Fri.Jul 26, 2024

article thumbnail

CrowdStrike Outage: 97% of Disrupted Endpoints Restored

Data Breach Today

250,000 of the 8.5 Million Affected Windows Hosts Still Need to Be Recovered CrowdStrike said nearly all of the Windows hosts disrupted by its faulty July 19 update are now fixed. The company said the flaw involved a relatively new threat detection feature that uses configuration data that "maps to specific behaviors for the sensor to observe, detect or prevent.

IT 156
article thumbnail

Heightened Focus in the EU for the Protection of Minors Online

Data Matters

The protection of minors online continues to be a focus for EU regulators. Following the publication last year by the European Parliament of its guidelines on online age verification methods for children, the European Commission has recently announced it will be holding a dedicated stakeholder workshop in September 2024 to discuss guidelines for age verification and protecting minors.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

French Government Investigates Suspected Chinese Espionage

Data Breach Today

National Police Probe Botnet Campaign That Infected 3,000 Machines The French government has launched an investigation into a suspected Chinese espionage campaign that infected thousands of networks in France. The botnet campaign pushed out the PlugX remote access Trojan that has infected 3,000 machines in France since 2020.

article thumbnail

BIND updates fix four high-severity DoS bugs in the DNS software suite

Security Affairs

The Internet Systems Consortium (ISC) released BIND security updates that fixed several remotely exploitable DoS bugs in the DNS software suite. The Internet Systems Consortium (ISC) released security updates for BIND that address DoS vulnerabilities that could be remotely exploited. An attacker can exploit these vulnerabilities to disrupt DNS services.

article thumbnail

Solving Open Source Complexity with a Managed Data Infrastructure Platform

With its unparalleled flexibility, rapid development and cost-saving capabilities, open source is proving time and again that it’s the leader in data management. But as the growth in open source adoption increases, so does the complexity of your data infrastructure. In this Analyst Brief developed with IDC, discover how and why the best solution to this complexity is a managed service, including: Streamlined compliance with some of the most complex regulatory guidelines Simplified operations, li

article thumbnail

Tackling Fraud in AI Deepfakes With Layered Controls

Data Breach Today

Anthony Hope of NAB on the Latest Approaches to Handling AML and Financial Crimes Banks need to make changes to fraud programs to tackle mule accounts in the age of AI. Organizations need to move away from having one control to handle all suspicious accounts, said Anthony Hope, group head of AML, counter-terrorist financing, and fraud risk at NAB.

Risk 156

More Trending

article thumbnail

ISMG Editors: The CrowdStrike Outage - One Week Later

Data Breach Today

The Recovery Progress, Impact on Commercial and Public Sectors, and Lessons Learned In the latest weekly update, ISMG editors discussed the massive CrowdStrike IT outage that crashed 8.5 million Windows systems and severely affected the healthcare, finance and transportation sectors. Here's what you need to know one week later about the recovery, impact and lessons learned.

IT 156
article thumbnail

I've tried a zillion desktop distros - it doesn't get any better than Linux Mint 22

Collaboration 2.0

Linux Mint's latest release continues its tradition of excellence. It's easy to learn and use, faster than Windows, and runs on a thrift-store PC. What more can you ask for?

IT 75
article thumbnail

Ascension Files Placeholder Breach Report for May Hack

Data Breach Today

Meanwhile, Wait Continues for Change Healthcare's Breach Report in Massive Attack U.S. hospital chain Ascension has filed a placeholder breach report to federal regulators saying its May 8 ransomware attack affected at least 500 individuals. Meanwhile, the waiting game continues for Change Healthcare's official data breach report and individual notifications.

article thumbnail

Phishing Campaigns Continue To Exploit CrowdStrike Outage

KnowBe4

As expected, threat actors are taking advantage of the global IT outage caused by a faulty CrowdStrike update last Friday, SC Media reports.

article thumbnail

Provide Real Value in Your Applications with Data and Analytics

The complexity of financial data, the need for real-time insight, and the demand for user-friendly visualizations can seem daunting when it comes to analytics - but there is an easier way. With Logi Symphony, we aim to turn these challenges into opportunities. Our platform empowers you to seamlessly integrate advanced data analytics, generative AI, data visualization, and pixel-perfect reporting into your applications, transforming raw data into actionable insights.

article thumbnail

National Vulnerability Backlog Could Surge to 30,000 by 2025

Data Breach Today

New Analysis Reveals Growing Crisis for the National Vulnerability Database A growing backlog at the National Institute of Standards and Technology National Vulnerability Database could surge to above 30,000 unanalyzed security flaws by the end of the year if the agency fails to significantly ramp up its processing rates, according to a new analysis released Friday.

Security 144
article thumbnail

Europe Is Pumping Billions Into New Military Tech

WIRED Threat Level

The European Commission is allocating €7.3 billion for defense research over the next seven years. From drones and tanks of the future to battleships and space intelligence, here's what it funds.

article thumbnail

PKfail Is a Newly Discovered Pathway for Firmware Malware

Data Breach Today

UEFI Developer Leaked a Secure Boot Asymmetric Key Hundreds of laptop and server models from mainstream manufacturers are at risk of hacking that bypasses protections meant to ensure only trusted software can load during computer bootup, warn researchers from California supply chain startup Binarly.

article thumbnail

My favorite accessory for DIY projects has a useful LED screen - and it's game-changing

Collaboration 2.0

The Arrowmax SES ultra screwdriver kit combines high-quality hardware with customizable settings, and it's one of the first I've seen with a built-in display.

IT 73
article thumbnail

Entity Resolution: Your Guide to Deciding Whether to Build It or Buy It

Adding high-quality entity resolution capabilities to enterprise applications, services, data fabrics or data pipelines can be daunting and expensive. Organizations often invest millions of dollars and years of effort to achieve subpar results. This guide will walk you through the requirements and challenges of implementing entity resolution. By the end, you'll understand what to look for, the most common mistakes and pitfalls to avoid, and your options.

article thumbnail

Is your Contact Center as a Service PCI-DSS compliant?

OpenText Information Management

Navigating the world of data security can sometimes feel overwhelming, however, understanding the Payment Card Industry (PCI) Data Security Standard it is crucial for anyone involved in choosing, deploying and managing a Contact Center as a Service (CCaaS) ecosystem. Recently, I have had the privilege to engage deeply into PCI compliance requirements with our customers so let me share some insights with you to help ensure that your Contact Center is secure and 100% compliant.

article thumbnail

A bug in Chrome Password Manager caused user credentials to disappear

Security Affairs

Google addressed a Chrome’s Password Manager bug that caused user credentials to disappear temporarily for more than 18 hours. Google has addressed a bug in Chrome’s Password Manager that caused user credentials to disappear temporarily. An 18-hour outage impacted Google Chrome’s Password Manager on Wednesday, impacting users who rely on the tool to store and autofill their passwords.

article thumbnail

Your KnowBe4 Fresh Content Updates from July 2024

KnowBe4

Check out the 26 new pieces of training content added in July, alongside the always fresh content update highlights, events and new features.

article thumbnail

The best iPads for college students in 2024: Expert tested and reviewed

Collaboration 2.0

From taking notes and Zoom calls to completing a graphic design project, we went hands-on with the top iPads for college students heading back to campus this fall.

67
article thumbnail

Deliver Mission Critical Insights in Real Time with Data & Analytics

In the fast-moving manufacturing sector, delivering mission-critical data insights to empower your end users or customers can be a challenge. Traditional BI tools can be cumbersome and difficult to integrate - but it doesn't have to be this way. Logi Symphony offers a powerful and user-friendly solution, allowing you to seamlessly embed self-service analytics, generative AI, data visualization, and pixel-perfect reporting directly into your applications.

article thumbnail

Russian Super-Threat Group Fin7 Comes Back from the Dead

KnowBe4

Declared “dead” by the U.S. Attorney’s Office in 2023, this threat group now has massive cybercrime infrastructure in use and is impersonating some.

article thumbnail

One of the best budget Android tablets I've tested is not made by Samsung or Google

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G is my new favorite e-reader for its versatile display and value.

IT 70
article thumbnail

New Phishing Scam Leverages Chat To Add Credibility And Ensure Success

KnowBe4

An expository look at one phishing scam intent on stealing credit card details shows how scammers are leveraging trusted aspects of ecommerce to make.

article thumbnail

Microsoft's July update may put your PC in BitLocker recovery - here's how to fix this

Collaboration 2.0

A patch is coming, but for now you'll need to enter your BitLocker recovery key to successfully boot into Windows.

74
article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

Request for Feedback on the ERM Federal Integrated Business Framework

National Archives Records Express

As part of our ongoing Federal Electronic Records Modernization Initiative (FERMI) work, we have completed an annual review to update the Electronic Records Management (ERM) Federal Integrated Business Framework as required by the Business Standards Council where we serve as the standards lead for electronic records management. We consulted with our interagency Requirements Working Group to identify changes for the Framework.

article thumbnail

Enhance your data strategy with Collibra and SAP Datasphere

Collibra

Today’s problem: Ensuring high-quality data governance In the current data and AI-driven environment, the main emphasis is on ensuring high-quality, well-documented and reliable data. This task is challenging due to data being frequently dispersed across multiple systems, resulting in data silos containing inconsistent and unreliable data, as well as issues with data quality and duplication.

article thumbnail

AI for Good: Matching great potential with great responsibility

CGI

We have real opportunities that can unite us toward a common goal of making AI a positive force for people's lives and work. AI is here to stay, and it is up to us to intentionally envision and shape a positive future. Let us start by understanding AI, asking the right questions, having a human-centric vision for using the technology, and collaborating with an ecosystem of players.

IT 56
article thumbnail

Elon Musk’s X under pressure from regulators over data harvesting for Grok AI

The Guardian Data Protection

Social media platform uses pre-ticked boxes of consent, a practice that violates UK and EU GDPR rules Elon Musk’s X platform is under pressure from data regulators after it emerged that users are consenting to their posts being used to build artificial intelligence systems via a default setting on the app. The UK and Irish data watchdogs said they have contacted X over the apparent attempt to gain user consent for data harvesting without them knowing about it.

article thumbnail

Using Data & Analytics for Improving Healthcare Innovation and Outcomes

In the rapidly evolving healthcare industry, delivering data insights to end users or customers can be a significant challenge for product managers, product owners, and application team developers. The complexity of healthcare data, the need for real-time analytics, and the demand for user-friendly interfaces can often seem overwhelming. But with Logi Symphony, these challenges become opportunities.

article thumbnail

What to expect from Made by Google 2024: Pixel 9 Pro Fold, Watch, Android 15, AI, and more

Collaboration 2.0

Google's next big product launch takes place on August 13. Here's everything you can expect from the event.

62
article thumbnail

A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them

WIRED Threat Level

KnowBe4 detailed the incident in a recent blog post as a warning for other potential targets.

article thumbnail

We've entered the era of the smart ring. Here's why it will shake up the wearables market

Collaboration 2.0

Samsung's release of its first-ever smart ring signals a pendulum swing back to discreet, unobtrusive wearables. Here's why it's a big deal.