DataBreachToday.com
Entrust Will Stop Operating As Trusted Certificate Authority
3 weeks 4 days ago
Google Designates Entrust 'Untrustworthy' After Years of 'Concerning Behaviors'
What's the worst-case scenario for a certificate authority? Citing years of "concerning behaviors," Google and Mozilla are set to treat all new digital certificates issued with Entrust as "untrustworthy," and have urged users to obtain new certificates from a trusted CA.
What's the worst-case scenario for a certificate authority? Citing years of "concerning behaviors," Google and Mozilla are set to treat all new digital certificates issued with Entrust as "untrustworthy," and have urged users to obtain new certificates from a trusted CA.
CISA Warns of Active Attacks on Critical Palo Alto Exploit
3 weeks 4 days ago
CISA Adds Critical Palo Alto Flaw to Vulnerability Catalog After Attack Discovery
The Cybersecurity and Infrastructure Security agency warned Palo Alto Networks that a critical vulnerability the technology giant previously patched has been actively exploited since then, according to a new advisory, potentially exposing configuration secrets and credentials.
The Cybersecurity and Infrastructure Security agency warned Palo Alto Networks that a critical vulnerability the technology giant previously patched has been actively exploited since then, according to a new advisory, potentially exposing configuration secrets and credentials.
ConnectWise's Rivelo Aims to Secure SMBs With MSP Platform
3 weeks 4 days ago
New CEO Manny Rivelo Focuses on Security, Acquisitions to Empower MSPs, SMBs
New ConnectWise CEO Manny Rivelo is prioritizing security and new acquisitions, aiming to provide MSPs with a streamlined, multi-tenant platform. His vision offers an integrated approach to securing SMBs amid a dynamic threat landscape with capabilities like backup, MDR and managed SIEM.
New ConnectWise CEO Manny Rivelo is prioritizing security and new acquisitions, aiming to provide MSPs with a streamlined, multi-tenant platform. His vision offers an integrated approach to securing SMBs amid a dynamic threat landscape with capabilities like backup, MDR and managed SIEM.
Feds Warn Health Sector of an Array of Cyberthreats
3 weeks 4 days ago
HHS Alerts on Scattered Spider, Living of the Land, Miracle Exploit, F5 Attacks
Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
Hacker Claims to Leak Nokia Source Code
3 weeks 5 days ago
Noka 'Is Aware of Reports'
Finnish telecommunications equipment manufacturer Nokia is investigating the alleged posting of source code data on a criminal hacking forum. A hacker going by the handle of "IntelBroker" on Thursday posted what he said is a trove of "Nokia-related source code."
Finnish telecommunications equipment manufacturer Nokia is investigating the alleged posting of source code data on a criminal hacking forum. A hacker going by the handle of "IntelBroker" on Thursday posted what he said is a trove of "Nokia-related source code."
Combating Cybercrime: What to Expect From Trump Presidency?
3 weeks 5 days ago
Close International Law Enforcement Collaboration Will Continue, Experts Forecast
One post-election question pertaining to Donald Trump's upcoming presidency is how his administration will choose to combat cybercrime, and to what extent the White House will continue to take a leadership role in combating ransomware and cybercrime - especially based in Russia.
One post-election question pertaining to Donald Trump's upcoming presidency is how his administration will choose to combat cybercrime, and to what extent the White House will continue to take a leadership role in combating ransomware and cybercrime - especially based in Russia.
Overcoming the Top Five Challenges in Operationalizing Threat Intelligence
3 weeks 5 days ago
Webinar | Prisma Access Browser: Boosting Security for Browser-Based Work
3 weeks 5 days ago
OnDemand | When AI Becomes Doctor, Nurse, and Security Guard
3 weeks 5 days ago
Introduction to Sustainability Data Management | Live Webinar
3 weeks 5 days ago
Assessing Banking Product Risks to Improve KYC Programs
3 weeks 5 days ago
Trapets CEO Gabriella Bussien on Why Banks Need to Fine-Tune, Automate KYC Processes
KYC protocols traditionally focus on account-level verification, but examining KYC at the product level can help banks assess risk more accurately. Asking targeted questions based on product risk enables institutions to detect potential financial crimes, said Gabriella Bussien, CEO of Trapets.
KYC protocols traditionally focus on account-level verification, but examining KYC at the product level can help banks assess risk more accurately. Asking targeted questions based on product risk enables institutions to detect potential financial crimes, said Gabriella Bussien, CEO of Trapets.
Cryptohack Roundup: M2, Metawin Exploits
3 weeks 5 days ago
Also: LottieFiles Attack, Craig Wright's Contempt of Court
This week, Metawin hacks, LottieFiles attack, hackers used Ethereum smart contracts to target npm developers, Craig Wright faced contempt of court, Alameda sued KuCoin, Binance sought dismissal of a U.S. Securities and Exchange lawsuit, and Immutable received a Wells Notice.
