article thumbnail

News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training

The Last Watchdog

Cary, NC, Oct. 28, 2024, CyberNewswire — As the year-end approaches, it’s common for enterprises to discover they still have funds that must be utilized. Often, these L&D dollars are “use or lose,” meaning they will be returned to the general fund if not invested. Recognizing this, INE Security is launching an initiative to guide organizations in investing in technical training before the year end.