Fri.Aug 09, 2024

article thumbnail

ISMG Editors: Is Russia Waging War Through Ransomware?

Data Breach Today

Also: Lone-Wolf Operators, Attacks on Medical Supply Chains – What's Next? In the latest weekly update, ISMG editors explore evolving ransomware threats, including rising attacks in healthcare and other critical sectors, a shift from cybercrime groups such as LockBit to lone-wolf operators, and why Russian ransomware gangs are dominating the global stage.

article thumbnail

UK proposes New Cyber Security and Resilience Bill to Boost the UK’s Cyber Defences

Data Matters

During the King’s Speech on 17 July 2024, the newly appointed UK Prime Minister announced the UK Government’s intention to introduce a new Cyber Security and Resilience Bill to strengthen the UK’s defences against the global rise in cyberattacks and to protect the UK’s critical infrastructure. In background briefing notes published together with the King’s Speech, the UK Government stated that the new Cyber Security and Resilience Bill will “strengthen our defences and ensure that more essential

Security 166
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How New Global AI Standards Can Shape Ethical AI Practices

Data Breach Today

Craig Civil of BSI on Implementing ISO/IEC 42001 Standard Within the Organization ISO/IEC 42001, launched in late 2023, is the world's first AI management system standard, offering a framework to ensure responsible AI practices. Craig Civil, director of data science and AI at BSI, discusses the importance of AI policies and BSI's plans to implement the standard.

article thumbnail

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

WIRED Threat Level

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.

IT 145
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Iran Amplifies US Election Influence Campaign

Data Breach Today

Microsoft Says Tehran Has Stepped Up Activity As November Election Day Approaches Iranian operatives stepped up influence and hacking operations against U.S. targets as presidential election ramps up for its final months, warned Microsoft on Thursday. Iran is one of a handful of authoritarian countries that use hacking and disinformation to undermine American democracy.

IT 147

More Trending

article thumbnail

Rhysida Claims Major Data Theft From 2 More Health Systems

Data Breach Today

Group Threatens to Sell Data From Bayhealth and Community Care Alliance on Dark Web Ransomware group Rhysida is shaking down at least two new victims in the healthcare sector - Bayhealth and Community Care Alliance - threatening to sell or dump patients' sensitive health and personal information on the dark web. Bayhealth confirmed that it is investigating a recent cyberattack.

article thumbnail

Five zero-days impacts EoL Cisco Small Business IP Phones. Replace them with newer models asap!

Security Affairs

Cisco warns of critical remote code execution zero-day vulnerabilities impacting end-of-life Small Business SPA 300 and SPA 500 series IP phones. Cisco warns of multiple critical remote code execution zero-day vulnerabilities in end-of-life Small Business SPA 300 and SPA 500 series IP phones. “Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an attacker to execute arbi

IT 112
article thumbnail

Delta Versus CrowdStrike and Microsoft: Accusations Fly

Data Breach Today

After IT Outage, Firms Question Why Delta's Competitors Recovered So Much Faster Delta Air Lines' war of words against CrowdStrike and Microsoft over its extended IT outage continue to escalate, with the airline threatening litigation to recover $500 million in lost revenue and expenses. CrowdStrike and Microsoft have pledged to vigorously fight any such litigation.

IT 147
article thumbnail

People-Search Site Removal Services Largely Ineffective

Schneier on Security

Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are largely ineffective. Private information about each participant on the people-search sites decreased after using the people-search removal services. And, not surprisingly, the removal services did save time compared with manually opting out.

Privacy 100
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Not Just Us: North Korean Remote IT Fraudster Arrested in Tennessee

KnowBe4

Just when we thought we had something special with our very own North Korean hacker , it turns out this type of fraud has made it to the Volunteer State.

IT 114
article thumbnail

Sonos smart speakers flaw allowed to eavesdrop on users

Security Affairs

NCC Group discovered vulnerabilities in Sonos smart speakers, including a flaw that could have allowed to eavesdrop on users. Researchers from NCC Group have discovered multiple vulnerabilities in Sonos smart speakers, including a flaw, tracked as CVE-2023-50809, that could have allowed eavesdropping on users. The researchers have disclosed the vulnerabilities during the BLACK HAT USA 2024 conference.

article thumbnail

A Whopping 33% of Young American Are Exposed to Political Lies on TikTok

KnowBe4

Excellent reporting by the Wall Street Journal! They wrote about a disturbing trend. "Amid a deluge of election news and memes on TikTok, WSJ found thousands of videos with political lies and hyperbole.

