Sat.Oct 12, 2024 - Fri.Oct 18, 2024

article thumbnail

CISA Unveils 'Exceptionally Risky' Software Bad Practices

Data Breach Today

CISA and FBI Warn Software Providers to Avoid Risky Development Practices The Cybersecurity and Infrastructure Security Agency and the FBI released a joint advisory urging software providers to avoid risky practices like using memory-unsafe languages and other techniques that could jeopardize critical infrastructure and national security.

article thumbnail

Information Management Governance: Making the Most of Our Information

AIIM

The Importance of Information in Business In today's fast-paced business world, information is key. From making crucial decisions to tracking progress and evaluating strategies, having access to high-quality information is essential for success. That is where Information Management Governance comes into play.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI-Enhanced Cyber Attacks Top the List of Potential Threats Facing Data Security

KnowBe4

AI is quickly becoming the basis for more cyber attacks, leading organizations to realize the risk it presents. A new report now shows that AI-enhanced cyber attacks are now the top concern of security leaders.

Security 105
article thumbnail

Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach

Krebs on Security

Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being “ USDoD ,” a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI’s InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a significant portion of the U.S. population.

Passwords 188
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Change Healthcare Attack Cost Estimate Reaches Nearly $2.9B

Data Breach Today

Most IT Restored, But UHG Is Still Catching Up and Aiming to Win Back Clients UnitedHealth Group has raised its estimates to nearly $2.9 billion for the total costs this fiscal year of the cyberattack on its Change Healthcare IT services unit. UHG said it is also working to catch up with claims processing and to win back clients disenfranchised by the attack.

IT 269

More Trending

article thumbnail

Millions of People Are Using Abusive AI ‘Nudify’ Bots on Telegram

WIRED Threat Level

Bots that “remove clothes” from images have run rampant on the messaging app, allowing people to create nonconsensual deepfake images even as lawmakers and tech companies try to crack down.

article thumbnail

Top 9 Trends In Cybersecurity Careers for 2025

eSecurity Planet

Technologies that were figments of the imagination a dozen years ago, if they were conceived of at all, quickly become mainstream — think generative artificial intelligence (GenAI) or blockchain. As they do, they create more security vulnerabilities and inherent business, changing the nature of cybersecurity careers. According to research by IBM Corp. and the Ponemon Institute, the average security breach cost reached $4.88 million in 2024 — 10% more than the previous year and the highest averag

article thumbnail

North Korean IT Scam Workers Shift to Extortion Tactics

Data Breach Today

Report Reveals North Korean Workers Expanding into Intellectual Property Theft North Korean threat actors posing as remote information technology workers are increasingly extorting ransom from Western companies after securing jobs under false pretenses, according to a new report from Secureworks' counter threat unit.

IT 254
article thumbnail

Omni Family Health data breach impacts 468,344 individuals

Security Affairs

Omni Family Health disclosed a data breach affecting nearly 470,000 current and former patients and employees. Omni Family Health is a nonprofit organization that provides healthcare services to communities in California, focusing on underserved populations. They offer a range of services, including primary care, dental care, behavioral health, and preventive services.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals

WIRED Threat Level

The US has accused two brothers of being part of the hacker group Anonymous Sudan, which allegedly went on a wild cyberattack spree that hit hundreds of targets—and, for one of the two men, even put lives at risk.

Risk 123
article thumbnail

American Water Shuts Down Services After Cybersecurity Breach

eSecurity Planet

American Water, one of the largest water utility providers in the United States, fell victim to a cyberattack that disrupted its billing systems, throwing light on the increasing vulnerability of critical infrastructure to such threats. While water services were not interrupted, the breach temporarily paused the company’s billing operations, causing customer concern.

article thumbnail

LLMs Fail Middle School Word Problems, Say Apple Researchers

Data Breach Today

AI Mimics Reasoning Without Understanding, Struggles With Irrelevant Data Cutting-edge large language models would fail eighth grade math, say artificial intelligence researchers at Apple - likely because AI is mimicking the process of reasoning rather than actually engaging in it. Researchers asked LLMs to solve math word problems.

article thumbnail

Fidelity Investments suffered a second data breach this year

Security Affairs

US-based financial services company Fidelity Investments warns 77,000 individuals of a data breach that exposed their personal information. U.S.-based financial services company Fidelity Investments is notifying 77,099 individuals that their personal information was compromised in an August cyberattack. The data breach occurred on August 17, 2024 and was discovered two days later, on August 19, 2024. “Between August 17 and August 19, a third party accessed and obtained certain information

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

The War on Passwords Is One Step Closer to Being Over

WIRED Threat Level

“Passkeys,” the secure authentication mechanism built to replace passwords, are getting more portable and easier for organizations to implement thanks to new initiatives the FIDO Alliance announced on Monday.

Passwords 116
article thumbnail

Thinktanks issue UK ‘wake-up’ call to danger posed by scientific racism

The Guardian Data Protection

Guardian and Hope Not Hate investigation has ‘raised the stakes’ over threat posed by rightwing ideology Health institutions and policymakers need to “wake up” to the danger posed by scientific racism and attempts to normalise an ideology that poses a significant threat to minority communities, thinktanks have warned. The Institute of Race Relations, the Race Equality Foundation and Race on the Agenda say they have been raising their voices about the return of “race science” beliefs as a subject

104
104
article thumbnail

Sri Lankan Police Arrest Over 200 Chinese Scammers

Data Breach Today

Chinese Cybercrime Groups Ran Operations in Rented Hotels and Guest Houses Sri Lankan authorities have arrested more than 200 Chinese nationals who they say overstayed their visitor visas and engaged in large-scale financial scam operations targeting victims across Asia. The Chinese Embassy in Colombo says it supports the law enforcement crackdown.

IT 261
article thumbnail

A new Linux variant of FASTCash malware targets financial systems

Security Affairs

North Korea-linked actors deploy a new Linux variant of FASTCash malware to target financial systems, researcher HaxRob revealed. The cybersecurity researcher HaxRob analyzed a new variant of the FASTCash “payment switch” malware which targets Linux systems. The variant discovered by the researcher was previously unknown and targets Ubuntu 22.04 LTS distributions.

Libraries 114
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

It Seemed Like an AI Crime-Fighting Super Tool. Then Defense Attorneys Started Asking Questions

WIRED Threat Level

Global Intelligence claims its Cybercheck technology can help cops find key evidence to nail a case. But a WIRED investigation reveals the smoking gun often appears far less solid.

IT 105
article thumbnail

Avoid the Windows 11 2024 update for now - here are 7 reasons why

Collaboration 2.0

Microsoft's official 24H2 update for Windows 11 is saddled with a bunch of annoying and disruptive bugs. Here are the issues you may encounter if you jump to the new version.

98
article thumbnail

European Police Make Headway Against Darknet Drug Markets

Data Breach Today

Nordic Authorities Takedown Sipulitie, Dutch Police Arrest Alleged Bohemia Admins October has been a good month for European police agencies shutting down dark web marketplaces, with Dutch, Finnish and Swedish police announcing server seizures and suspect arrests. It's been more than a decade since Ross "Dread Pirate Roberts" Ulbricht initiated an era of online criminal bazaars.

Marketing 258
article thumbnail

Russia-linked group APT29 is targeting Zimbra and JetBrains TeamCity servers on a large scale

Security Affairs

U.S. and U.K. cyber agencies warn that Russia-linked group APT29 is targeting vulnerable Zimbra and JetBrains TeamCity servers on a large scale. Russia-linked cyber espionage group APT29 (aka SVR group , BlueBravo , Cozy Bear , Nobelium , Midnight Blizzard , and The Dukes ) target vulnerable Zimbra and JetBrains TeamCity servers as part of a mass scale campaign, U.S. and U.K. cyber agencies warned.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats

WIRED Threat Level

Security researchers created an algorithm that turns a malicious prompt into a set of hidden instructions that could send a user's personal information to an attacker.

Security 104
article thumbnail

KnowBe4 Named a Leader in the Fall 2024 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

CyberArk CEO on Why Venafi's Machine Identity Chops Matter

Data Breach Today

Matt Cohen on How CyberArk Plans to Unify Machine, Human Identity Security by 2026 CyberArk's $1.54 billion acquisition of Venafi strengthens its leadership in identity security, integrating machine identity management with its current human identity platform, according to CEO Matt Cohen. The deal will address growing threats from ephemeral workloads and complex infrastructures.

Security 236
article thumbnail

macOS HM Surf flaw in TCC allows bypass Safari privacy settings

Security Affairs

Microsoft disclosed a flaw in the macOS Apple’s Transparency, Consent, and Control (TCC) framework that could allow it to bypass privacy settings and access user data. Microsoft discovered a vulnerability, tracked as CVE-2024-44133 and code-named ‘HM Surf’, in Apple’s Transparency, Consent, and Control (TCC) framework in macOS.

Privacy 104
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Pig Butchering Scams Are Going High Tech

WIRED Threat Level

Scammers in Southeast Asia are increasingly turning to AI, deepfakes, and dangerous malware in a way that makes their pig butchering operations even more convincing.

Security 115
article thumbnail

What Spending 3 Hours in IKEA Taught Me About Cybersecurity Awareness

KnowBe4

It was a Saturday morning, and I had grand plans. By "grand plans," I mean sitting on the sofa, watching reruns of "The IT Crowd," and pretending I didn't hear the lawn mower calling my name.

article thumbnail

Ex-NCSC Chief: UK Cyber Incident Reporting a 'Good Step'

Data Breach Today

Cyber Security and Resilience Bill Includes 72-Hour Reporting Deadline, Hefty Fines The U.K. government's proposed Cyber Security and Resilience Bill is a "good step forward" to encourage ransomware incident reporting, said Ciaran Martin, the former NCSC chief. But he said the success of the new regulations also hinges on the support mechanism for cyber victims.