Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Ensuring Data-Centric Security on IBM z Series: comforte’s Customer Success Stories and Best Practices

14 June 2024 at 12:04

In today's rapidly evolving digital landscape, the importance of data security cannot be overstated. Organisations across the globe are increasingly seeking robust solutions to protect their sensitive information from cyber threats. Among the leaders in providing such solutions is comforte AG, a company renowned for its expertise in data-centric security. This post delves into some of comforte's notable customer success stories regarding data-centric security on the IBM z Series, highlighting the best practices that have emerged from these experiences.

The post Ensuring Data-Centric Security on IBM z Series: comforte’s Customer Success Stories and Best Practices appeared first on Security Boulevard.

A New Tactic in the Rapid Evolution of QR Code Scams

14 June 2024 at 13:36
QR code phishing

QR codes have been around for three decades, but it wasn’t until the COVID-19 pandemic hit in 2020 that they got wide use, with restaurants, health care facilities, and other businesses turning to them to customers contactless ways to read menus, buy items, or track the health of people in their buildings. Around the same..

The post A New Tactic in the Rapid Evolution of QR Code Scams appeared first on Security Boulevard.

Unlock Advanced Threat Correlation

By: Enzoic
13 June 2024 at 16:38

Try the Enzoic + ThreatQ Integration Free on the ThreatQ Marketplace Exciting news for cybersecurity teams: Enzoic and ThreatQuotient have partnered to offer a powerful integration that combines Dark Web monitoring with advanced threat intelligence. And now, you can now try this integration for free on the ThreatQ marketplace, giving your organization a unique opportunity […]

The post Unlock Advanced Threat Correlation appeared first on Security Boulevard.

Netcraft Uses Its AI Platform to Trick and Track Online Scammers

13 June 2024 at 14:00
romance scams generative AI pig butchering

At the RSA Conference last month, Netcraft introduced a generative AI-powered platform designed to interact with cybercriminals to gain insights into the operations of the conversational scams they’re running and disrupt their attacks. At the time, Ryan Woodley, CEO of the London-based company that offers a range of services from phishing detection to brand, domain,..

The post Netcraft Uses Its AI Platform to Trick and Track Online Scammers appeared first on Security Boulevard.

Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk

13 June 2024 at 13:28
Life360 CEO Chris Hulls

Location tracking service leaks PII, because—incompetence? Seems almost TOO easy.

The post Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk appeared first on Security Boulevard.

Connecticut Has Highest Rate of Health Care Data Breaches: Study

13 June 2024 at 09:19
health care data breaches cybersecurity

It’s no secret that hospitals and other health care organizations are among the top targets for cybercriminals. The ransomware attacks this year on UnitedHealth Group’s Change Healthcare subsidiary, nonprofit organization Ascension, and most recently the National Health Service in England illustrate not only the damage to these organizations’ infrastructure and the personal health data that’s..

The post Connecticut Has Highest Rate of Health Care Data Breaches: Study appeared first on Security Boulevard.

Ransomware Group Jumps on PHP Vulnerability

12 June 2024 at 11:43
PHP ransomware vulnerability

A long-running ransomware campaign that has been targeting Windows and Linux systems since 2019 is the latest example of how closely threat groups track public disclosures of vulnerabilities and proofs-of-concept (PoCs) and how quickly they move in to exploit them. The PHP Group last week disclosed a high-severity flaw – tracked as CVE-2024-4577 and with..

The post Ransomware Group Jumps on PHP Vulnerability appeared first on Security Boulevard.

Network Equipment, IoT Devices are Big Security Risks: Forescout

11 June 2024 at 14:09
Forescout networking equipment IoT security risks

IT systems – and this year networking equipment in particular – continue to pose the most security risk for organizations, but it is the vulnerable Internet of Things (IoT) devices that are quickly moving up the ladder, according to researchers with Forescout’s Verdere Labs researchers. In this year’s Riskiest Connected Devices report released this week,..

The post Network Equipment, IoT Devices are Big Security Risks: Forescout appeared first on Security Boulevard.

Microsoft, Google Come to the Aid of Rural Hospitals

11 June 2024 at 11:56
CSPM, ASPM, CISA cybersecurity healthcare

Microsoft and Google will provide free or low-cost cybersecurity tools and services to rural hospitals in the United States at a time when health care facilities are coming under increasing attack by ransomware gangs and other threat groups. For independent rural and critical access hospitals, Microsoft will provide grants and as much as 75% discounts..

The post Microsoft, Google Come to the Aid of Rural Hospitals appeared first on Security Boulevard.

Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked

11 June 2024 at 11:15
Snowflake CISO Brad Jones

Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts.

The post Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked appeared first on Security Boulevard.

Fortinet to Expand AI, Cloud Security with Lacework Acquisition

10 June 2024 at 11:16
Fortinet Lacework AI cloud security

Fortinet, known for network security capabilities within its Fortinet Security Fabric cybersecurity platform, is bolstering its AI and cloud security capabilities with the planned acquisition of Lacework and its AI-based offerings. The companies announced the proposed deal on Monday, with expectations that it will close in the second half of the year. The plan is..

The post Fortinet to Expand AI, Cloud Security with Lacework Acquisition appeared first on Security Boulevard.

Ticketmaster Data Breach and Rising Work from Home Scams

By: Tom Eston
10 June 2024 at 00:00

In episode 333 of the Shared Security Podcast, Tom and Scott discuss a recent massive data breach at Ticketmaster involving the data of 560 million customers, the blame game between Ticketmaster and third-party provider Snowflake, and the implications for both companies. Additionally, they discuss Live Nation’s ongoing monopoly investigation. In the ‘Aware Much’ segment, the […]

The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Shared Security Podcast.

The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Security Boulevard.

💾

Senator: HHS Needs to Require Security Measures for Health Sector

7 June 2024 at 16:18
health care cybersecurity ransomware

U.S. Senator Ron Wyden, who late last month asked federal agencies to investigate flaws in UnitedHealth Group’s cybersecurity measures that led to the massive ransomware attack that disrupted hundreds of hospital and pharmacy operations, now is pushing the Health and Human Services (HHS) Department to require such large health care organizations to immediately implement protections...

The post Senator: HHS Needs to Require Security Measures for Health Sector appeared first on Security Boulevard.

FCC Pushes Ahead with Internet Routing Security Requirements

7 June 2024 at 14:49
internet cybersecurity BGP

The Federal Communications Commission is considering requiring broadband providers to improve the cybersecurity of the networks that route traffic around the internet, an issue the FCC and other government agencies have been working on for more than a year. The proposal would require ISPs to generate confidential reports that would outline what they have done..

The post FCC Pushes Ahead with Internet Routing Security Requirements appeared first on Security Boulevard.

Narrowing the Stubborn Cybersecurity Worker Gap

6 June 2024 at 16:12
cybersecurity worker skills gap

There is still a significant gap between cybersecurity needs and available talent, according to Cyberseek, but all those tech industry layoffs are raising eyebrows. Organizations can expand the candidate pool by training people for these jobs rather than insisting on outside industry credentials.

The post Narrowing the Stubborn Cybersecurity Worker Gap appeared first on Security Boulevard.

Microsoft Recall is a Privacy Disaster

6 June 2024 at 13:20
Microsoft CEO Satya Nadella, with superimposed text: “Security”

It remembers everything you do on your PC. Security experts are raging at Redmond to recall Recall.

The post Microsoft Recall is a Privacy Disaster appeared first on Security Boulevard.

Shining the Light on Shadow IT: Top Five SaaS Security Tips for Third-Party Risk Management

3 June 2024 at 07:00
cybersecurity, SaaS, Palo Alto, third-party vendors, SaaS security, CISO, SSPM, SaaS security, SentinelLabs AppOmni Valence SaaS security Thirdera SaaS management SSPM CISOs SaaS

Security teams often grapple with the uncertainty of data exposure in their SaaS supply chain, especially with third-party SaaS vendors. A proactive approach helps safeguard organizations against SaaS threats. It begins with a comprehensive evaluation of third-party vendor cybersecurity practices to pinpoint potential vulnerabilities and risks within the supply chain.

The post Shining the Light on Shadow IT: Top Five SaaS Security Tips for Third-Party Risk Management appeared first on Security Boulevard.

Data Breaches in May 2024 – Infographic

3 June 2024 at 03:25

Has your data ever felt…exposed? We’ve all heard about data breaches, but have you ever stopped to wonder what the real impact is? At WeSecureApp, we track cyber threats closely, and this month, we’re here to shed light on what […]

The post Data Breaches in May 2024 – Infographic appeared first on WeSecureApp :: Securing Offensively.

The post Data Breaches in May 2024 – Infographic appeared first on Security Boulevard.

Amazon execs may be personally liable for tricking users into Prime sign-ups

29 May 2024 at 17:58
Amazon execs may be personally liable for tricking users into Prime sign-ups

Enlarge (credit: 400tmax | iStock Unreleased)

Yesterday, Amazon failed to convince a US district court to dismiss the Federal Trade Commission's lawsuit targeting the tech giant's alleged history of tricking people into signing up for Prime.

