Mon.Mar 13, 2023

article thumbnail

GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?

The Last Watchdog

This year has kicked off with a string of high-profile layoffs — particularly in high tech — prompting organizations across all sectors to both consider costs and plan for yet another uncertain 12 or more months. Related: Attack surface management takes center stage. So how will this affect chief information security officers (CISOs) and security programs?

Insurance 157
article thumbnail

Heart Device Maker Says Hack Affected 1 Million Patients

Data Breach Today

PHI of Former and Current Patients Using Wearable Cardiac Defibrillator Compromised Emergency medical device provider Zoll Medical Corp.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SVB Meltdown: What It Means for Cybersecurity Startups' Access to Capital

Dark Reading

The implosion of Silicon Valley Bank will impact investors, startups, and enterprise customers as they become more cautious over the near term, security experts say

Access 111
article thumbnail

Dark Pink APT Group 'Very Likely' Back in Action

Data Breach Today

Recently-Emerged Threat Actor Focuses on Asia Pacific Cybersecurity researchers say they've almost certainly spotted traces of the recently-emerged advanced persistent threat group Dark Pink, now apparently attacking victims with a newly improved obfuscation routine to evade anti-malware measures

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Microsoft Warns of Business Email Compromise Attacks Taking Hours

KnowBe4

According to Microsoft's Security Intelligence team, a recent business email compromise attack (BEC) has shown that threat actors are quickening the pace of these attacks, with certain elements only taking a few minutes. Social Engineering CEO Fraud

Security 110

More Trending

article thumbnail

Threat Actors are Using FINRA Impersonation For Their Attacks

KnowBe4

DomainTools warns that a sophisticated West Africa-based fraud group is impersonating the Financial Industry Regulatory Authority (FINRA) to target users in the United States, according to researchers at DomainTools.

article thumbnail

SVB Dominoes Fall: HSBC Buys UK Arm; Feds Grab Canadian Arm

Data Breach Today

2 More Regional Banks Showing Signs of Liquidity Issues; Feds Reassure Depositors Europe's largest bank, HSBC, agreed on Monday to buy the United Kingdom subsidiary of Silicon Valley Bank, and Canada's government took control of SVB's Canadian branch late Sunday.

article thumbnail

AI-Created YouTube Videos Spread Around Malware

Dark Reading

AI-generated videos pose as tutorials on how to get cracked versions of Photoshop, Premiere Pro, and more

105
105
article thumbnail

Ukraine Tracks Increased Russian Focus on Cyberespionage

Data Breach Today

Military 130
article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

200-300% Increase in AI-Generated YouTube Videos to Spread Stealer Malware

Dark Reading

105
105
article thumbnail

North Korean Hackers Find Value in LinkedIn

Data Breach Today

Group Lures Victims Into Opening Phishing Payload Disguised as Job-Related Info Business social media platform LinkedIn continues to pay dividends for North Korean hackers, including one group historically concentrated on South Korean targets that has expanded into pursuing security researchers and media industry workers in the West.

Phishing 130
article thumbnail

If These Walls Could Talk: A Century of Scandals and Secrets Behind the Oldest House in Beverly Hills

Information Governance Perspectives

The home I grew up in, Beverly Hills, California, figures prominently in my new memoir, The Bastard of Beverly Hills. I can't reveal too much because the setting is part of the book's mystery, but I can share some other odd facts about the home's history and it's owners that might blow your mind.

article thumbnail

5 Lessons Learned From Hundreds of Penetration Tests

Dark Reading

Developers must balance creativity with security frameworks to keep applications safe. Correlating business logic with security logic will pay in safety dividends

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

EDPB Guidelines on international transfers: 6 key takeways

Data Protection Report

GDPR 137
article thumbnail

Hackers Lure Cybersecurity Researchers With Fake LinkedIn Recruiter Profiles

Dark Reading

Campaign demonstrates the DPRK-backed cyberattackers are gaining tools to avoid EDR tools

article thumbnail

Golang-Based Botnet GoBruteforcer targets web servers

Security Affairs

A recently discovered Golang-based botnet, dubbed GoBruteforcer, is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services Researchers from Palo Alto Networks Unit 42 recently discovered a Golang-based botnet, tracked as GoBruteforcer, which is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services.

article thumbnail

Brand Names in Finance, Telecom, Tech Lead Successful Phishing Lures

Dark Reading

AT&T, PayPal, and Microsoft top the list of domains that victims visit following a link in a phishing email, as firms fight to prevent fraud and credential harvesting

article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

Key Points from the US National Cybersecurity Strategy 2023

Thales Cloud Protection & Licensing

Key Points from the US National Cybersecurity Strategy 2023 divya Mon, 03/13/2023 - 15:39 On March 2, the Biden administration released its 2023 National Cybersecurity Strategy, an attempt “ to secure the full benefits of a safe and secure digital ecosystem for all Americans.”

Cloud 126
article thumbnail

Orgs Have a Long Way to Go in Securing Remote Workforce

Dark Reading

Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies

article thumbnail

Ransomware Attacks Have Entered a ‘Heinous’ New Phase

WIRED Threat Level

With victims refusing to pay, cybercriminal gangs are now releasing stolen photos of cancer patients and sensitive student records. Security Security / Cyberattacks and Hacks

article thumbnail

Webinar: IG/RIM Principles with Aviation Applications on March 14th, 2023 at 11:45am via ARMA Dallas

IG Guru

Registration closes Monday March 13th at 4:00pm IG/RIM Principles with Aviation Applications How to write a strategic plan for records management/information governance at an organization.

Privacy 81
article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

CISA adds Plex Media Server bug, exploited in LastPass attack, to Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added remote code execution vulnerability in Plex Media Server to its Known Exploited Vulnerabilities Catalog.

article thumbnail

What ChatGPT Taught Me About Mainframe Modernization

Micro Focus

I decided to go back to the basics again and ask OpenAI’s ChatGPT about the topics I write on all the time for Micro Focus Application Modernization & Connectivity. The post What ChatGPT Taught Me About Mainframe Modernization first appeared on Micro Focus Blog.

article thumbnail

Dark Pink APT targets Govt entities in South Asia

Security Affairs

Researchers reported that Dark Pink APT employed a malware dubbed KamiKakaBot against Southeast Asian targets.

article thumbnail

Quality is at the heart of Life Sciences organizations

OpenText Information Management

Quality is at the heart of the highly regulated Life Sciences industry. Ever changing regulations and technology are improving the quality of people’s lives, although often at the cost of increased complexity in managing business processes.

59
article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

SEC Brings Cyber Disclosure Enforcement Action

Hunton Privacy

On March 9, 2023, the U.S. Securities and Exchange Commission (SEC) announced settled administrative charges against Blackbaud Inc.

article thumbnail

Europe: Applicability of the GDPR in civil proceedings

DLA Piper Privacy Matters

By Jan Pohle, Dr. Philipp Adelberg In its judgment of 2 March 2023, the European Court of Justice ( ECJ ) (C-268/21) issued a preliminary ruling on whether and to what extent provisions of the General Data Protection Regulation ( GDPR ) are applicable in the context of national civil procedural law of the EU member states.

Privacy 52
article thumbnail

NIS2 Directive: What does it mean to senior managers and their cybersecurity strategy?

Jamf

In this concluding blog of the series that analyzes the changes to the Network and Information Security regulations by the European Union, we focus on what the changes mean to top-level executives and the factors to consider when building cybersecurity strategies going forward