106
106
article thumbnail

ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look

WIRED Threat Level

Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

How to use Apple Pay in stores and online (and why you should)

Collaboration 2.0

It's super convenient, more secure than swiping a card, and so simple to set up. Enjoy fast, contactless checkout with your iPhone - or Apple Watch - most anywhere you shop.

article thumbnail

6 VPN Security Best Practices for Secure Connection

eSecurity Planet

Every network connection, every device, every user—well-meaning or not—exposes a network to risk. But you can’t do business in an unconnected silo. Online commerce drives the velocity of business from front-end to back-end. Types of devices using network access have proliferated. This has made businesses more responsive, more agile—and more vulnerable.

article thumbnail

Have you used Cash App in the last 6 years? You might be eligible for $2,500

Collaboration 2.0

As part of a $15 million class action settlement, Cash App users who experienced losses from a data breach can get some money back. Here's how.

article thumbnail

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

WIRED Threat Level

The vulnerabilities, which have been patched, may have novel appeal to attackers as an avenue to compromising phones.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

You can upgrade your old PC to Windows 11 - even if Microsoft says it's 'incompatible'. Here's how

Collaboration 2.0

You don't have to throw away a perfectly good PC just because it doesn't meet Microsoft's strict Windows 11 compatibility standards. Here's how you can work around the restrictions and safely upgrade a Windows 10 PC.

IT 76
article thumbnail

OpenText Analytics Database: The ELT Advantage

OpenText Information Management

The choice between ETL (Extract, Transform, Load) and ELT (Extract, Load, Transform) is crucial in the modern data management landscape. OpenText Analytics Database (Vertica), with its advanced analytics database, emerges as a powerful ally for businesses leaning towards the ELT methodology. Here's why: Seamless Integration with ELT Processes The OpenText Analytics Database (Vertica) is designed to thrive in an ELT-centric environment.

article thumbnail

Bluetti slashes power station prices in big summer sale

Collaboration 2.0

Save hundreds of dollars on many of Bluetti's most popular power stations - and power station/solar panel bundles. We've got exclusive discount codes, too.

Sales 98
article thumbnail

[WHOA] - This 'Unpatch Attack' Is A New One To Me!

KnowBe4

In a startling revelation at Black Hat 2024, SafeBreach security researcher Alon Leviev demonstrated a critical vulnerability in Windows systems, dubbed the "Windows Downdate" attack.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

This stereo amp made me feel like I was listening to my favorite songs for the first time

Collaboration 2.0

As an audiophile, I appreciate high-quality products that don't break the bank, and Outlaw Audio's RR 2160 Mk II retro stereo receiver is exactly that.

98
article thumbnail

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

Schneier on Security

Yet another SQUID acronym : SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how AI models analyze the genome. Compared with other analysis tools, SQUID is more consistent, reduces background noise , and can lead to more accurate predictions about the effects of genetic mutations.

IT 90
article thumbnail

I compared the Google Pixel 8a with every major sub-$500 Android phone - here's my buying advice

Collaboration 2.0

The latest Pixel has standout features, including a comfortable design and reliable cameras, but can its AI features separate it from a crowded mid-range market?

article thumbnail

The best iPhone models of 2024: Expert tested and reviewed

Collaboration 2.0

ZDNET has tested every iPhone model available on the market, including the Pro Max and Mini. Here are your best options.

article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Microsoft's Clipchamp video editor is getting free AI features - and they're very useful

Collaboration 2.0

Available to Microsoft 365 Insiders, noise suppression and image background removal will upgrade your video quality. Here's how to use both.

75
article thumbnail

The best laptops of 2024: Expert tested and reviewed

Collaboration 2.0

We've gone hands-on with dozens of laptops this year from Apple, Dell, LG, and more so you can find the best fit.

76
article thumbnail

This rugged power bank is one of the fastest I've used - and it's so close to perfect

Collaboration 2.0

I completed a 850-mile road trip in 24 hours, and the BioLite Charge 100 Max kept my devices powered with no sweat.

IT 75