Wed.Nov 20, 2024

article thumbnail

Cyberstarts Program Sparks Debate Over Ethical Boundaries

Data Breach Today

Scrutiny Over Ethics of Profit-Sharing Prompts End to Cyberstarts CISO Compensation Allegations of conflicts of interest in Cyberstarts’ Sunrise program have sparked debate in the CISO community. While the program connected CISOs with startups for advisory purposes, its profit-sharing incentives drew criticism, leading some participants to resign and the firm to halt compensation.

IT 259
article thumbnail

AI just gave us the Star Trek farewell we always wanted - watch it here

Collaboration 2.0

William Shatner and Leonard Nimoy reunite in a powerful short film using AI and deepfake technology to give fans the emotional farewell they deserve.

IT 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK CMA Clears Alphabet, Anthropic Partnership

Data Breach Today

Google Does Not Have Material Influence Over Antrhtopic, Agency Says The U.K. antitrust regulator called off an investigation into a $2 billion partnership between computing giant Alphabet and artificial intelligence startup Anthropic. The.K. Competition and Markets Authority probe sought to understand if the deal forms a "relevant merger situation.

article thumbnail

AI transformation is the new digital transformation. Here's why that change matters

Collaboration 2.0

Your boss has read about the power of generative AI and wants you to stop dithering about potential risks and start delivering results.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Data Protection Startup Cyera Raises $300M on $3B Valuation

Data Breach Today

Cyera's Valuation Doubles Amid Expansion From DSPM to DLP, Identity Protection Cyera secures $300M in funding from Accel and Sapphire Ventures, doubling its valuation to $3 billion. The company is enhancing its data security platform by integrating DSPM with DLP and identity security capabilities, addressing enterprise demand for comprehensive solutions.

Security 238

More Trending

article thumbnail

Oklahoma Hospital Says Ransomware Hack Hits 133,000 People

Data Breach Today

Incident Is Among Growing List of Attacks on Small, Rural Hospitals An Oklahoma hospital quickly restored its IT systems after a ransomware attack in September, but the 62-bed hospital could not recover some data and later learned that hackers may have accessed the personal information of 133,000 people. The attack is the latest involving a small rural hospital.

article thumbnail

10 tiny tools and gadgets I keep on my keychain and why

Collaboration 2.0

These handy gadgets make for useful gifts during the holidays. If your loved one likes to be prepared for anything, you can't go wrong with these EDC essentials.

98
article thumbnail

India Fines WhatsApp $25M, Bans Data Sharing for 5 Years

Data Breach Today

Competition Regulator Says WhatsApp Users Could Not Opt Out of Data Sharing India's Competition Commission has fined social media conglomerate Meta over $25 million for forcing WhatsApp users to agree to a sweeping data sharing policy with other Meta platforms. The agency ordered the company to stop using users' data for online advertising on other Meta platforms.

221
221
article thumbnail

Dark Side of Deals: Emerging Scams for Black Friday, Cyber Monday and Giving Tuesday

KnowBe4

As the holiday shopping season kicks into high gear, cybercriminals are gearing up too. This year, alongside the usual suspects, we're seeing some crafty new scams, so let’s take a look at some of the ones you should be most careful of during Black Friday, Cyber Monday and Giving Tuesday.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How Advances in Cloud Security Help Future-Proof Resilience

Data Breach Today

Embracing Zero Trust and AI in Cloud Security Zero trust, artificial-intelligence-driven security and automation tools are reshaping how organizations maintain uptime, even during a cyberattack. These advances underscore how the future of enterprise resilience is increasingly tied to advancements in cloud security.

Cloud 206
article thumbnail

Update your iPhone, iPad, and Mac now to patch these serious zero-day security flaws

Collaboration 2.0

The emergency updates resolve two zero-day flaws that may have already been exploited in the wild.

Security 115
article thumbnail

Fintech Finastra Confirms Data Theft; Investigation Underway

Data Breach Today

Company Probing Customers Affected After Attacker Claims 400 Gigabyte Data Theft Financial technology firm Finastra is warning customers that it suffered a breach of a secure file transfer system that it uses to relay information to some customers, leading to an unknown quantity of data being exfiltrated by an attacker. The company is still identifying affected customers.

Security 172
article thumbnail

The best web hosting services of 2024: Expert tested and reviewed

Collaboration 2.0

Do you want to build a website, but you're unsure where to start? You should start with a reputable hosting service. We've tested the top web hosting services that offer solid customer service and good value for the money.

81
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

US Agencies Urged to Combat Growing Chinese Cyberthreat

Data Breach Today

Experts Call on Feds to Step Up Defense Against Escalating Chinese Threats A panel of cybersecurity experts and top industry officials pushed lawmakers and the federal government to step up their defenses against escalating cyberthreats from China, citing recent high-profile examples of evidence that Beijing is increasingly targeting the U.S. with sophisticated attacks.

article thumbnail

Threat Actors are Sending Malicious QR Codes Via Snail Mail

KnowBe4

The Swiss National Cyber Security Centre (NCSC) has warned of a QR code phishing (quishing) campaign that’s targeting people in Switzerland via physical letters sent through the mail, Malwarebytes reports.

article thumbnail

Criminals 'Ghost Tap' NFC for Payment Cash-Out Attacks

Data Breach Today

Tactic Uses Stolen Cards Added to Apple Pay and Google Pay Digital Wallets Criminals have been caught tapping a new type of relay attack to cash-out stolen payment cards added to legitimate digital wallets. These criminals use money mules who carry an Android device able to capture and relay NFC communications used by ATMs to and from an attacker-controlled device.

article thumbnail

Inside the Booming ‘AI Pimping’ Industry

WIRED Threat Level

AI-generated influencers based on stolen images of real-life adult content creators are flooding social media.

Privacy 96
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Coast Guard Warns of Continued Risks in Chinese Port Cranes

Data Breach Today

Military Says Ship-to-Shore Cranes Made in China Include Dangerous Security Flaws The United States Coast Guard is continuing to warn of significant security risks embedded in ship-to-shore cranes developed by companies with ties to Beijing while issuing new sensitive requirements for ports operating Chinese-made cranes across the country.

Risk 147
article thumbnail

8 Bluesky tips every new user should know

Collaboration 2.0

Freely available to anyone, Bluesky offers key advantages over X, Threads, and other social networks. Here are 8 ways to achieve social nirvana.

115
115
article thumbnail

N-able Strengthens Cybersecurity Via $266M Adlumin Purchase

Data Breach Today

Security Operations Purchase Brings Cloud-Native XDR, MDR to IT Management Platform With Adlumin’s cloud-native XDR and MDR services, N-able consolidates its position as a leader in IT management. Buying the Washington D.C.-based security operations vendor for up to $266 million drives value through AI-powered threat detection and compliance solutions tailored for MSPs.

130
130
article thumbnail

Ford data breach involved a third-party supplier

Security Affairs

Ford investigates a data breach linked to a third-party supplier and pointed out that its systems and customer data were not compromised. Ford investigation investigated a data breach after a threat actors claimed the theft of customer information on the BreachForums cybercrime. On November 17, threat actors IntelBroker and EnergyWeaponUser published a post on BreachForums announcing they have stolen 44,000 Ford customer records.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Nightwing CEO on Post-Raytheon Independence, Cyber Expertise

Data Breach Today

Nightwing's John DeSimone Talks Growth, Threats, National Security and AI Strategy Nightwing CEO John DeSimone reveals how the company’s independence from Raytheon allows it to better serve customers, invest in intelligence, advanced AI and data solutions, address sophisticated cyber threats, and maintain a no-fail mission approach in the face of rising security threats.

Security 130
article thumbnail

How Google turns Android into a desktop OS in 5 steps

Collaboration 2.0

Merging Android and ChromeOS is a bold first step, but turning Android into a true alternative to MacOS, iPadOS, and Windows requires Google to make some big moves.

96
article thumbnail

Feds Seize PopeyeTools Marketplace, Charge Alleged Operators

Data Breach Today

Justice Department Dismantles Cybercrime Hub, Announces Charges and Seizes Crypto The Justice Department has seized PopeyeTools, a notorious cybercrime marketplace, while announcing criminal charges for three alleged operators behind the website, which generated over $1.7 million in revenue, according to a Wednesday announcement.

130
130
article thumbnail

Out of 29 Billion Cybersecurity Events, Phishing was the Primary Method of Initial Attack

KnowBe4

The newly released single largest analysis of cyber attacks across all of 2023 show a strong tie between the use of phishing and techniques designed to gain credentialed access.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Let's Give Thanks for How Far We’ve Come - and Forge Ahead!

Data Breach Today

Cybersecurity Training and Education Must Evolve to Keep Pace With the Profession Over the past few decades, cybersecurity has evolved from a niche concern into a global priority, creating a vast and dynamic career field. While we celebrate the journey, let's also focus on how today's cybersecurity professionals will shape the future.

Education 130
article thumbnail

Ransomware Gangs Evolve: They're Now Recruiting Penetration Testers

KnowBe4

A new and concerning cybersecurity trend has emerged. According to the latest Q3 2024 Cato CTRL SASE Threat Report from Cato Networks, ransomware gangs are now actively recruiting penetration testers to enhance the effectiveness of their attacks.

article thumbnail

AI Edtech Startup Founder Indicted in U.S. Fraud Case

Data Breach Today

Charges Against AllHere Founder Include Securities and Wire Fraud U.S. law enforcement arrested and indicted the founder of an artificial intelligence edtech startup AllHere over fraud charges. Federal prosecutors accused 33-year-old Joanna Smith-Griffin of defrauding investors, charging her with securities fraud, wire fraud and aggravated identity theft.