DataBreachToday.com
How Microsoft Is Beefing Up Security With 34,000 Engineers
3 months 3 weeks ago
After Review Board Criticism, Microsoft Targets Culture, Governance, Engineering
After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.
After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.
Fake Paystubs Are Draining Billions From Lenders
3 months 3 weeks ago
How AI Could Solve Failings of Traditional Employment and Income Verification
Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.
Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.
US Pushes Ban on Chinese, Russian Tech in Connected Vehicles
3 months 3 weeks ago
Commerce Department Moves to Regulate Foreign Vehicle Tech Amid Security Fears
The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.
The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.
North Korea Targets Software Supply Chain Via PyPI
3 months 3 weeks ago
Backdoored Python Packages Likely Work of 'Gleaming Pisces,' Says Palo Alto
A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.
A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.
Protecting Your Data and Company From Cyberthreats
3 months 3 weeks ago
Why Cybersecurity Is a Public Imperative
Data is one of the most valuable assets in today's digital age. Cyberthreats come in many forms, such as phishing attacks, ransomware, data breaches and malware infections, and failing to protect your data can cause severe financial, reputational and operational damage.
Data is one of the most valuable assets in today's digital age. Cyberthreats come in many forms, such as phishing attacks, ransomware, data breaches and malware infections, and failing to protect your data can cause severe financial, reputational and operational damage.
Who Will Take the Lead in Setting Healthcare AI Regulations?
3 months 3 weeks ago
It's yet to be determined whether a handful of states or the federal government will lead the charge in adopting comprehensive regulations involving the use of artificial intelligence in healthcare, said regulatory attorney Betsy Hodge, a partner in law firm Akerman.
When Every Minute Counts: Recovering Active Directory During an Attack
3 months 3 weeks ago
ISMG Editors: How to Survive a Major Ransomware Attack
3 months 3 weeks ago
CyberEdBoard Members and ISMG Editors on Incident Response, AI and Defense Trends
This week, CyberEdBoard members Jon Staniforth and Helmut Spöcker joined ISMG editors to unpack the hot topics at ISMG's London Cybersecurity Summit 2024, including ransomware lessons learned, AI trends and the growing importance of continuous learning and resilience in the cybersecurity industry.
This week, CyberEdBoard members Jon Staniforth and Helmut Spöcker joined ISMG editors to unpack the hot topics at ISMG's London Cybersecurity Summit 2024, including ransomware lessons learned, AI trends and the growing importance of continuous learning and resilience in the cybersecurity industry.
ENISA Warns About Hacktivist, Ransomware Crossover
3 months 3 weeks ago
Hacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says
Ransomware hacks and self-declared hacktivist denial-of-services attacks were the most prolific threat to European Union members over the 12-month period ending in June, the EU cyber agency warned, adding that the nexus between nation-state hackers and hacktivist groups poses an emerging threat.
Ransomware hacks and self-declared hacktivist denial-of-services attacks were the most prolific threat to European Union members over the 12-month period ending in June, the EU cyber agency warned, adding that the nexus between nation-state hackers and hacktivist groups poses an emerging threat.
Training AI on Social Media: What Could Go Wrong?
3 months 3 weeks ago
Unfiltered Training Data Can Cause Safety Issues, Spread Misinformation
LinkedIn this week joined its peers in using social media posts as training data for AI models, raising concerns of trustworthiness and safety. The question for AI developers is not whether companies use the data or even whether it is fair to do so - it is whether the data is reliable or not.
LinkedIn this week joined its peers in using social media posts as training data for AI models, raising concerns of trustworthiness and safety. The question for AI developers is not whether companies use the data or even whether it is fair to do so - it is whether the data is reliable or not.
Quantum Risks Pose New Threats for US Federal Cybersecurity
3 months 3 weeks ago
Experts Say Feds May Face Cost and Timeline Challenges in Quantum Readiness
The United States is preparing for an age of quantum computing as federal agencies roll out initiatives designed to boost "quantum readiness," and as experts warn the government may face issues that delay its ability to defend against a future of advanced threats enabled by the emerging technology.