This week, Metawin hacks, LottieFiles attack, hackers used Ethereum smart contracts to target npm developers, Craig Wright faced contempt of court, Alameda sued KuCoin, Binance sought dismissal of a U.S. Securities and Exchange lawsuit, and Immutable received a Wells Notice.
Breach Roundup: Chinese Cyberespionage Using Open Source VPN
3 weeks 5 days ago
Also: Ransomware Hackers Demand Baguettes
This week, Chinese spying, Italian hacking scandal, an FBI warning and Okta fixed a bug. Google mandated MFA, zero days in PTZOptics and a Mexican airport didn't pay ransom. Cybercriminals demanded baguettes, breach lettersin Ohio and Germany will shield white hats. The Italian DPA rebuked a bank.
This week, Chinese spying, Italian hacking scandal, an FBI warning and Okta fixed a bug. Google mandated MFA, zero days in PTZOptics and a Mexican airport didn't pay ransom. Cybercriminals demanded baguettes, breach lettersin Ohio and Germany will shield white hats. The Italian DPA rebuked a bank.
Law Firm Hack Compromises Health System's Patient Data
3 weeks 5 days ago
Did Data Theft at Firm Also Affect Other Clients' Information?
A hacking incident at Thompson Coburn, a national law firm based in Missouri, has affected an unspecified number of patients of a healthcare sector client, Presbyterian Healthcare Services in New Mexico. But a big unanswered question is whether other clients were affected.
A hacking incident at Thompson Coburn, a national law firm based in Missouri, has affected an unspecified number of patients of a healthcare sector client, Presbyterian Healthcare Services in New Mexico. But a big unanswered question is whether other clients were affected.
Trump's Return: Impact on Health Sector Cyber, HIPAA Regs
3 weeks 6 days ago
Experts on Potential Data Security and HIPAA Privacy Changes in Trump's Second Term
With Donald Trump set to return to the White House to serve another four-year term as U.S. president, what might the healthcare sector expect to see when it comes to his next administration's cybersecurity priorities and HIPAA regulations and enforcement? Experts weigh in.
With Donald Trump set to return to the White House to serve another four-year term as U.S. president, what might the healthcare sector expect to see when it comes to his next administration's cybersecurity priorities and HIPAA regulations and enforcement? Experts weigh in.
Meta Loosens AI Rules for US Military Use
3 weeks 6 days ago
Policy Shift Allows Military Contractors, Security Agencies Access to Its AI Model
Meta revised its policy to permit U.S. defense contractors and national security agencies to use its AI model, Llama, previously restricted from military applications, announcing that it has partnered with firms including Lockheed Martin and Palantir.
Meta revised its policy to permit U.S. defense contractors and national security agencies to use its AI model, Llama, previously restricted from military applications, announcing that it has partnered with firms including Lockheed Martin and Palantir.
CyberEdBoard Profiles in Leadership: Martyn Booth
3 weeks 6 days ago
Dunnhumby CISO on Building Resilience and Tackling Transformation
Martyn Booth has found that leadership means resilience, adaptability and fostering a collaborative, diverse team. Leading transformation efforts at global customer data science firm Dunnhumby, Booth stressed the value of having a strong foundation and strategic partnerships.
Martyn Booth has found that leadership means resilience, adaptability and fostering a collaborative, diverse team. Leading transformation efforts at global customer data science firm Dunnhumby, Booth stressed the value of having a strong foundation and strategic partnerships.
CrowdStrike Bolsters SaaS Security With Adaptive Shield Buy
3 weeks 6 days ago
Purchasing Israeli Startup Will Expand SaaS Security and Identity Threat Protection
CrowdStrike has agreed to acquire SaaS security leader Adaptive Shield to deliver identity-based protection across cloud and hybrid environments. The acquisition offers clients comprehensive SaaS security posture management, bridging on-premises and cloud identity defenses to thwart modern threats.
CrowdStrike has agreed to acquire SaaS security leader Adaptive Shield to deliver identity-based protection across cloud and hybrid environments. The acquisition offers clients comprehensive SaaS security posture management, bridging on-premises and cloud identity defenses to thwart modern threats.
Keep Learning or Keep Losing: There's No Finish Line
4 weeks ago
Security Professionals Must Continually Hone Technical and Communication Skills
In cybersecurity, there's no such thing as "done learning." The field's dynamic nature - driven by rapid technological advances and evolving threats - demands that professionals stay adaptable and proactive. It's essential for staying relevant, effective and prepared for what's next.
In cybersecurity, there's no such thing as "done learning." The field's dynamic nature - driven by rapid technological advances and evolving threats - demands that professionals stay adaptable and proactive. It's essential for staying relevant, effective and prepared for what's next.
Checked
3 hours 29 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed