Wed.May 31, 2023

article thumbnail

Ring Settles FTC Allegations of Poor Cybersecurity, Privacy

Data Breach Today

Amazon-Owned Ring Will Pay $5.8 Million to Settle FTC Investigation Amazon agreed to pay $5.8 million to settle a Federal Trade Commission investigation into allegedly poor cybersecurity practices by its Ring home surveillance device subsidiary. The company is also poised to come under two decades' worth of outside reviews of a mandated data and security program.

article thumbnail

RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’

The Last Watchdog

The world of Identity and Access Management ( IAM ) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT assets. Today, a “user” most often is a snippet of code seeking access at the cloud edge. At the RSAC Conference 2023 , I sat down with Venkat Raghavan , founder and CEO of start-up Stack Identity.

Access 197
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dark Pink Ramps Up Cyberespionage Attacks, Hits New Targets

Data Breach Today

Threat Actor's Targets This Year Include Government Agencies in Brunei, Indonesia A recently emerged threat actor dubbed Dark Pink is updating its custom tool set in a bid to evade detection while expanding its operations to new Southeast Asian targets. Threat intel firm Group-IB counts 13 total victims of Dark Pink, which first became active in mid-2021.

article thumbnail

Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers

Dark Reading

The newly found misconfigured cloud services are discovered just two weeks after an initial data breach affecting millions came to light.

article thumbnail

Customer Experience Management: Optimizing Your Strategy for Financial Success

Speaker: Diane Magers, Founder and Chief Experience Officer at Experience Catalysts

In the world of business, connecting the dots from experience to financial impact is an essential skill. Transforming customer engagement, Voice of Customer (VoC) insights, and Journey Maps into tangible financial outcomes poses a significant challenge for most organizations. To gain buy-in from the C-Suite and key stakeholders, it’s crucial to illustrate how Experience Management translates into clear, measurable business results.

article thumbnail

Hackers Exploited Zero-Day Bug for 8 Months, Barracuda Warns

Data Breach Today

Attackers Exploited Now-Fixed Flaw in ESG Appliances to Install Malware, Steal Data Barracuda Networks is warning that a zero-day vulnerability that it recently discovered and patched in its Email Security Gateway appliances appears to have been exploited since October 2022. Attackers used the flaw to gain persistent remote access to networks and exfiltrate data, it said.

Security 241

More Trending

article thumbnail

Ukrainian CERT Warns of New SmokeLoader Campaign

Data Breach Today

Hackers Using Compromised Mail to Deliver the Malware Ukrainian cyber defenders warn users for the second time this month to be aware of financially-motivated phishing campaigns that load the Smokeloader malware onto computers. Hackers behind UAC-0006 typically targets computers used by accountants and look for and credential data.

Phishing 162
article thumbnail

Can Cloud Services Encourage Better Login Security? Netflix's Accidental Model

Dark Reading

Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication?

Security 114
article thumbnail

Cisco Buys Armorblox to Bring Generative AI to Its Portfolio

Data Breach Today

SentinelOne-Backed Armorblox Protects Email Through Natural Language Understanding Cisco plans to make its third tuck-in cybersecurity acquisition of 2023 to protect email, cloud office applications and enterprise communications through natural language understanding. Cisco will take advantage of Armorblox's predictive and generative AI to help customers bolster their security.

article thumbnail

AI Voice-Based Scams Rise as One-Third of Victims Can’t Tell if the Voice is Real or Not

KnowBe4

As audio deepfake technology continues to go mainstream as part of the evolution in AI-based tools, new data shows there are plenty of victims and they aren’t prepared for such an attack.

article thumbnail

How to Stay Competitive in the Evolving State of Martech

Marketing technology is essential for B2B marketers to stay competitive in a rapidly changing digital landscape — and with 53% of marketers experiencing legacy technology issues and limitations, they’re researching innovations to expand and refine their technology stacks. To help practitioners keep up with the rapidly evolving martech landscape, this special report will discuss: How practitioners are integrating technologies and systems to encourage information-sharing between departments and pr

article thumbnail

AI Tech Execs Put AI On Par With Nukes for Extinction Risk

Data Breach Today

Sam Altman, Geoffrey Hinton Say Abating Risk of Extinction Must Be Global Priority Artificial intelligence poses a global risk of extinction tantamount to nuclear war and pandemics, say a who's who of artificial intelligence executives in an open letter that invokes danger without suggesting how to mitigate it. Among the signatories are Sam Altman and Geoffrey Hinton.

article thumbnail

Investment May Be Down, but Cybersecurity Remains a Hot Sector

Dark Reading

There's still a great deal of capital available for innovative companies helping businesses secure their IT environments.

article thumbnail

Cisco's New XDR Tool Emphasizes Robust Telemetry Correlation

Data Breach Today

Jeetu Patel Says Native Visibility Into Network, Endpoint, Email Benefit Cisco XDR Cisco Security Executive Vice President and General Manager Jeetu Patel said the industry struggles to address multifaceted attacks that originate in email and include bad links, malware downloads to a device and more. Cyber defenders need correlated data from multiple sources of telemetry, he said.

Security 130
article thumbnail

Salesforce 'Ghost Sites' Expose Sensitive Corporate Data

Dark Reading

Some companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won't move on from them.

Cloud 113
article thumbnail

The Essential Guide to Analytic Applications

Embedding dashboards, reports and analytics in your application presents unique opportunities and poses unique challenges. We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core. No matter where you are in your analytics journey, you will learn about emerging trends and gather best practices from product experts.

article thumbnail

Cyberattack Diverts Patients From Rural Idaho Hospital

Data Breach Today

Ambulances Being Diverted to Other Facilities; Clinic Care Limited A community hospital and its clinics in rural Idaho are diverting ambulances and some patients to other facilities as the entities recover from a cyberattack discovered on Monday. The incident spotlights ongoing healthcare sector cyber challenges, especially in rural communities.