The United States is preparing for an age of quantum computing as federal agencies roll out initiatives designed to boost "quantum readiness," and as experts warn the government may face issues that delay its ability to defend against a future of advanced threats enabled by the emerging technology.
What's Next for Secure Communication After Exploding Pagers?
3 months 4 weeks ago
No OpSec Measure Is Bulletproof to the Effects of a Corrupted Supply Chain
Secure communications in an age of network insecurity has focused mostly on encryption and fears of surveillance tracking. But as this week revealed to the dismay of terrorists and criminals alike, no OpSec measure is bulletproof to the effects of a corrupted supply chain.
Secure communications in an age of network insecurity has focused mostly on encryption and fears of surveillance tracking. But as this week revealed to the dismay of terrorists and criminals alike, no OpSec measure is bulletproof to the effects of a corrupted supply chain.
Microsoft: Russian Cyber Proxies Targeting Harris Campaign
3 months 4 weeks ago
Microsoft Says Russia-Linked Cyber Actors Are Supporting Trump by Attacking Harris
Microsoft warned the Kremlin is targeting the 2024 presidential election campaign of Vice President Kamala Harris with its wide-ranging election interference operations. Russian groups likely aligned with the Kremlin have shifted their focus to the Harris campaign in recent months.
Microsoft warned the Kremlin is targeting the 2024 presidential election campaign of Vice President Kamala Harris with its wide-ranging election interference operations. Russian groups likely aligned with the Kremlin have shifted their focus to the Harris campaign in recent months.
Picus Security Receives $45M to Enhance Exposure Management
3 months 4 weeks ago
Riverwood Capital Leads Investment in Security Validation Firm to Grow in Americas
Picus Security has received $45 million in funding led by Riverwood Capital. The investment will accelerate product development in exposure management, including attack surface management and automated pen testing. The company plans to expand further in the Americas, targeting key growth areas.
Picus Security has received $45 million in funding led by Riverwood Capital. The investment will accelerate product development in exposure management, including attack surface management and automated pen testing. The company plans to expand further in the Americas, targeting key growth areas.
Raptor Train Botnet Infects 260,000 Devices Globally
3 months 4 weeks ago
Chinese Botnet Targets US Critical Infrastructure and Taiwan
A Chinese state-sponsored botnet called Raptor Train has infected more than 260,000 IoT and office network devices to target critical infrastructure globally. The hackers used zero-days and known vulnerabilities to compromise more than 20 different types of devices to expand their botnet.
A Chinese state-sponsored botnet called Raptor Train has infected more than 260,000 IoT and office network devices to target critical infrastructure globally. The hackers used zero-days and known vulnerabilities to compromise more than 20 different types of devices to expand their botnet.
Tor Says Platform Is Safe After German Police Interception
3 months 4 weeks ago
German Law Enforcement Reportedly Deanonymized Tor User in 2021
The Tor Project on Wednesday reassured users that they will remain anonymous after media reported that German police successfully used Tor to trace the alleged administrator of a child pornography site. Tor users can continue to use the browser "securely" and the "Tor Network is healthy," it said.
The Tor Project on Wednesday reassured users that they will remain anonymous after media reported that German police successfully used Tor to trace the alleged administrator of a child pornography site. Tor users can continue to use the browser "securely" and the "Tor Network is healthy," it said.
Cyber Insurers Are Intensely Scrutinizing Healthcare Clients
3 months 4 weeks ago
As threat actors continue to evolve their attacks to circumvent security measures, cyber insurers are raising the bar for prospective healthcare security clients. Underwriters are increasing their scrutiny and adding new coverage requirements, said Chris Henderson of cybersecurity company Huntress.
OnDemand: Assuming control | Can AI reach Autonomous Levels?
3 months 4 weeks ago
Should CIOs and CISOs Wear One Hat?
3 months 4 weeks ago
Essen Health Care's Hiren Dave Makes the Case for Integration of CIO-CISO Roles
As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security integral to these processes. Hiren Dave, CIO and CISO at Essen Health Care, shares how combining the roles of CIO and CISO improves risk management and communication.
As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security integral to these processes. Hiren Dave, CIO and CISO at Essen Health Care, shares how combining the roles of CIO and CISO improves risk management and communication.
Checked
2 hours 43 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed