Mon.Aug 12, 2024

article thumbnail

US Charges 2 for Running Russian-Speaking Carder Forum

Data Breach Today

Unemployed Defendants Allegedly Bought Luxury Car, Lived in Beach House U.S. law enforcement charged two alleged masterminds of one of the largest Russian-language cybercrime forums after they claimed asylum inside the United States and lived a luxurious life in Miami. Federal agents obtained an image of the server hosting the forum.

162
162
article thumbnail

EU Governments Sign-off Proposed Reforms to GDPR Procedural Rules and Council Reaches Common Member States’ Position

Data Matters

On 24 May 2024, the Council of the European Union (the “Council”) released new details of a proposed reform of the General Data Protection Regulation’s (“GDPR”) procedural rules, which representatives of EU national governments approved on 29 May 2024. On 13 June 2024, the Council issued a press release detailing its agreed common Member States’ position that maintains the general thrust of the original proposed reforms, but which seeks to: (i) introduce clearer timelines; (ii) improve efficienc

GDPR 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

X's Grok AI Plan Invites More European Scrutiny

Data Breach Today

Rights Group NOYB Files 9 Complaints Against X for Privacy Violation Social media platform X faces the prospect of more legal scrutiny in Europe over its decision to feed customer data into its Grok artificial intelligence system after it agreed Thursday to suspend harvesting tweets as training data. NOYB said the company it is still likely violating privacy law.

article thumbnail

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE

Security Affairs

Microsoft found four bugs in OpenVPN that could be chained to achieve remote code execution and local privilege escalation. During the Black Hat USA 2024 conference, Microsoft researchers disclosed multiple medium-severity bugs in the open-source project OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE).

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Tech School Hack Affects Health, Personal Data of 209,000

Data Breach Today

East Valley Institute of Technology Is One of LockBit's Education Sector Victims An Arizona-based technical school is notifying nearly 209,000 current and former students, parents and faculty that their personal, health and financial information was potentially compromised in a LockBit attack earlier this year. The ransomware hack is one of many hits in the education sector.

More Trending

article thumbnail

Why CrowdStrike Is Eyeing a $1B Buy of Patching Firm Action1

Data Breach Today

CrowdStrike Probes Largest Deal in History Weeks After Causing Massive IT Outage CrowdStrike is in talks to acquire Houston-based patch management and vulnerability remediation startup Action1 for close to $1 billion, co-founder and CEO Alex Vovk told employees in an email Wednesday. This would be the largest acquisition in the endpoint security vendor's history.

Security 113
article thumbnail

Hacker Stories: A Facebook Physical Threat

KnowBe4

Most people take a lot of measures to secure their online bank accounts, credit card accounts, retirement accounts and other financial accounts. This often means enabling some form of multi-factor authentication (MFA), using a strong password, or other means of keeping money safe.

Passwords 123
article thumbnail

EastWind campaign targets Russian organizations with sophisticated backdoors

Security Affairs

A campaign tracked as EastWind is targeting Russian government and IT organizations with PlugY and GrewApacha Backdoors. In late July 2024, Kaspersky researchers detected a series of targeted cyberattacks against the Russian government and IT organizations. Kaspersky named this campaign has EastWind. Threat actors sent phishing emails with RAR archive attachments containing a Windows shortcut to install malware.

Libraries 127
article thumbnail

Taxonomy of Generative AI Misuse

Schneier on Security

Interesting paper: “ Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data “: Generative, multimodal artificial intelligence (GenAI) offers transformative potential across industries, but its misuse poses significant risks. Prior research has shed light on the potential of advanced AI systems to be exploited for malicious purposes.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Intel chip bug FAQ: Which PCs are affected, how to get the patch, and everything else you need to know

Collaboration 2.0

Does your desktop PC have a 13th- or 14th-generation Raptor Lake CPU? Read this now. Don't know your CPU? Then you really need to read this.

98
article thumbnail

How Cybersecurity Can Save Critical Infrastructure

Thales Cloud Protection & Licensing

How Cybersecurity Can Save Critical Infrastructure josh.pearson@t… Tue, 08/13/2024 - 07:05 Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS). Motivated by various factors – from monetary to geopolitical – malevolent actors seek to disrupt critical operations.

article thumbnail

'Logical, beautiful, perfect' WordStar rises again: How you can type faster with this old tech

Collaboration 2.0

Older than the floppy drive and long favored by writers and typists alike, WordStar makes a comeback thanks to the efforts of this Hugo-winning sci-fi author. Here's how to try it.

IT 76
article thumbnail

Enhancing HIPAA Compliance With Biometrics: A Guide for Healthcare Providers

HID Global

Strengthen healthcare HIPAA compliance with advanced biometric technologies. Explore effective solutions to protect patient data & improve security for healthcare providers.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Worried about the Windows BitLocker recovery bug? 6 things you need to know

Collaboration 2.0

Microsoft alerted its customers to a frightening bug in Windows 11. What are the chances you'll encounter that bug, and what should you do to prepare? I have the answers here.

IT 98
article thumbnail

How HID and Microsoft Are Making Passkeys More Accessible to Enterprise

HID Global

Don’t leave your organization vulnerable with weak passwords. Implement passkeys across your enterprise with HID® & Microsoft.

Access 52
article thumbnail

Disposing of an old Windows laptop? Here's the safest way to erase your personal data (for free!)

Collaboration 2.0

Before you sell, give away, or otherwise dispose of an old laptop, make sure your personal files are thoroughly deleted and unrecoverable. Everything you need is available as part of Windows.

article thumbnail

MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

The Last Watchdog

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024 : GenAI is very much in the mix as a potent X-factor in cybersecurity. Related: Prioritizing digital resiliency I spoke with over three dozen cybersecurity solution providers. Some of the more intriguing innovations had to do with leveraging GenAI/LLM-equipped chatbots as proprietary force multipliers.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

System76's new COSMIC Linux desktop is out of this world

Collaboration 2.0

One of the most popular sellers of Linux desktops and laptops has finally released the alpha version of its new COSMIC desktop and it's something special.

IT 75
article thumbnail

News alert: Criminal IP and Maltego team up to broaden threat intelligence data search

The Last Watchdog

Torrance, Calif., Aug. 12, 2024, CyberNewsWire — Criminal IP , an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with Maltego , a global all-in-one investigation platform that specializes in visualized analysis of combined cyber data. This collaboration integrates Criminal IP’s comprehensive database of malicious IPs, domains, and CVEs directly into Maltego’s unified user interface and adds Criminal IP to Malte

Phishing 130
article thumbnail

Grab a Microsoft Office 2021 for Windows license for $40

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 79% off right now (there's a deal for a Mac version, too).

98
article thumbnail

Embracing digital inclusivity

OpenText Information Management

In our increasingly interconnected digital world, accessible documents are no longer optional—they're essential for fostering inclusive communication and breaking down barriers for individuals with diverse abilities. As we approach 2025, the implementation deadline for the European Accessibility Act (EAA), ensuring digital independence for all has become a critical priority for organizations worldwide.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Costco is cracking down on membership sharing. Buy your own for $40 with this deal

Collaboration 2.0

Costco is starting to check membership cards more closely, so don't miss this deal to buy a membership that comes with a free $20 gift card. (I bought one and highly recommend it.

IT 98
article thumbnail

Trump Leak Likely a Harbinger of More Interference to Come

Data Breach Today

Current Foreign Disinformation Attempt Using Leaked Documents Branded 'Incompetent' Cybersecurity experts are urging election campaign officials and policymakers to revisit their defenses in the wake of the Trump campaign confirming it was breached and that internal documents were stolen and leaked as part of an apparent foreign disinformation campaign.

article thumbnail

The best services for deleting yourself from the internet in 2024

Collaboration 2.0

Erasing yourself from the internet isn't an easy or quick process, but our recommended data removal services take the legwork out of the journey.

75
article thumbnail

Upgrade to Windows 11 Pro license for $20 - the lowest price we've seen

Collaboration 2.0

Buy a lifetime Windows 11 Pro license with more productivity features that will help you get things done -- and it's 89% off with this deal.

IT 75
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Nvidia will train 100,000 California residents on AI in a first-of-its-kind partnership

Collaboration 2.0

The program aims to open up new career pathways that could benefit students and California, too. Here's how it works.

IT 98
article thumbnail

Microsoft to kill off its Paint 3D app soon: Here's what that means for current users

Collaboration 2.0

Paint 3D's impending demise was revealed through a banner that appears for some people in the app itself. But if you're a fan, there is some good news.

IT 75
article thumbnail

The best HDMI splitters of 2024: Expert recommended

Collaboration 2.0

We tested and researched the best HDMI splitters that provide a convenient and efficient way to distribute HDMI signals to multiple displays. These are our favorites.

75