Ransomware DataBreachToday.com
Trump's AI Plan Sparks Industry Praise and Warnings of Risk
2 months ago
Experts Warn White House AI Action Plan Could Prioritize Deregulation Over Security
The Trump administration pledged Wednesday an offensive against "red tape" hindering artificial intelligence developers in federal and state governments while vowing to ensure that such systems are objective "rather than pursue social engineering agendas."
The Trump administration pledged Wednesday an offensive against "red tape" hindering artificial intelligence developers in federal and state governments while vowing to ensure that such systems are objective "rather than pursue social engineering agendas."
Feds Warn Health, Other Sectors of Interlock Threats
2 months ago
Healthcare Providers Are Among Dozens of Entities Hit Since Gang Emerged in 2024
U.S. authorities are warning of threats posed by double-extortion gang Interlock, which has been hitting an assortment of businesses across many industries, including healthcare and other critical infrastructure sectors, with a ransomware variant first seen in September 2024.
U.S. authorities are warning of threats posed by double-extortion gang Interlock, which has been hitting an assortment of businesses across many industries, including healthcare and other critical infrastructure sectors, with a ransomware variant first seen in September 2024.
Vanta Secures $150M at $4.15B Valuation to Advance AI Trust
2 months ago
Series D Raise Targets Security Automation, Trust Centers and Zero-Touch Reviews
With $150 million in new Series D funding at a $4.15 billion valuation, Vanta plans to accelerate its AI-powered trust platform across new markets including government compliance. The company’s tools automate evidence collection, risk management and policy enforcement in real time.
With $150 million in new Series D funding at a $4.15 billion valuation, Vanta plans to accelerate its AI-powered trust platform across new markets including government compliance. The company’s tools automate evidence collection, risk management and policy enforcement in real time.
Can ChatGPT Agent Actually Deliver on Its Promises?
2 months ago
OpenAI's New Agent Automates Tasks, Amid Limits and Privacy Concerns
OpenAI's new ChatGPT Agent can code, browse and send email. The agent excels at tightly scoped, well-structured workflows, such as finding names, drafting content or automating click-heavy tasks, but struggles with ambiguity, creativity or judgment-heavy assignments.
OpenAI's new ChatGPT Agent can code, browse and send email. The agent excels at tightly scoped, well-structured workflows, such as finding names, drafting content or automating click-heavy tasks, but struggles with ambiguity, creativity or judgment-heavy assignments.
ENISA Turns to Experts to Steer EU Cyber Regulations
2 months ago
Newly Appointed Advisory Group to Support NIS2 and CRA Implementation Across Europe
Beginning Aug. 1, European Union Agency for Cybersecurity, ENISA, will launch a new Advisory Group composed of 26 independent experts to help guide the EU’s cybersecurity strategy through 2027. Their work will support the rollout of the NIS2 Directive and the Cyber Resilience Act.
Beginning Aug. 1, European Union Agency for Cybersecurity, ENISA, will launch a new Advisory Group composed of 26 independent experts to help guide the EU’s cybersecurity strategy through 2027. Their work will support the rollout of the NIS2 Directive and the Cyber Resilience Act.
UK Signals It Will Back Peddle on Apple Encryption Demand
2 months ago
Apple, US Took Hard Line Against British Demand
The U.K. government is reportedly set to reverse course on requiring smartphone giant Apple to give police access to device data stored as backups in the California company's cloud service. "The Home Office is basically going to have to back down," a British official said.
The U.K. government is reportedly set to reverse course on requiring smartphone giant Apple to give police access to device data stored as backups in the California company's cloud service. "The Home Office is basically going to have to back down," a British official said.
New Entrust CEO Tony Ball Aims for Identity Life Cycle Shift
2 months ago
Ball to Succeed Todd Wilkinson, Expand Digital Identity Strategy, Tech Integration
Tony Ball, the incoming CEO of Entrust, plans to shift the company's digital identity strategy beyond onboarding to support full life cycle use cases. He also plans to expand Entrust's post-quantum efforts and streamline customer delivery under one platform.
Tony Ball, the incoming CEO of Entrust, plans to shift the company's digital identity strategy beyond onboarding to support full life cycle use cases. He also plans to expand Entrust's post-quantum efforts and streamline customer delivery under one platform.
Honeywell Smart Building Middleware Vulnerable
2 months ago
Researchers Find Flaws in Tridium Niagara Framework
Vulnerabilities in Honeywell smart building middleware could allow hackers to manipulate physical systems or disable security alarms, warn security researchers. Hackers would already need access to the network. An attack would also depend on the Tridium Niagara customer not encrypting Syslog data.
Vulnerabilities in Honeywell smart building middleware could allow hackers to manipulate physical systems or disable security alarms, warn security researchers. Hackers would already need access to the network. An attack would also depend on the Tridium Niagara customer not encrypting Syslog data.
Identity Threats Target Small Businesses in MFA Workarounds
2 months ago
Huntress's Kyle Hanslovan Warns of MFA Bypass, Rogue Apps, Fake Device Enrollments
Cybercriminals are bypassing MFA using session tokens and rogue app access, with shadow workflows enabling persistent inbox theft against SMBs. Huntress offers behavioral training and managed identity response to SMBs for real protection not just more alerts, says CEO Kyle Hanslovan.
Cybercriminals are bypassing MFA using session tokens and rogue app access, with shadow workflows enabling persistent inbox theft against SMBs. Huntress offers behavioral training and managed identity response to SMBs for real protection not just more alerts, says CEO Kyle Hanslovan.
Chinese Hackers' Evolution From Vandals to Strategists
2 months ago
Early Hacktivists Laid the Blueprint for Chinese Hacking
There's a reason why many of the same tools appear time and time again in Chinese nation-state hacking: A first-generation of hackers who grew up together online and continue to swap techniques to this day. A report shows the influence of the so-called "Red 40".
There's a reason why many of the same tools appear time and time again in Chinese nation-state hacking: A first-generation of hackers who grew up together online and continue to swap techniques to this day. A report shows the influence of the so-called "Red 40".
Another Medical Practice Closes Its Doors After Cyberattack
2 months ago
Alpha Wellness Says 'Devastating' Incident Forced Closure of Georgia-Based Center
Another small medical care provider has shut its doors forever as the result of a recent "devastating" cyberattack. Georgia-based Alpha Wellness & Alpha Medical Centre has permanently pulled the plug on its operations following a data theft attack by cybercriminal gang RansomHub.
Another small medical care provider has shut its doors forever as the result of a recent "devastating" cyberattack. Georgia-based Alpha Wellness & Alpha Medical Centre has permanently pulled the plug on its operations following a data theft attack by cybercriminal gang RansomHub.
US Infrastructure Remains Vulnerable 15 Years After Stuxnet
2 months ago
Experts Say Critical Infrastructure Sectors Have Made Little Cybersecurity Progress
Panelists told the House subcommittee on cybersecurity and infrastructure protection that U.S. critical infrastructure sectors have made few cyber improvements over the last 15 years despite fears of retaliation following digital and physical attacks on Iranian nuclear sites.
Panelists told the House subcommittee on cybersecurity and infrastructure protection that U.S. critical infrastructure sectors have made few cyber improvements over the last 15 years despite fears of retaliation following digital and physical attacks on Iranian nuclear sites.
OnDemand | Closing the Recovery Gap: A Business-First Approach to Cyber Resilience
2 months ago
Microsoft Traces On-Premises SharePoint Exploits to China
2 months ago
But Hacking Groups of All Stripes Now Have Access to Exploit Code, Researchers Warn
Microsoft said an attack campaign targeting zero-day vulnerabilities in on-premises SharePoint servers appears to have begun by July 7, tied to three Chinese hack groups. With proof-of-concept exploit code now in the wild, security experts said hackers of all stripes have joined the fray.
Microsoft said an attack campaign targeting zero-day vulnerabilities in on-premises SharePoint servers appears to have begun by July 7, tied to three Chinese hack groups. With proof-of-concept exploit code now in the wild, security experts said hackers of all stripes have joined the fray.
UK Government Set to Impose Ransomware Payment Ban
2 months ago
Labour Government Also Backs Ransomware Payment Clearance and Reporting
The British government vowed Tuesday to proceed with a proposed ransomware payment ban for critical infrastructure organizations such as the National Health Service and to press forward on a mandate for other businesses to notify authorities in advance of paying out a ransom.
The British government vowed Tuesday to proceed with a proposed ransomware payment ban for critical infrastructure organizations such as the National Health Service and to press forward on a mandate for other businesses to notify authorities in advance of paying out a ransom.
Cyberattacks Surging Across Indo-Pacific, Researchers Warn
2 months ago
Report Urges Indo-Pacific Cyber Shield Strategy Amid Increased Nation-State Threats
A Center for a New American Security study found China and North Korea are accelerating cyberattacks, influence operations and infrastructure breaches across the Indo-Pacific, as researchers urge the U.S. to help develop a regional cyber shield, and deploy forward cyber teams.
A Center for a New American Security study found China and North Korea are accelerating cyberattacks, influence operations and infrastructure breaches across the Indo-Pacific, as researchers urge the U.S. to help develop a regional cyber shield, and deploy forward cyber teams.
File Transfer Flaw Blamed in Health Breach Affecting 233,000
2 months ago
Cierant Corp. Says Cleo MFT Zero-Day Exploit Compromised Health Plan Client Data
A Connecticut-based firm that provides print and electronic document management services to health plans has reported to regulators that an exploit of a vulnerability in file transfer software from third-party vendor Cleo has resulted in a health data compromise affecting nearly 233,000 people.
A Connecticut-based firm that provides print and electronic document management services to health plans has reported to regulators that an exploit of a vulnerability in file transfer software from third-party vendor Cleo has resulted in a health data compromise affecting nearly 233,000 people.
Darktrace Buys Network Traffic Visibility Firm Mira Security
2 months ago
Startup Mira Security Will Offer Insights on Encrypted Network Traffic, Decryption
Darktrace purchased a network traffic visibility startup to get insights from encrypted network traffic and decryption for customers in regulated industries. Mira Security will provide organizations with deeper, more comprehensive visibility across on-premises, cloud and hybrid environments.
Darktrace purchased a network traffic visibility startup to get insights from encrypted network traffic and decryption for customers in regulated industries. Mira Security will provide organizations with deeper, more comprehensive visibility across on-premises, cloud and hybrid environments.
The MFA Illusion: Rethinking Identity for Non-Human Agents
2 months ago
As Agentic AI Takes Over Workflows, Traditional Authentication Practices Fall Short
The explosion of agentic AI and autonomous bots to orchestrate cross-system tasks is turning MFA into a brittle defense. Non-human identities often bypass human-centric security controls, operating with static credentials and undefined ownership, creating exploitable identity risks.
The explosion of agentic AI and autonomous bots to orchestrate cross-system tasks is turning MFA into a brittle defense. Non-human identities often bypass human-centric security controls, operating with static credentials and undefined ownership, creating exploitable identity risks.
Checked
6 hours 55 minutes ago
Ransomware DataBreachToday.com RSS News Feeds on ransomware data breach today news, regulations, blogs and education
Ransomware DataBreachToday.com feed