Fri.Mar 17, 2023

article thumbnail

European Digital Identity Bill Heads to Final Negotiations

Data Breach Today

European Parliament and Council of the EU Set to Engage in Trilogue The European Parliament approved Thursday legislation creating a continentwide framework for digital identity that European leaders hope will diminish the role of big tech companies such as Google and Apple.

article thumbnail

Feds Charge NY Man as BreachForums Boss “Pompompurin”

Krebs on Security

The U.S. Federal Bureau of Investigation (FBI) this week arrested a New York man on suspicion of running BreachForums , a popular English-language cybercrime forum where some of the world biggest hacked databases routinely show up for sale.

Sales 219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Hackers Targeting Security and Network Appliances

Data Breach Today

Fortinet Patches Zero-Day Exploited by Suspected Beijing Hacking Group UNC3886 Chinese threat actors are turning security appliances into penetration pathways, forcing firewall maker Fortinet to again attempt to fend off hackers with a patch.

article thumbnail

Microsoft Azure Warns on Killnet's Growing DDoS Onslaught Against Healthcare

Dark Reading

DDoS cyberattack campaigns from the pro-Russian group have spiked significantly

145
145
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

SVB Parent Company Seeks Bankruptcy Amid Asset Sale Process

Data Breach Today

SVB Financial Group Pursues Chapter 11 to Sell Assets Outside the Commercial Bank The former parent company of Silicon Valley Bank filed for Chapter 11 bankruptcy protection Friday in an effort to streamline the sale of its assets.

Sales 147

More Trending

article thumbnail

ISMG Editors: Will SVB Crash Kill Cybersecurity Innovation?

Data Breach Today

Insurance 147
article thumbnail

The Ethics of Network and Security Monitoring

Dark Reading

The chances of getting hacked are no longer low. Companies need to rethink their data collection and monitoring strategies to protect employee privacy and corporate integrity

article thumbnail

TikTok Says US Threatens Ban Unless Chinese Owners Divest

Data Breach Today

Western Governments Cite National Security Concerns as They Restrict TikTok Use TikTok says the Biden administration has demanded that the company's Chinese owners divest their stake in the company or risk seeing the app get banned in America. The U.S., Canada, EU, U.K.

article thumbnail

How CISOs Can Work With the CFO to Get the Best Security Budget

Dark Reading

CISOs can and should push back when they're presented with budget costs that affect the business. Here's how

Security 130
article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

What the FTC Is Signaling in Recent Data Privacy Cases

Data Breach Today

article thumbnail

Prancer Announces Integration With ChatGPT for Enhanced Security Assessments

Dark Reading

Security 127
article thumbnail

Hitachi Energy breached by Clop gang through GoAnywhere Zero-Day exploitation

Security Affairs

Hitachi Energy disclosed a data breach, the Clop ransomware gang stole the company data by exploiting the recent GoAnywhere zero-day flaw.

article thumbnail

Technology Firms Delivering Much-Sought Encryption-in-Use

Dark Reading

If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without needing to decrypt to plaintext

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

HinataBot, a new Go-Based DDoS botnet in the threat landscape

Security Affairs

A new Golang-based DDoS botnet, tracked as HinataBot, targets routers and servers by exploiting known vulnerabilities. Akamai researchers spotted a new DDoS Golang-based botnet, dubbed HinataBot, which has been observed exploiting known flaws to compromise routers and servers.

article thumbnail

Meta Proposes Revamped Approach to Online Kill Chain Frameworks

Dark Reading

A more holistic model beyond MITRE et al is needed to help defenders better identify and understand commonalities in different online threat campaigns, the Facebook parent company says

115
115
article thumbnail

San Jose State University Master of Archives and Records Administation (MARA) Open Houses Announced

IG Guru

Upcoming Online Open House Sessions: Master of Archives and Records Administration If you’re unable to attend an open house session, you can watch a recorded presentation at your convenience.

article thumbnail

Low-Budget 'Winter Vivern' APT Awakens After 2-Year Hibernation

Dark Reading

The "underreported" APT has returned to focus after attacks promoting Russian and Belarusian government interests and going after targets with humor, zest, and scrappiness

article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

Phishing Attacks Top List of Initial Access Vectors with Backdoor Deployment as Top Objective

KnowBe4

New data looking back at the cyber attacks observed in 2022 shows that phishing continues to dominate as initial access brokers seem to be growing their business using backdoors. Phishing Security Awareness Training Ransomware

article thumbnail

34 Most Common Types of Network Security Protections

eSecurity Planet

Whether you’re operating a global enterprise network or a small family business, your network’s security needs to be optimized with tools, teams, and processes to protect customer data and valuable business assets.

article thumbnail

Top 5 Insider Threats to Look Out For in 2023

Security Affairs

Unquestionably, ‘insider threats’ is one of the most neglected aspects of cybersecurity and some companies fail to recognize associated dangers. Cyberattacks are growing more complex as technology advances.

article thumbnail

Report Findings: Omdia Universe Content Services Platforms

OpenText Information Management

Rapid change and evolving modern work trends require organizations to adapt faster than ever before to stay competitive. Implementing cost-saving and efficiency-boosting solutions like content services platforms helps businesses become more agile and accelerate digital transformation initiatives.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

China-linked APT likely linked to Fortinet zero-day attacks

Security Affairs

An alleged Chinese threat actor group is behind attacks on government organizations exploiting a Fortinet zero-day flaw (CVE-2022-41328). A suspected China-linked group is exploiting a Fortinet zero-day vulnerability, tracked as CVE-2022-41328 , in attacks aimed at government organizations.

article thumbnail

IDC survey reveals B2B integration priorities to drive organizational growth

OpenText Information Management

By now, it’s clear that businesses feel the pressure to focus on supply chain optimization and improve their B2B integration investments. But where to begin?

B2B 59
article thumbnail

92% of Organizations Have Fallen Victim to Phishing as Nearly Every Org is Concerned with Email Security

KnowBe4

New data shows that not only has just about every organization experienced a successful phishing attack , but that they are also paying the price in a number of impactful ways. Phishing Email Security

article thumbnail

What Makes You Vulnerable to a Third Party Data Breach?

Record Nations

Data breaches make up an increasingly frequent and expensive part of business life. In the most recent 2022 IBM and Ponemon report, 83% of companies they surveyed reported suffering a data breach, with a staggering average cost of $4.35 million.

article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

Iowa House and Senate Unanimously Vote to Approve Comprehensive Privacy Legislation

Hunton Privacy

On March 6 and 15, 2023, both chambers of the Iowa Legislature unanimously voted to approve Senate File 262 , which could make Iowa the sixth U.S. state to enact comprehensive privacy legislation. The bill is most similar to Utah’s comprehensive privacy law.

Sales 61
article thumbnail

7 Benefits to Transit Operators Upgrading Ticketing Hardware Systems

HID Global

Upgrading ticketing hardware is essential for mass transit agencies wanting to increase fare revenues and deliver improved services

52
article thumbnail

Colorado Finalizes Rules Implementing the Colorado Privacy Act   

Hunton Privacy

On March 15, 2023, the Colorado Attorney General’s Office finalized rules implementing the Colorado Privacy Act (“CPA”). The finalized rules were released with an official redline that reflects prior revisions of the rules dated December 21, 2022 , January 27, 2023 , and February 23, 2023.