The FTC has alleged that Amazon "tricked, coerced, and manipulated consumers into subscribing to Amazon Prime," a court order said, failing to get informed consent by designing a murky sign-up process. And to keep subscriptions high, Amazon also "did not provide simple mechanisms for these subscribers to cancel their Prime memberships," the FTC alleged. Instead, Amazon forced "consumers intending to cancel to navigate a four-page, six-click, fifteen-option cancellation process."

In their motion to dismiss, Amazon outright disputed these characterizations of its business, insisting its enrollment process was clear, its cancellation process was simple, and none of its executives could be held responsible for failing to fix these processes when "accidental" sign-ups became widespread. Amazon defended its current practices, arguing that some of its Prime disclosures "align with practices that the FTC encourages in its guidance documents."

Read 23 remaining paragraphs | Comments

Black Basta Ransomware Attack: Microsoft Quick Assist Flaw – Source: securityboulevard.com

black-basta-ransomware-attack:-microsoft-quick-assist-flaw-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Wajahat Raja Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group, identified as Storm-1811, has been exploiting Microsoft’s Quick Assist tool in a series of social engineering attacks. This group is known for deploying the Black Basta ransomware attack. On May 15, 2024, Microsoft released details […]

La entrada Black Basta Ransomware Attack: Microsoft Quick Assist Flaw – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

City of Helsinki Data Breach: What You Need to Know – Source: securityboulevard.com

city-of-helsinki-data-breach:-what-you-need-to-know-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Rohan Timalsina On May 2, 2024, the City of Helsinki announced the data breach targeting its Education Division. However, the breach was discovered on April 30, 2024, and an investigation was promptly carried out. It was found that it has impacted tens of thousands of students, guardians, and personnel, causing considerable […]

La entrada City of Helsinki Data Breach: What You Need to Know – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Unlocking Tomorrow’s Data: Exploring the Future of Database Management

Database Management

By Shrikant Navelkar, Director, Clover Infotech  In today’s digital era, data holds immense significance. Database management traditionally was considered the domain of IT department alone, now it is emerging as a crucial element for business strategies. As we stand on the precipice of a new era defined by exponential data growth, let’s look at how new-age technologies such as cloud, blockchain, and AI are fundamentally reshaping the future of database management.   Here’s how these technologies are transforming database management and making them more beneficial to meet the ever-growing demands of a competitive business landscape.   Making database management more scalable and flexible – Cloud computing platforms provide unprecedented scalability and flexibility for database management. Enterprises can easily ramp up and scale down resources based on demand, avoiding the limitations of traditional on-premises infrastructure. This scalability enables businesses to cost-effectively manage growing volumes of data. Enhancing security and reliability of databases – Blockchain technology introduces decentralized and immutable ledgers, enhancing data security and integrity. By distributing data across a network of nodes, blockchain reduces the risk of single points of failure and unauthorized tampering. This decentralized approach ensures data transparency and trust, making it ideal for applications requiring secure and auditable transactions. Streamlining database for effective decision-making – Through advanced algorithms, AI revolutionizes database management by optimizing data storage, retrieval and analysis. AI-powered predictive analytics and anomaly detection algorithms can identify patterns and trends in large datasets, enabling businesses to anticipate future outcomes and make informed decisions swiftly. Further, it automates routine tasks such as data cleansing and indexing, reducing manual effort and allowing database administrators to focus on higher-value activities. Hence, AI-driven database management empowers organizations to leverage their data assets more effectively, facilitating quicker decision-making processes that drive competitive advantage. Enhancing the experience of database users – Technologies such as Natural language processing (NLP) enable users to interact with databases using conversational commands, thereby simplifying complex queries and speeding up data retrieval. Such intuitive interfaces and personalized interactions enhance the user experience. Additionally, cloud-based solutions provide seamless access to databases from any device or location, enhancing collaboration and productivity.

The Future Ahead: Challenges and Opportunities

Despite the transformative potential of these emerging trends, the future of database management is not without challenges. Concerns around data privacy, security, and regulatory compliance continue to loom large, necessitating robust governance frameworks and encryption standards. However, amidst these challenges lie immense opportunities for innovation and growth. The convergence of diverse technologies, from blockchain and AI to quantum computing, promises to usher in a new era of data management, characterized by agility, intelligence, and security. Organizations that embrace these advancements stand to gain a competitive edge in an increasingly data-driven world, unlocking new possibilities for innovation and value creation.  Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 
❌
❌