Wed.Sep 18, 2024

article thumbnail

Australian Police Arrest Alleged Head of Ghost Encrypted App

Data Breach Today

International Law Enforcement Dismantles End-to-End Encrypted Messaging Service An international law enforcement operation dismantled the Ghost encrypted messaging service in a takedown that resulted in the arrest of 51 suspects across three continents including alleged members of the Italian Mafia and motorcycle gangs. Australian police arrested Ghost's alleged administrator.

article thumbnail

News alert: INE Security’s cybersecurity training service earns 2024 SC Excellence Award

The Last Watchdog

Cary, NC, Sept.18, 2024, CyberNewsWire — INE Security is proud to announce that it has been named a winner in the prestigious 2024 SC Awards, named Best IT Security-Related Training Program. This designation underscores INE Security’s commitment to excellence and leadership in the cybersecurity industry. The SC Awards , now in its 27th year, recognize the solutions, organizations, and individuals that have demonstrated outstanding achievement in advancing the security of information system

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Use the STAR Method for Your Cybersecurity Job Interview

Data Breach Today

Tell Interviewers How You Respond to Incidents and Solve Problems The STAR - Situation, Task, Action, Result - method is a widely used framework for answering behavioral interview questions. It allows job candidates to present their experiences in a structured way, making it easier for interviewers to understand their problem-solving skills and real-world impact.

article thumbnail

News alert: SpyCloud study reveals ‘infostealer’ malware can be a precursor to a ransomware attack

The Last Watchdog

Austin, TX, Sept. 18, 2024, CyberNewsWire — SpyCloud , the leader in Cybercrime Analytics, today announced new cybersecurity research highlighting the growing and alarming threat of infostealers – a type of malware designed to exfiltrate digital identity data, login credentials, and session cookies from infected devices. SpyCloud’s latest findings reveal the staggering scale of identity exposure caused by infostealers, the influence this type of malware has had on the surge in ransomware i

article thumbnail

The Tumultuous IT Landscape is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Chinese Hackers Build Massive Botnet Targeting US Devices

Data Breach Today

Global Botnet's Victims Are in United States, Germany, Romania and Hong Kong FBI Director Christopher Wray said Wednesday the bureau seized control of a Chinese-developed botnet that maintained access to thousands of compromised devices across the globe as part of an effort to launch widespread disruptive cyberattacks. The botnet is a Mirai variant.

Access 210

More Trending

article thumbnail

California Enacts Laws to Combat Election, Media Deepfakes

Data Breach Today

Laws Seek Removal of Deceptive Content, Labeling of Less Malicious Content California enacted regulation to crack down on the misuse of artificial intelligence as Gov. Gavin Newsom on Tuesday signed five bills focused on curbing the impact of deepfakes. The Golden State has been on the national forefront of tech regulation.

article thumbnail

Experts warn of China-linked APT’s Raptor Train IoT Botnet

Security Affairs

Researchers warn of a new IoT botnet called Raptor Train that already compromised over 200,000 devices worldwide. Cybersecurity researchers from Lumen’s Black Lotus Labs discovered a new botnet, named Raptor Train, composed of small office/home office (SOHO) and IoT devices. The experts believe the botnet is controlled by a Chine-linked APT group Flax Typhoon (also called Ethereal Panda or RedJuliett).

IoT 111
article thumbnail

How Mega Attacks Are Spotlighting Critical 3rd-Party Risks

Data Breach Today

Recent mega data breaches involving third-party vendors - such as the Change Healthcare cyberattack - are intensifying the spotlight on critical security risk management and governance issues for business associates and other suppliers, said regulatory attorney Rachel Rose.

Risk 200
article thumbnail

Walkie-Talkies Explode in New Attack on Hezbollah

WIRED Threat Level

In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths.

Security 130
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Intezer's $33M Series C Funding to Fuel AI, Customer Support

Data Breach Today

Norwest Money Fuels Integration of Cloud Defense Tools, Autonomous Alert Management Norwest Venture Partners led a $33 million Series C round to accelerate Intezer's product development, strengthen AI models and broaden security alert coverage. The funding will enable the New York-based company to offer more support for cloud security while growing its customer success teams.

Cloud 195
article thumbnail

Did a Chinese University Hacking Competition Target a Real Victim?

WIRED Threat Level

Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there.

Military 104
article thumbnail

Beware the Great AI Bubble Popping

Data Breach Today

Crashing Markets, Slower Innovation, But More Sustainable AI Development If the bubble isn't popping already, it'll pop soon, say many investors and close observers of the AI industry. If past bubbles are a benchmark, the burst will filter out companies with no solid business models and pave the way for more sustainable growth for the industry in the long term.

Marketing 184
article thumbnail

Broadcom fixed Critical VMware vCenter Server flaw CVE-2024-38812

Security Affairs

Broadcom addressed a critical vulnerability in the VMware vCenter Server that could allow remote attackers to achieve code execution. Broadcom released security updates to address a critical vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), in VMware vCenter Server that could lead to remote code execution. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

Cloud 97
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Swiss Post to Strengthen Cybersecurity With Open Systems Buy

Data Breach Today

Acquisition Set to Boost SASE Protection, Network Connectivity for Swiss Businesses Swiss Post has signed an agreement to acquire Open Systems, a cybersecurity leader specializing in secure access service edge. The deal, expected to close by late 2024, will expand Swiss Post's offerings for secure digital communications for public and private organizations across Switzerland.

article thumbnail

Credential Flusher, understanding the threat and how to protect your login data

Security Affairs

Credential Flusher is a method that allows hackers to steal login credentials directly from the victim’s web browser. The cyber attacks have become increasingly sophisticated, putting our personal information at risk. One of the latest and most insidious techniques is Credential Flusher, a method that allows hackers to steal login credentials directly from the victim’s web browser.

article thumbnail

I added 1TB of storage to my sluggish PC with this thumb-sized accessory

Collaboration 2.0

If you're dealing with a laggy PC, the PNY 1TB storage drive can speed up your system with added storage. And it dealt with my stress tests exceedingly well.

IT 98
article thumbnail

U.S. Government Indicts Chinese National For Alleged Spear Phishing Attacks

KnowBe4

The U.S. Justice Department has indicted a Chinese national, Song Wu, for allegedly sending spear phishing emails to employees at various U.S. military and government entities, research institutions and private companies.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

The 2-in-1 laptop I recommend most is not a Lenovo or a Dell (and its price continues to drop)

Collaboration 2.0

The 2024 HP Envy x360 2-in-1 stands out from a sea of similar devices with its well-optimized hardware, vibrant displays, and low cost.

IT 95
article thumbnail

SANS Releases Guide to Address Rise in Attacks on Manufacturing and Industrial Control Systems

KnowBe4

Increased ransomware attacks on industrial control systems (ICS), mixed with general ICS insecurity found across the manufacturing sector, has given rise to a guide specifically addressing this risk.

article thumbnail

Move over, Sonos. Bose just announced its own twist to headphones and soundbar compatibility

Collaboration 2.0

The new Bose Smart Soundbar debuts with two new software features, one of which is a direct response to Sonos' TV Audio Swap.

IT 98
article thumbnail

North Korean Hackers Target Software Developers With Phony Coding Tests

KnowBe4

Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Step aside, Sonos. Bose delivers another path to headphone and soundbar compatibility

Collaboration 2.0

The new Bose Smart Soundbar debuts with two new software features, one of which is a direct response to Sonos' TV Audio Swap.

98
article thumbnail

The Inside Man Biggest Fan Contest is Heating Up

KnowBe4

We are halfway through our annual The Inside Man Biggest Fan Contest, and we already have some amazing entries!

article thumbnail

Google Veo is coming to YouTube, bringing dynamic AI backgrounds to Shorts

Collaboration 2.0

Later this year, content creators and users will be able to generate more interesting backdrops with an upgraded Dream Screen feature.

90
article thumbnail

Building Security Resilient Against Quantum Threats: Embracing PQC in Five Steps

Thales Cloud Protection & Licensing

Building Security Resilient Against Quantum Threats: Embracing PQC in Five Steps divya Thu, 09/19/2024 - 06:53 The recent announcement by NIST regarding the finalization of post-quantum cryptography (PQC) standards marks a pivotal moment for organizations aiming to future-proof their data security against quantum threats. The three standards—FIPS 203 (Kyber for key encapsulation), FIPS 204 (Dilithium for digital signatures), and FIPS 205 (SPHINCS+ for stateless signatures)—are designed to bolste

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Deal alert: Get a Shark handheld vacuum for $30 (50% off) right now

Collaboration 2.0

An extra coupon code brings down the already discounted Shark Cyclone PET handheld vacuum to only $30.

98
article thumbnail

A Must See for KnowBe4 Customers and Partners: Geoff White to Keynote KB4-CON EMEA 2024

KnowBe4

As a valued KnowBe4 customer and partner, we're thrilled to bring you exciting news about our upcoming KB4-CON EMEA 2024 in London.

article thumbnail

20 Years in the making: Real-Time Linux finally makes it to the kernel

Collaboration 2.0

The work done on real-time Linux has benefitted the OS almost since the start, but it was only the other day that Torvalds finally admitted its last piece into the mainline kernel.

IT 98