DataBreachToday.com
Rapid, Reliable Recovery: Build the Skills to Safeguard Your Data
2 weeks 3 days ago
Lyin' and Cheatin', AI Models Playing a Game
2 weeks 3 days ago
OpenAI, Apollo Research Find Models Hide Misalignment; Training Cuts Deception
Frontier artificial intelligence models are learning to hide their true intentions to pursue hidden agendas, said OpenAI and Apollo Research. Researchers say the risk of deception needs to be tackled now, especially as AI systems take on more complex, real-world responsibilities.
Frontier artificial intelligence models are learning to hide their true intentions to pursue hidden agendas, said OpenAI and Apollo Research. Researchers say the risk of deception needs to be tackled now, especially as AI systems take on more complex, real-world responsibilities.
Senate Bill Seeks Privacy Protection for Brain Wave Data
2 weeks 3 days ago
MIND Act Asks FTC to Study Exploitation Risks for Neural Data Collected by Devices
Are brain waves and similar neural data the next frontier in consumer privacy worries? A trio of U.S. senators have introduced federal legislation aiming to get ahead of risks that such brain-related data could be collected and misused by tech firms, data brokers, government agencies and others.
Are brain waves and similar neural data the next frontier in consumer privacy worries? A trio of U.S. senators have introduced federal legislation aiming to get ahead of risks that such brain-related data could be collected and misused by tech firms, data brokers, government agencies and others.
Shutdown Threat Puts Federal Cyber on Edge
2 weeks 3 days ago
Cybersecurity Programs, Workforce Face Disruption If Congress Fails to Act
A potential government shutdown threatens to gut federal cybersecurity operations, with key programs set to expire, agency cyber staff facing layoffs and no public contingency plans in place - leaving core defenses, threat sharing and incident response at risk.
A potential government shutdown threatens to gut federal cybersecurity operations, with key programs set to expire, agency cyber staff facing layoffs and no public contingency plans in place - leaving core defenses, threat sharing and incident response at risk.
North Korea Fake Job Recruiters Up Their Backdoor Game
2 weeks 3 days ago
Eset: Lazarus Group Shares Backdoor With Newer Pyongyang Threat Actor
A gang of North Korean hackers behind fake IT job recruitment scams now have access to a remote access Trojan favored by their more technically advanced counterparts tracked collectively as the Lazarus Group, say security researchers.
A gang of North Korean hackers behind fake IT job recruitment scams now have access to a remote access Trojan favored by their more technically advanced counterparts tracked collectively as the Lazarus Group, say security researchers.
150,000 Records of Home Health Care Firm Exposed on Web
2 weeks 4 days ago
Researcher Finds Database of Sensitive Patient Info With No Password Protection
An unencrypted database containing nearly 150,000 patient records of a California provider of home health and palliative care services was left exposed on the internet, said a cybersecurity researcher who discovered the unsecured data cache. Why does this keep happening in the healthcare sector?
An unencrypted database containing nearly 150,000 patient records of a California provider of home health and palliative care services was left exposed on the internet, said a cybersecurity researcher who discovered the unsecured data cache. Why does this keep happening in the healthcare sector?
How the EU Data Act Shifts Control Back to Users
2 weeks 4 days ago
Newly Implemented Rule to Boost Cloud Competition and AI Development
The EU Data Act is now in its second phase of implementation, shifting the balance of power by granting users rights over the data generated by their connected devices and services. Beyond banning unfair contract terms and eliminating vendor lock-in, the act mandates data portability and access.
The EU Data Act is now in its second phase of implementation, shifting the balance of power by granting users rights over the data generated by their connected devices and services. Beyond banning unfair contract terms and eliminating vendor lock-in, the act mandates data portability and access.
Feds Isolate Cisco Firewalls to Defend Against 'Arcane Door'
2 weeks 4 days ago
CISA Issues Emergency Directive After Cisco Exploits Persist After Reboot
CISA issued an emergency directive Thursday after discovering an advanced hacking campaign exploiting two persistent zero-days in Cisco firewall gear - malware that survives system reboots and upgrades - forcing agencies to disconnect vulnerable devices by Friday.
CISA issued an emergency directive Thursday after discovering an advanced hacking campaign exploiting two persistent zero-days in Cisco firewall gear - malware that survives system reboots and upgrades - forcing agencies to disconnect vulnerable devices by Friday.
New Chinese Espionage Hacking Group Uncovered
2 weeks 4 days ago
'RedNovember' Has Hacked Organizations in the US, Asia and Europe
A hacking group associated with widespread compromise of edge devices is a Chinese-state-aligned group, says cybersecurity firm Recorded Future. The firm says the threat actor, which it now tracks as RedNovember, is "highly likely a Chinese state-sponsored threat activity group."
