Tue.Dec 03, 2024

article thumbnail

Korean Firm Sold Satellite Receivers With DDoS Feature

Data Breach Today

Firm Allegedly Embedded DDoS at the Request of a Foreign Client A South Korean company exported 240,000 satellite receivers with distributed denial-of-service attack capabilities, leading to the arrest of its CEO by the Korean National Police Agency. The company and its employees face criminal prosecution for allegedly violating South Korea’s cybersecurity laws.

article thumbnail

Why Phishers Love New TLDs Like.shop,top and.xyz

Krebs on Security

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as.shop ,top ,xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees the domain name industry is moving forward with plans to introduce a slew of new gTLDs.

Phishing 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sixgen's Kyrus Acquisition Boosts National Cybersecurity

Data Breach Today

Buy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise Sixgen will enhance its cybersecurity operations through the purchase of Washington D.C.-area Kyrus. The move introduces reverse engineering and analytics expertise to Sixgen's portfolio, aligning with its mission to protect critical infrastructure and bolster American cyber defense capabilities.

article thumbnail

News alert: Sweet Security releases its evolutionary Cloud Native Detection and Response platform

The Last Watchdog

Tel Aviv, Israel, Dec. 3, 2024, CyberNewswire — With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure Sweet Security today announced the release of its unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time.

Cloud 130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

European Police Disrupts Matrix Encrypted Service

Data Breach Today

Platform Used for Drugs, Arms trafficking, and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.

More Trending

article thumbnail

Feds Propose AI 'Guardrails' for Medicare Advantage Plans

Data Breach Today

Provision Emphasizes Existing Medicare Regs for Equitable Access to Health Services The Centers for Medicare and Medicaid Services has issued proposed "guardrails" to help ensure that the use of artificial intelligence for Medicare Advantage insurance plans does not result in inequitable access to healthcare-related services. The proposed rule will go into effect in 2026.

article thumbnail

GUEST ESSAY: The key role static code analyzers play in detecting coding errors, eliminating flaws

The Last Watchdog

In the modern world of software development, code quality is becoming a critical factor that determines a project success. Errors in code can entail severe consequences. Related: The convergence of network, application security For example, vulnerabilities in banking applications can lead to financial data leaks, and errors in medical systems can threaten the health of patients.

Risk 100
article thumbnail

GoodRx Agrees to Pay $25M to Settle Web Tracker Lawsuit

Data Breach Today

Telehealth Firm Previously Paid $1.5M Fine to FTC for Similar Privacy Issues GoodRx has reached a $25 million preliminary settlement of proposed class action litigation alleging the telehealth company violated privacy and an assortment other laws and statues when it previously collected and shared consumers' information with third-parties through online tracking tools.

Privacy 165
article thumbnail

The ASA flaw CVE-2014-2120 is being actively exploited in the wild

Security Affairs

Cisco warns customers that a decade-old ASA vulnerability, tracked as CVE-2014-2120, is being actively exploited in the wild. Cisco warns that the decade-old ASA vulnerability CVE-2014-2120 is being actively exploited in attacks in the wild, and urges customers to review the updated advisory. The vulnerability resides in the WebVPN login page of Cisco Adaptive Security Appliance (ASA) Software, an unauthenticated, remote attacker could exploit the flaw to conduct a cross-site scripting (XSS) att

Security 117
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

16 Zero-Days Uncovered in Fuji Electric Monitoring Software

Data Breach Today

Flaws in Fuji's Tellus and V-Server Software Pose Risks to Critical Infrastructure Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.

article thumbnail

He Got Banned From X. Now He Wants to Help You Escape, Too

WIRED Threat Level

When programmer Micah Lee was kicked off X for a post that offended Elon Musk, he didn't look back. His new tool for saving and deleting your X posts can give you that same sweet release.

Privacy 115
article thumbnail

New Section 1033 Push Banks to Provide Customers with “Financial SIM Card”

Data Breach Today

Authored by: Matt Kunkel, CEO, LogicGate The Consumer Financial Protection Bureau (CFPB) recently finalized a set of rules that would bring a similar level of convenience to the financial world. These changes to Section 1033 of the Dodd-Frank Act make it significantly easier for customers to retain access to their financial history no matter which bank they transact with.

Access 162
article thumbnail

With Threats to Encryption Looming, Signal’s Meredith Whittaker Says ‘We’re Not Changing’

WIRED Threat Level

At WIRED’s The Big Interview event, the president of the Signal Foundation talked about secure communications as critical infrastructure and the need for a new funding paradigm for tech.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

'Horns&Hooves' Malware Campaign Hits Over 1,000 Victims

Data Breach Today

Russian Threat Actor Delivers NetSupport RAT, BurnsRAT via Fake Requests A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf.

Retail 147
article thumbnail

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

WIRED Threat Level

A new proposal by the Consumer Financial Protection Bureau would use a 54-year-old privacy law to impose new oversight of the data broker industry. But first, the agency must survive Elon Musk.

Privacy 98
article thumbnail

China Is Outpacing US in Critical Tech Research Investments

Data Breach Today

Experts Warn China's Tech Rise Could Reshape Global Cybersecurity and Warfare China has surged past the United States in critical technology research, according to a recent report published by the Australian Strategic Policy Institute. Experts warn the shift could have profound global implications, including risks to U.S. cybersecurity, innovation and global leadership.

article thumbnail

U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2023-45727 North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability CVE-2024-11680 ProjectSend Improper Authentication Vulnerabil

IT 92
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Microsoft ramps up pressure on users running Windows 11 on unsupported PCs

Collaboration 2.0

The company is threatening to add a watermark to the desktop of any unsupported PC running Windows 11.

112
112
article thumbnail

And the Winner of The Inside Man Biggest Fan Contest 2024 is…

KnowBe4

It’s been several weeks since the exciting premiere of The Inside Man - Season 6 in St. Petersburg, Fl. If you missed my post , I talked about this magical night where we released the latest blockbuster season of this award winning security awareness series.

article thumbnail

I deleted thousands of tweets from X with this new tool - for free

Collaboration 2.0

Now you can easily migrate from X with this powerful tool that deletes tweets, likes, and DMs, while backing up your data for a fresh start elsewhere.

124
124
article thumbnail

Poland probes Pegasus spyware abuse under the PiS government

Security Affairs

Poland probes Pegasus spyware abuse under the PiS government; ex-security chief Piotr Pogonowski arrested to testify before parliament. Poland’s government has been investigating the alleged misuse of Pegasus spyware by the previous administration and arrested the former head of Poland’s internal security service Piotr Pogonowski. News of the arrest of Piotr Pogonowski was first reported by the Financial Times.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

You can still buy these iPhone 16 models for one cent on Amazon after Cyber Monday - but act fast

Collaboration 2.0

It might be one of those 'too good to be true' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo.

IT 105
article thumbnail

Energy industry contractor ENGlobal Corporation discloses a ransomware attack

Security Affairs

ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware attack disrupted the operations of a major energy industry contractor, ENGlobal Corporation. Founded in 1985, ENGlobal Corporation designs automated control systems for commercial and government sectors, reporting $6 million in Q3 revenue and $18.4 million year-to-date.

article thumbnail

This Gemini update for Android lets you do more without unlocking your phone

Collaboration 2.0

Replaced Google Assistant with Gemini? You'll soon be making calls and sending messages without unlocking your phone. See if the feature's on your device now.

105
105
article thumbnail

Thales Introduces Data Risk Intelligence, Bringing Organizations Risk Profile Front and Center

Thales Cloud Protection & Licensing

Thales Introduces Data Risk Intelligence, Bringing Organizations Risk Profile Front and Center madhav Tue, 12/03/2024 - 09:32 When Thales finalized the acquisition of Imperva in January 2024, our aim was clear: to empower organizations to protect data and secure all paths to it. In today's digital landscape, sensitive information has become the prime target for cybercriminals.

Risk 62
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The Xbox Series X is still discounted on Best Buy post-Cyber Monday - here's what in stock

Collaboration 2.0

The digital version of the Xbox Series X has seen a $50 price drop on Best Buy, opening the door for you to buy plenty of discounted games.

84
article thumbnail

Malicious Google Ads Target Users Seeking Solutions to Printer Problems

KnowBe4

Scammers are abusing Google ads to target users searching for help with printer problems, according to researchers at Malwarebytes.

article thumbnail

The Samsung phone I recommend to most people is $100 off during post-Cyber Monday sales

Collaboration 2.0

While it doesn't flip, fold, or have a built-in S Pen stylus, the Galaxy S24 FE offers all the essentials at a relatively accessible price. Although Cyber Monday sales are over, deals for the phone are still live on Best Buy.

Sales 66