IT 130
article thumbnail

Swiss real estate agency Neho fails to put a password on its systems

Security Affairs

A misconfiguration of Swiss real estate agency Neho’s systems exposed sensitive credentials to the public. Neho, a Switzerland-based real estate agency, leaked credentials recently, potentially allowing threat actors to prey on sensitive data about the company and its clients. A misconfiguration of Swiss real estate agency Neho’s systems exposed sensitive credentials to the public.

article thumbnail

Integrating Generative AI Into the Threat Detection Process

Data Breach Today

In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.

article thumbnail

Ways to Help Cybersecurity's Essential Workers Avoid Burnout

Dark Reading

To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.

article thumbnail

ABM Evolution: How Top Marketers Are Using Account-Based Strategies

In times of economic uncertainty, account-based strategies are essential. According to several business analysts and practitioners, ABM is a necessity for creating more predictable revenue. Research shows that nearly three-quarters of marketers (74%) already have the resources needed to build successful ABM programs.

article thumbnail

Apple Patched System Integrity Protection Bypass Flaw

Data Breach Today

Microsoft Researchers Say Flaw Allowed Hackers to Load Undetectable Malware A now-patched macOS vulnerability allowed attackers with root access to bypass a kernel-level security feature that prevents malicious software from modifying protected files. An attacker could use the exploit to load malware that was shielded by Apple's System Integrity Protection.

Security 130
article thumbnail

Experts warn of backdoor-like behavior within Gigabyte systems

Security Affairs

Researchers discovered a suspected backdoor-like behavior within Gigabyte systems that exposes devices to compromise. Researchers from firmware security firm Eclypsium have discovered a suspected backdoor-like behavior within Gigabyte systems. The experts discovered that the firmware in Gigabyte systems drops and executes a Windows native executable during the system startup process.

article thumbnail

Mirai Variant Opens Tenda, Zyxel Gear to RCE, DDoS

Dark Reading

Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.

99
article thumbnail

Threat actors are exploiting Barracuda Email Security Gateway bug since October 2022

Security Affairs

Recently disclosed zero-day flaw in Barracusa Email Security Gateway (ESG) appliances had been actively exploited by attackers since October 2022. The network security solutions provider Barracuda recently warned customers that some of its Email Security Gateway (ESG) appliances were recently breached by threat actors exploiting a now-patched zero-day vulnerability.

article thumbnail

7+ Graphics Libraries to Enhance Your Embedded Analytics

When your customers come to your app, what do they see: clunky, outdated dashboards or a sleek, modern interface? If your embedded analytics are looking stale, leverage these free graphics libraries to take your embedded analytics offerings above and beyond. This e-book details a number of graphics libraries plus a few bonus tools to modernize your embedded dashboards.

article thumbnail

Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor

WIRED Threat Level

Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.

Security 102
article thumbnail

Microsoft found a new bug that allows bypassing SIP root restrictions in macOS

Security Affairs

Apple fixed a vulnerability discovered by Microsoft researchers that lets attackers with root privileges bypass System Integrity Protection (SIP). Researchers from Microsoft discovered a vulnerability, tracked as CVE-2023-32369 and dubbed Migraine, that can allow attackers with root privileges to bypass System Integrity Protection (SIP). System Integrity Protection (also referred to as rootless) is a macOS security feature introduced in OS X El Capitan (2015) (OS X 10.11).

article thumbnail

Spear Phishing Trends in 2023

KnowBe4

50% of organizations surveyed were victims of spear phishing attacks in the last twelve months, according to a new report from Barracuda. The report also found that, on average, organizations receive five “highly personalized spear phishing emails per day.

article thumbnail

Join us at PrestoCon Day, a free virtual community event

IBM Big Data Hub

The Presto Foundation is excited to share its upcoming virtual community conference PrestoCon Day , taking place on 7 June 2023. Register for the free, virtual event What is Presto? Presto is an open-source, fast and reliable SQL query engine that provides one simple ANSI SQL interface for all your data analytics and your open lakehouse. Some of the biggest companies in the world are contributing to the Presto open-source project, including Meta, Uber and Intel.

article thumbnail

ABM Success Recipe: Mastering the Crawl, Walk, Run Approach

Shifting to an account-based marketing (ABM) strategy can be both exciting and challenging. Well-implemented ABM motions build engagement with high-value accounts and drive impactful campaigns that resonate with your audience. But where do you begin, and how do you progress from crawling to running? Watch now as Demand Gen experts delve into the essentials of each stage of the ABM process.

article thumbnail

Russian Ransomware Cybercriminal Behind $200 Million in Damages is Sanctioned by the U.S. Government

KnowBe4

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has identified and designated Mikhail Matveev for his role in ransomware attacks back 2021.

article thumbnail

Preventive maintenance vs. predictive maintenance

IBM Big Data Hub

Your maintenance strategy may not be the first thing that springs to mind when thinking about the bottom line. Yet, given that machinery, equipment and systems keep businesses running, maintenance strategies have a major role to play. Without due care and attention, things break—regardless of whether that’s a transformer in an electricity grid, an axle bearing on a train or a refrigerator in a restaurant.

article thumbnail

The Bookmark Trap: How Discord Admins Fell Prey to Social Engineering

KnowBe4

Brian Krebs wrote: " A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark.

83