A hacking group associated with widespread compromise of edge devices is a Chinese-state-aligned group, says cybersecurity firm Recorded Future. The firm says the threat actor, which it now tracks as RedNovember, is "highly likely a Chinese state-sponsored threat activity group."
AI Risks in CIAM: Ensuring Compliance, Security, and Trust
2 weeks 4 days ago
Offensive Security in Manufacturing: Are you Red Team Ready?
2 weeks 4 days ago
ManuSec Chicago Speaker Johnny Xmas on Value of Pentesting in OT Environments
ManuSec Summit speaker Johnny Xmas, global head of offensive security for a leading U.S. manufacturer, discusses pentesting in operational technology environments, overcoming the hurdles to offensive security programs and the evolving role of OT security.
ManuSec Summit speaker Johnny Xmas, global head of offensive security for a leading U.S. manufacturer, discusses pentesting in operational technology environments, overcoming the hurdles to offensive security programs and the evolving role of OT security.
Chinese Hackers Deploy New PlugX Variant
2 weeks 4 days ago
Sophisticated Cyberespionage Campaign Targets Asian Telecom, Manufacturing Sectors
A remote access Trojan that's a staple of Chinese nation-state hacking is part of an ongoing campaign targeting telecom and manufacturing sectors in Central and South Asian countries. The threat actor, tracked as Naikon, apparently has access to a new variant of PlugX malware.
A remote access Trojan that's a staple of Chinese nation-state hacking is part of an ongoing campaign targeting telecom and manufacturing sectors in Central and South Asian countries. The threat actor, tracked as Naikon, apparently has access to a new variant of PlugX malware.
Fraud to Compliance: How Banks Use AI for Resilient Security
2 weeks 5 days ago
Financial Institutions Break Down Silos to Combat Faster, AI-Powered Threats
Banks face AI-powered fraud attacks and stricter compliance demands. Unified platforms that integrate security, fraud detection and compliance help institutions respond faster while empowering human analysts to focus on strategic decisions.
Banks face AI-powered fraud attacks and stricter compliance demands. Unified platforms that integrate security, fraud detection and compliance help institutions respond faster while empowering human analysts to focus on strategic decisions.
Career Spotlight: White Hat Hackers in an Automated World
2 weeks 5 days ago
Pentesting Tools Uncover Vulnerabilities but White Hat Skills Are Still in Demand
Automated pentesting tools offer faster visibility and robust integration with daily security operations, but automation doesn't eliminate the need for humans in the loop. Automation raises the baseline for vulnerability management and changes what white hat hackers need to know to stay relevant.
Automated pentesting tools offer faster visibility and robust integration with daily security operations, but automation doesn't eliminate the need for humans in the loop. Automation raises the baseline for vulnerability management and changes what white hat hackers need to know to stay relevant.
Webinar | Camp Rubrik: M365 Protection Build Your Data Protection Skills for M365
2 weeks 5 days ago
Webinar | Next-Gen SaaS Data Protection: Product Roadmap & Feature Innovations
2 weeks 5 days ago
Hackers Obfuscated Malware With Verbose AI Code
2 weeks 5 days ago
Attackers Hid Malware in Vector Image
Hackers behind a phishing campaign appear to have used artificial intelligence-generated code to hide malware behind a wall of overly complex and useless code, said Microsoft. "Not something a human would typically write from scratch due to its complexity, verbosity and lack of practical utility."
Hackers behind a phishing campaign appear to have used artificial intelligence-generated code to hide malware behind a wall of overly complex and useless code, said Microsoft. "Not something a human would typically write from scratch due to its complexity, verbosity and lack of practical utility."
Vendors Veradigm and ApolloMD Report Health Data Hacks
2 weeks 5 days ago
Recent Incidents Highlight Patient Record Cyber Risks Tied to Third-Party Suppliers
Vendor security risk has long been a source of pain for many healthcare providers. Veradigm - formerly Allscripts - and ApolloMD are among the latest software and services vendors reporting hacking incidents potentially triggering headaches for customers and their patients.
Vendor security risk has long been a source of pain for many healthcare providers. Veradigm - formerly Allscripts - and ApolloMD are among the latest software and services vendors reporting hacking incidents potentially triggering headaches for customers and their patients.
Unico Purchases OwnID to Expand in Passkey Authentication
2 weeks 5 days ago
Passkeys to Strengthen Low-Friction Verification, Integrate With Facial Recognition
Unico has acquired San Francisco-based OwnID to enhance its identity offerings and grow its U.S. customer base. The passkey startup's low-friction login solution complements Unico's facial recognition tools and supports broader use cases with streamlined user experiences.
Unico has acquired San Francisco-based OwnID to enhance its identity offerings and grow its U.S. customer base. The passkey startup's low-friction login solution complements Unico's facial recognition tools and supports broader use cases with streamlined user experiences.
Checked
54 minutes 55 seconds ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed