Normal view

There are new articles available, click to refresh the page.
Today — 18 May 2024Main stream

Emilia Perez review – Jacques Audiard’s gangster trans musical barrels along in style

18 May 2024 at 14:40

A thoroughly implausible yarn about a Mexican cartel leader who hires a lawyer to arrange his transition, but is carried along by its cheesy Broadway energy

Anglo-progressives and US liberals might worry about whether or not certain stories are “theirs to tell”. But that’s not a scruple that worries French auteur Jacques Audiard who, with amazing boldness and sweep, launches into this slightly bizarre yet watchable musical melodrama of crime and gender, set in Mexico. It plays like a thriller by Amat Escalante with music and lyrics by Lin-Manuel Miranda, and a touch of Almodovar.

Argentinian trans actor Karla Sofia Gascon plays Juan “Manitas” Del Monte, a terrifyingly powerful and ruthless cartel leader in Mexico, married to Jessi (Selena Gomez), with two young children. Manitas is intrigued by a high-profile murder trial in which an obviously guilty defendant gets off due to his smart and industrious lawyer Rita (Zoe Saldana); she is nearing 40 and secretly wretched from devoting her life to protecting unrepentant slimeballs, who go on to get ever richer while she labours for pitiful fees. Manitas kidnaps Rita and makes her an offer she can’t refuse: a one-off job for an unimaginably vast amount of money on which she can retire.

Continue reading...

💾

© Photograph: Shanna Besson

💾

© Photograph: Shanna Besson

Sex, rape, cannibals: what Yorgos Lanthimos did after Poor Things

18 May 2024 at 12:04

The maverick director and his trusted cast on making Kinds of Kindness, the ‘bonkers’ film causing a stir on the Croisette

Joe Alwyn, the British star of one of the most disturbing films to compete at the Cannes festival this year, has given his verdict on making the “bonkers” Kinds of Kindness, which features scenes of group sex, cannibalism and violence and in which Alwyn has to perform a drug rape on the character played by Oscar-winner Emma Stone. “You have to try not to unpack it all too much, or you get it stuck in your head,” he said on Saturday.

The 33-year-old, until now best known as a former partner of Taylor Swift, has been thrust into the glaring lights of Cannes this weekend, but has also had to survive entering the odd imagination of Poor Things director Yorgos Lanthimos. Alwyn said the best way to prepare himself for Lanthimos’s unsettling and explicit screen world had been to “trust him, trust him, trust him”. “It is bizarre and strange and bonkers and special,” Alwyn added, “but one of the reasons I love his films is because you feel it first, before you try to understand it all.”

Continue reading...

💾

© Photograph: Loïc Venance/AFP/Getty Images

💾

© Photograph: Loïc Venance/AFP/Getty Images

Caught by the Tides review – two-decade relationship tells story of China’s epic transformation

18 May 2024 at 10:51

The 20-year failed romance between a singer and a dodgy music promoter becomes the vehicle for director Jia Zhangke’s latest exploration of China’s momentous recent history

As so often in the past, Chinese film-maker Jia Zhangke swims down into an ocean of sadness and strangeness; his new film is a mysterious quest narrative with a dynamic, westernised musical score. It tells a human story of a failed romance spanning 20 years, and brings this into parallel with a larger panorama: the awe-inspiring scale of millennial change that has transformed China in the same period, a futurist fervour for quasi-capitalist innovation that has turned out to co-exist with some very old-fashioned state coercion.

Caught by the Tides reflects with a kind of numb astonishment at all the novelties that the country has been required to welcome, all the vast upheavals for which the people have had to make sacrifices. The film shows us the mobster-businessmen who have done well in modern China, the patriotic ecstasy of Beijing getting picked to host the 2008 Olympic Games, the creation of the Three Gorges hydroelectric dam which meant so much unacknowledged pain for the displaced communities. (This latter was the subject of Jia’s Venice Golden Lion winner Still Life in 2006.) And finally of course there is the misery of the Covid lockdown.

Continue reading...

💾

© Photograph: X Stream Pictures

💾

© Photograph: X Stream Pictures

Trump trial judge rebuked for donations to Democrat-aligned groups in 2020

18 May 2024 at 10:00

Ex-president’s legal team sure to make hay out of Juan Merchan’s $35 gift to Biden for President and anti-Republican groups

The judge overseeing Donald Trump’s hush-money campaign finance trial in New York has been cautioned by a state ethics panel over two small donations made to Democrat-aligned groups in 2020.

The caution is likely to be seized on by Trump and his lawyers as evidence of his claims that the New York trial, now entering its fourth week, has been unfairly adjudicated by Judge Juan Merchan along partisan political lines.

Continue reading...

💾

© Photograph: Seth Wenig/AP

💾

© Photograph: Seth Wenig/AP

NHS must listen to whistleblowers, says health secretary

18 May 2024 at 09:02

Victoria Atkins says she has asked officials to look into claims doctors and nurses who have spoken up were mistreated

The NHS must listen to whistleblowers and investigate their concerns in the interests of patient safety, the health secretary has said.

Victoria Atkins said she had asked officials to look into cases where there were claims of mistreatment of people who had spoken up about the issues they had experienced.

Continue reading...

💾

© Photograph: Andy Rain/EPA

💾

© Photograph: Andy Rain/EPA

Cannes 2024 week one roundup – the jury’s out, the sun isn’t…

18 May 2024 at 07:00

The weather didn’t play ball, but Magnus von Horn’s fierce fairytale and Andrea Arnold’s kitchen-sink take on English mysticism should count among the first-week highlights for Greta Gerwig’s jury

The Cannes film festival opens just as the heavens do, too. It’s raining on the red carpet and on the black limousines and on the immaculate white pavilions that line up on the beach. The rain falls on the A-listers as they climb the stairs to the Palais, and on the stoic huddled masses who gather behind the police cordons. Everybody’s bedraggled and windswept; it feels as though the whole town’s been at sea. “My main wish is that we see some great films this year,” says Iris Knobloch, the festival’s president, casting an anxious eye at the sky. “But also I’m wishing for a little sunshine as well.”

If it’s raining in Cannes, it means there’s a glitch in the script. It’s one of the event’s in-built paradoxes that a festival which predominantly plays out in darkened rooms should be so dependent on good weather; so in thrall to its complementary circus of photocalls, yacht parties and open-air film screenings. All it takes is a downpour to trigger a disturbance in the force, a creeping sense of existential dread. The punters came expecting Technicolor. But the scene is all wrong: the world has gone monochrome.

Continue reading...

💾

© Photograph: Loïc Venance/AFP/Getty Images

💾

© Photograph: Loïc Venance/AFP/Getty Images

Master of litters: cat named Max given honorary degree by US university

18 May 2024 at 06:00

Vermont State University confers doctorate in ‘litter-ature’ upon tabby for being keen hunter of mice and beloved figure on campus

Men named Max have won the Nobel prize (Planck), the Oscar for best actor (Schell), and multiple Formula One world championships (Verstappen).

A cat in the US named Max now joins those lofty ranks, having earned a doctorate in “litter-ature” when Vermont State University bestowed an honorary degree on the campus-dwelling tabby in recognition of his friendliness, a gesture which quickly achieved virality in corners of the internet dedicated to spotlighting light-hearted news.

Continue reading...

💾

© Photograph: Rob Franklin/AP

💾

© Photograph: Rob Franklin/AP

Will Michael Cohen’s testimony sway jurors in Trump’s hush-money trial?

18 May 2024 at 06:00

Trump’s former fixer gave damning testimony – and he’ll return to the stand on Monday as the trial moves towards a close

Donald Trump’s criminal trial is drawing to a close, with two looming questions: what will the jury decide, and how will America react?

After weeks of testimony from witnesses including the porn star Stormy Daniels, National Enquirer boss David Pecker and former senior Trump aide Hope Hicks, the trial came to an inflection point this week with its star witness. Michael Cohen, Trump’s former fixer and attorney who has since turned into a bellicose critic of his old boss, was on the stand all three days court was in session this week. He delivered damning testimony – then faced a tough if uneven grilling from Trump’s team.

Continue reading...

💾

© Photograph: Mike Segar/Reuters

💾

© Photograph: Mike Segar/Reuters

Scénarios review – Jean-Luc Godard collage is his final love letter to cinema

18 May 2024 at 01:00

Cannes film festival
Completed just before his assisted death, the French New Wave master director talks through his ideas as illustrated in his hand-drawn scrapbook

Here is an intriguing footnote to Jean-Luc Godard’s extraordinary career - a docu-textual movie collage lasting just under an hour in two parts, or maybe two layers, completed just before his assisted death two years ago in Switzerland at the age of 91. His collaborator and cinematographer Fabrice Aragno calls it not the “last Godard” but a “new Godard”. In its way, this little double film shows us a very great deal about Godard’s working habits, and it’s a late example of Godard speaking intimately in his own person about his own creative process.

Scénarios appears to have grown out of thoughts generated by his last film, The Image Book, which emerged in 2018. Godard sketched out his storyboarded or scrapbooked ideas for a short piece, which would juxtapose images, quotations, musical cues and clips in his distinctive manner. Aragno edited and curated the film from this blueprint, then came back to see Godard and to shoot a brief sequence of the director reciting a text from Sartre to go at the end. This is the first short film we see.

Continue reading...

💾

© Photograph: Ecran Noir productions

💾

© Photograph: Ecran Noir productions

The Surfer review – beach bum Nic Cage surfs a high tide of toxic masculinity

17 May 2024 at 20:00

An office drone must suffer the machismo of an Australian coastal town in this barmy, low-budget thriller about a would-be wave-chaser

Here is a gloriously demented B-movie thriller about a middle-aged man who wants to ride a big wave and the grinning local bullies who regard the beach as home soil. “Don’t live here, don’t surf here,” they shout at any luckless tourist who dares to visit picturesque Lunar Bay on Australia’s south-western coast, where the land is heavy with heat and colour. Tempers are fraying; it’s a hundred degrees in the shade. The picture crash-lands at the Cannes film festival like a wild-eyed, brawling drunk.

The middle-aged man is unnamed, so let’s call him Nic Cage. Lorcan Finnegan’s film, after all, is as much about Cage – his image, his career history, his acting pyrotechnics – as it is about surfing or the illusory concept of home. The Surfer sets the star up as a man on the edge – a sad-sack office drone who desperately wants to belong – and then shoves him unceremoniously clear over the cliff-edge. Before long, our hero is living out of his car in the parking lot near the dunes, drinking from puddles, foraging for food from bins, and scheming all the while to make his way down to the shore.

Continue reading...

💾

© Photograph: Tea Shop Productions - Lovely Productions

💾

© Photograph: Tea Shop Productions - Lovely Productions

Yesterday — 17 May 2024Main stream

Cats playing with robots proves a winning combo in novel art installation

17 May 2024 at 16:59
Cat with the robot arm in the Cat Royale installation

Enlarge / A kitty named Clover prepares to play with a robot arm in the Cat Royale "multi-species" science/art installation . (credit: Blast Theory - Stephen Daly)

Cats and robots are a winning combination, as evidenced by all those videos of kitties riding on Roombas. And now we have Cat Royale, a "multispecies" live installation in which three cats regularly "played" with a robot over 12 days, carefully monitored by human operators. Created by computer scientists from the University of Nottingham in collaboration with artists from a group called Blast Theory, the installation debuted at the World Science Festival in Brisbane, Australia, last year and is now a touring exhibit. The accompanying YouTube video series recently won a Webby Award, and a paper outlining the insights gleaned from the experience was similarly voted best paper at the recent Computer-Human Conference (CHI’24).

"At first glance, the project is about designing a robot to enrich the lives of a family of cats by playing with them," said co-author Steve Benford of the University of Nottingham, who led the research, "Under the surface, however, it explores the question of what it takes to trust a robot to look after our loved ones and potentially ourselves." While cats might love Roombas, not all animal encounters with robots are positive: Guide dogs for the visually impaired can get confused by delivery robots, for example, while the rise of lawn mowing robots can have a negative impact on hedgehogs, per Benford et al.

Blast Theory and the scientists first held a series of exploratory workshops to ensure the installation and robotic design would take into account the welfare of the cats. "Creating a multispecies system—where cats, robots, and humans are all accounted for—takes more than just designing the robot," said co-author Eike Schneiders of Nottingham's Mixed Reality Lab about the primary takeaway from the project. "We had to ensure animal well-being at all times, while simultaneously ensuring that the interactive installation engaged the (human) audiences around the world. This involved consideration of many elements, including the design of the enclosure, the robot, and its underlying systems, the various roles of the humans-in-the-loop, and, of course, the selection of the cats.”

Read 9 remaining paragraphs | Comments

Maternity services are failing mothers and babies, and it’s not just down to austerity | Letters

17 May 2024 at 13:11

Medical professionals and women who had bad experiences themselves respond to the findings of the birth trauma report

The maternity trauma report is deja vu all over again (Women having ‘harrowing’ births as hospitals hide failures, says MPs’ report, 13 May). I cannot read about it because it makes me want to scream.

I was around for the Shrewsbury and Telford hospital trust report a couple of years ago. All those dead babies, all those mothers and parents talking about not being listened to or respected. All that handwringing from service providers, all those promises from politicians. The recommendations were set up to prevent the experiences we heard about this week (‘I was left lying on the ground in pain’: shocking stories from UK birth trauma inquiry, 13 May). For instance, continuity of midwifery care through the maternal pathway prevents so much of the stuff we read about now.

Continue reading...

💾

© Photograph: Science Photo Library/IAN HOOTON/Getty Images

💾

© Photograph: Science Photo Library/IAN HOOTON/Getty Images

Kinds of Kindness review – sex, death and Emma Stone in Lanthimos’s disturbing triptych

17 May 2024 at 13:01

Cannes film festival
Yorgos Lanthimos reinforces how the universe keeps on doing the same awful things with a multistranded yarn starring Emma Stone, Willem Dafoe and Jesse Plemons

Perhaps it’s just the one kind of unkindness: the same recurring kind of selfishness, delusion and despair. Yorgos Lanthimos’s unnerving and amusing new film arrives in Cannes less than a year after the release of his Oscar-winning Alasdair Gray adaptation Poor Things. It is a macabre, absurdist triptych: three stories or three narrative variations on a theme, set in and around modern-day New Orleans.

An office worker finally revolts against the intimate tyranny exerted over him by his overbearing boss. A police officer is disturbed when his marine-biologist wife returns home after months of being stranded on a desert island, and suspects she has been replaced by a double. Two cult members search for a young woman believed to have the power to raise the dead.

Continue reading...

💾

© Photograph: Atsushi Nishijima

💾

© Photograph: Atsushi Nishijima

A kangaroo, a possum and a bushrat walk into a burrow: research finds wombat homes are the supermarkets of the forest

17 May 2024 at 11:00

Scientist discovers a cast of recurring characters using burrows in the aftermath of bushfire, after sifting through more than 700,000 images

First came a picture of an inquisitive red-necked wallaby, then an image of a bare-nosed wombat, followed by a couple of shots of the wombat’s burrow with nothing else in the frame.

By the time research scientist Grant Linley had looked through a further 746,670 images, he had seen 48 different species visiting the 28 wombat burrows that he had trained his cameras on.

Continue reading...

💾

© Composite: Supplied by Grant Linley

💾

© Composite: Supplied by Grant Linley

Study Suggests Waiting Longer Before Withdrawing Life Support

17 May 2024 at 05:03
A review of a limited number of cases of unresponsive patients with severe traumatic brain injuries raised questions about a custom of making a decision within 72 hours.

© Shannon Stapleton/Reuters

A new study found that 42 percent of those who had continued life support recovered enough in the next year to have some degree of independence. A few even returned to their former lives.
Before yesterdayMain stream

FCC Reveals 'Royal Tiger' Robocall Campaign – Source: www.darkreading.com

fcc-reveals-'royal-tiger'-robocall-campaign-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Ian Allenden via Alamy Stock Photo For the first time ever, the Federal Communications Commission (FCC) Enforcement Bureau has identified a specific threat group as being behind a spate of pernicious robocall campaigns. The group, dubbed “Royal Tiger,” has associates in India, the United […]

La entrada FCC Reveals 'Royal Tiger' Robocall Campaign – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

FDA Approves Amgen Drug for Persistently Deadly Form of Lung Cancer

16 May 2024 at 16:59
The treatment is for patients with small cell lung cancer, which afflicts about 35,000 people in the U.S. a year.

© Joe Buglewicz for The New York Times

Martha Warren, 65, of Westerly, R.I., found out last year that she had small cell lung cancer, and joined the tarlatamab clinical trial. She said she now feels as good as before her diagnosis.

Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks – Source:thehackernews.com

cybercriminals-exploiting-microsoft’s-quick-assist-feature-in-ransomware-attacks-–-source:thehackernews.com

Source: thehackernews.com – Author: . May 16, 2024NewsroomRansomware / Incident Response The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm-1811 abusing the client management tool Quick Assist to target users in social engineering attacks. “Storm-1811 is a financially motivated cybercriminal group known to deploy Black Basta ransomware,” […]

La entrada Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

"I didn't realize how important it is not to tell the truth"

By: paduasoy
16 May 2024 at 02:57
The Bloggess (Jenny Lawson) has posted about finding art made by a woman, Laura Perea, who was in a psychiatric hospital from the 1940s. She describes what she has discovered about Laura Perea's life and family, and reproduces her art, in three posts: Help me solve a haunting art mystery?; Art mystery possibly solved?; Uncovering the mystery of L. Perea and trying to erase the stigma of mental illness. Content warning: death by suicide of one of Laura Perea's family members.

The San Antonio Express-News has some more information. Lawson is planning an exhibition of Laura Perea's art.

UK NCSC to Defend ‘High-Risk’ Political Candidates from Cyberattacks

cyber threats targeting political candidates

In response to heightened cyber threats targeting political candidates, election officials and civil society groups, the National Cyber Security Centre (NCSC) in the UK, a part of GCHQ, has introduced a new initiative called the Personal Internet Protection (PIP) service. The service that was unveiled at CYBERUK 2024 in Birmingham, aims to provide an additional layer of security to individuals at “high-risk” of cyberattacks like spear-phishing, malware and other threats, ahead of the upcoming election year. The Personal Internet Protection service works by alerting users when attempting to access malicious domains known to the NCSC and by blocking outgoing traffic to these domains. The PIP offered to high-risk individuals is built on the NCSC’s Protective DNS service that was developed primarily for use by organizations. Since its inception in 2017, PDNS has provided protection at scale for millions of public sector users, handling more than 2.5 trillion site requests and preventing access to 1.5 million malicious domains, the NCSC said.

Cyber Threats Targeting Political Candidates

The Personal Internet Protection service is part of a broader effort by the UK government to enhance cyber support for individuals and organizations crucial to the democratic process, especially considering recent attempts by Russian and Chinese state-affiliated actors to disrupt UK's government and political institutions as well as individuals. While the Russian intelligence services had attempted to use cyberattacks to target prominent persons and organizations in the UK for meddling in the electoral processes, China is likely seen targeting various government agencies including the Ministry of Defence (MoD), whose payroll system was recently breached. Although both, Moscow and Beijing have rejected the use of hacking for political purposes, the relations between them remain strained over these allegations. Jonathon Ellison, NCSC Director for National Resilience and Future Technology, noted the importance of protecting individuals involved in democracy from cyber threats, highlighting the attractiveness of their personal accounts to espionage operations.
“Individuals who play important roles in our democracy are an attractive target for cyber actors seeking to disrupt or otherwise undermine our open and free society. That’s why the NCSC has ramped up our support for people at higher risk of being targeted online to ensure they can better protect their accounts and devices from attacks,” Ellison said.
Ahead of the major election year where more than 50 countries around the world cast their vote, Ellison urged individuals eligible for the Personal Internet Protection services to sign up and to follow their guidance to bolster defenses against various cyber threats. The initiative also extends support to civil society groups facing a heightened risk of cyber threats. A new guide, "Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society," which offers practical advice for individuals such as elected officials, journalists, activists, academics, lawyers and dissidents was released on Tuesday. This guide, developed by the U.S. Cybersecurity and Infrastructure Security Agency in collaboration with international partners, aims to empower high-risk civil society communities with limited resources to combat cyber threats effectively. These include customized risk assessment tools, helplines for digital emergencies and free or discounted cybersecurity services tailored to the needs of civil society organizations. The launch of the Personal Internet Protection service and the release of the guidance for civil society mark significant steps in bolstering the cybersecurity posture of individuals and organizations critical to the democratic process. By enhancing protection against cyber threats, the UK aims to safeguard the integrity of its democracy and promote collective resilience against global threats to democracy. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Donald Trump comes face to face with former fixer Michael Cohen – podcast

This week, it was Donald Trump’s former fixer Michael Cohen’s turn to take the stand in the hush-money trial in New York. Cohen walked the jury through the steps he says he took to make any potential story that would damage Trump’s image go away, in advance of the 2016 election.

The defence is trying to chip away at Cohen’s credibility, to sow seeds of doubt among the jury listening to his testimony. So how did he do? Jonathan Freedland asks former federal prosecutor Ankush Khardori what he makes of the prosecution’s star witness so far

Archive: Fox News 5, CBS News, CNN, Sky Australia

Continue reading...

💾

© Photograph: David Dee Delgado/Getty Images

💾

© Photograph: David Dee Delgado/Getty Images

The Cybersecurity Guardians: Meet the Top 30 cybersecurity Influencers to Follow in 2024

cybersecurity influencer

The ever-evolving landscape of cybersecurity is shaped by a dedicated group of individuals. These pioneers, through their research, entrepreneurship, and tireless efforts, have left a significant mark on the industry.  From seasoned security leaders steering the helm of major companies, to passionate bloggers, journalists, podcasters, and authors, this diverse group offers a wealth of perspectives on the ever-present fight against cybercrime.  Veterans with decades of experience share the stage with innovative minds constantly pushing boundaries. Whether it's investigative journalists uncovering cybercrime rings, ethical hackers forging new defensive strategies, or company founders shaping the future of online safety, these influencers are united in a common cause.   They leverage social media to not only stay updated on the latest threats but also advocate for increased awareness and education. This list compiles the top 30 most influential cybersecurity influencers who actively share their expertise online. If you're interested in cybersecurity, following and engaging with these influential figures is a surefire way to stay informed and inspired.

Top 30 Cybersecurity Influencers of 2024

30. Alexandre Blanc - President and Owner at Alexandre Blanc Cyber

[caption id="attachment_68576" align="alignnone" width="541"]Cybersecurity-Influencers-of-2024 Source: LinkedIn[/caption] Alexandre Blanc is a renowned Cybersecurity dvisor, ISO/IEC 27001 and 27701 Lead Implementer, and a recognised security expert. With a track record of holding successful cybersecurity events, Blanc serves as an Independent Strategic and Security Advisor, providing invaluable counsel to various organisations. His expertise spans incident response management, digital transformations, and dark web investigations. Recognised as a LinkedIn Top Voice in Technology and named among the top security experts with over 75k followers on LinkedIn, Blanc's insights are highly sought-after in the cybersecurity community. Through publications, speaking engagements, and advisory roles, he continues uplift the IT and security industry. 

29. Alissa Abdullah - Deputy CSO at Mastercard

[caption id="attachment_68502" align="alignnone" width="541"]Alissa Abdullah - Deputy CSO at Mastercard Cybersecurity Influencer Source: LinkedIn[/caption] Alissa Abdullah, PhD, is a distinguished senior information technology and cybersecurity executive with a rich background spanning Fortune 100 companies, the White House, and the government intelligence community. Currently serving as Deputy Chief Security Officer for Mastercard, she brings over 20 years of experience in IT strategy, fiscal management, and leading large government programmes. Abdullah's strategic leadership extends beyond her corporate role; she serves as a board member for organisations like Girls in Tech, Inc. and Smartsheet, while also lecturing at the University of California, Berkeley. With a PhD in Information Technology Management, and over 17k followers on LinkedIn, she is a recognised authority in cybersecurity and IT leadership.

29. Jane Frankland - CEO at KnewStart

[caption id="attachment_68503" align="alignnone" width="541"]Jane Frankland - CEO at KnewStart Cybersecurity Influencer Source: LinkedIn[/caption] Jane Frankland is a prominent figure in cybersecurity with a career spanning over two decades of experience in the field. As a cybersecurity influencer and LinkedIn Top Voice, she has established herself as an award-winning leader, coach, board advisor, author, and speaker. Frankland's expertise lies in bridging the gap between business strategy and technical cybersecurity needs, enabling smoother and more effective engagements. With a portfolio career, she works with major brands as an influencer, leadership coach, and board advisor. Additionally, Frankland is deeply involved in initiatives promoting diversity and inclusion in cybersecurity, aligning her work with the UN Sustainable Development Goals.

27. Mark Lynd - Head of Executive Advisory & Corporate Strategy at NETSYNC

[caption id="attachment_68504" align="alignnone" width="541"]Mark Lynd - Head of Executive Advisory & Corporate Strategy at NETSYNC Cybersecurity Influencer Source: LinkedIn[/caption] Mark Lynd is a globally recognised cybersecurity strategist, and keynote speaker in cybersecurity and AI. With over 25 years of experience, including four stints as a CIO & CISO for global companies, he excels in technology, cybersecurity, and AI. Currently, he serves as the Head of Executive Advisory & Corporate Strategy at Netsync, a global technology reseller, where he concentrates on cybersecurity, AI, data center, IoT, and digital transformation. Lynd's accolades include being ranked globally for security and AI thought leadership, and he's authored acclaimed books and eBooks. He holds a Bachelor of Science from the University of Tulsa and is a proud military veteran.

26. Naomi Buckwalter - Director of Product Security at Contrast Security

[caption id="attachment_68505" align="alignnone" width="541"]Naomi Buckwalter - Director of Product Security at Contrast Cybersecurity Influencer Source: LinkedIn[/caption] Naomi Buckwalter is an accomplished Information Security Leader, Nonprofit Director, Keynote Speaker, and LinkedIn Learning Instructor. With extensive experience in directing information security programmes, she has notably served as Director of Product Security at Contrast Security and Director of Information Security & IT at Beam Dental. Buckwalter's expertise encompasses compliance, risk management, and security operations. She is also the Founder & Executive Director of the Cybersecurity Gatebreakers Foundation, aiming to revolutionise cybersecurity hiring practices. With a background in computer science and over 99K followers on LinkedIn, she is recognised for her contributions as a cybersecurity thought leader and advocate for diversity in tech.

25. Raj Samani- Chief Scientist for Cybersecurity

[caption id="attachment_68506" align="alignnone" width="541"]Raj Samani- Chief Scientist for Cybersecurity Source: Australian Cyber Conference 2024[/caption] Raj Samani is currently a Chief Scientist at Rapid7 and has experience in this industry spanning 20 years. He has worked with law enforcement and is also advisor to the European Cybercrime Centre. Samani is a sought-after speaker at industry conferences, a published author, and continues to make appearances in podcasts where he discusses his expertise surrounding threat intelligence, cyber defence strategies, and emerging threats. With his following of over 15.2k followers on LinkedIn and 14.4k on Twitter, Samani is influential to his followers due to the cybersecurity related articles, updates and insights he shares, often engaging not only cybersecurity enthusiasts but also professionals.

24. Tyler Cohen Wood- Co- Founder of Dark Cryptonite

[caption id="attachment_68507" align="alignnone" width="541"]Tyler Cohen Wood- Co- Founder of Dark Cryptonite Source: BankInfoSecurity[/caption] Tyler Cohen Wood is a prominent and respected figure in the cybersecurity field. Currently the co-founder of Dark Cryptonite, a Special Comms method of cybersecurity, Woods has over 20 years of experience in the intelligence community. Woods previously served as Senior Intelligence Officer at the Defence Intelligence Agency (DIA) and Cyber Branch Chief at the DIA's Science and Technology Directorate. Woods is also a keynote speaker and provides insight into global cyber threats and national security due to her knowledge on digital privacy and national security.  Woods has a following of over 27k on LinkedIn, attention she’s garnered due to her ability to share insightful commentary on cybersecurity issues which explains complex technical concepts easily for all types of audiences.

23. Theresa Payton- CEO of Fortalice Solutions

[caption id="attachment_68509" align="alignnone" width="541"]Theresa Payton- CEO of Fortalice Solutions Source: Experience McIntire[/caption] Theresa Payton was the first ever female Chief Information Officer for the White House from 2006-2008, serving under George W. Bush, and is now the CEO of her company Fortalice Solutions which she founded in 2008. Payton is best known for consulting as that is the purpose of her company, providing services like risk assessments, incident response, and digital forensics to government agencies and different industries and businesses about cybersecurity strategy and best IT practices. Payton has over 25k followers on LinkedIn and this is due to her continuous and avid blogging exposing cybercrimes and tackling cybersecurity on her companies page.

22. Bill Brenner-Vice President, Custom and Research Content Strategy, CyberRisk Alliance 

[caption id="attachment_68510" align="alignnone" width="541"]Bill Brenner-Vice President, Custom and Research Content Strategy, CyberRisk Alliance Source: SC Magazine[/caption] Bill Brenner is an experienced professional in the cybersecurity field and has ventured into many areas including journalist, editor, and community manager. His work has focused on cybersecurity education and awareness. Brenner is currently the Vice President of Custom and Research Content Strategy at CyberRisk Alliance. Brenners 15.7k followers on Twitter come from his influence surrounding articles posted on CS Media and Techtarget which are informative and relevant to cybersecurity professionals.

21. Brian Honan- CEO of BH Consulting

[caption id="attachment_68511" align="alignnone" width="541"]Brian Honan- CEO of BH Consulting Source: BH Consulting[/caption] Brian Honan is the CEO of BH Consulting and has over 30 years of experience in  cybersecurity. He was formerly a special advisor on cyber security to Europol’s Cyber Crime Centre, along with being an advisor to the European Union Agency for Network and Information Security. Honan’s work in consultancy is not just aimed at government agencies but also multinational corporations, and small businesses. Honan advocates highly for education in the field and is a founding member of the Irish Reporting and Information Security Service (IRISS-CERT). His following of 36.2k on Twitter can be attested to the articles and blogs he’s written and posted along with presentations at industry conferences worldwide.

20. Magda Chelly- Senior Cybersecurity Expert

[caption id="attachment_68513" align="alignnone" width="541"]Magda Chelly- Senior Cybersecurity Expert Source: LinkedIn[/caption] Magda Chelly is the first Tunisian woman to be on the advisory board of Blackhat. She has over 10 years of experience in security architecture, risk management, and incident response. Chelly is also a published author and is also known to be a keynote speaker who can deliver her talks in five different languages. She is currently the Managing Director at Responsible Cyber where she helps organisations implement effective cybersecurity strategies, while also being the founder of Women of Security (WoSEC) Singapore which aims to encourage women to join the field of cybersecurity. Chelly has over 57k followers on LinkedIn due to her posts on cybersecurity, but also her diversity initiatives which make her an advocate in the field. 

19. Marcus J. Carey- Principal Research Scientist at ReliaQuest, CEO of ThreatCare

[caption id="attachment_68514" align="alignnone" width="541"]Marcus J. Carey- Principal Research Scientist at ReliaQuest, CEO of ThreatCare Source: Facebook[/caption] Marcus J Carey is a former Navy Cryptologist who is now in cybersecurity innovation. He has worked many roles including penetration tester, security researcher, and security engineer, all of which helped to gain new and revolutionary insights into offensive and defensive cybersecurity techniques. Carey is famous for the books he has written surrounding hackers and cybersecurity and is an established CEO of Threatcare, a cybersecurity company focused on providing proactive threat detection and risk assessment solutions. His 52.4k Twitter followers stem from the expertise he shares on social media and his importance in educating future professionals in the field. He is also sought after for speaking in industry conferences. 

18. Andy Greenberg- Senior Writer at WIRED

[caption id="attachment_68515" align="alignnone" width="541"]Andy Greenberg- Senior Writer at WIRED Source: Penguin Random House[/caption] Andy Greenberg is currently a senior writer at Wired magazine, and has written many articles investigating high-profile cyber incidents, hacking groups, and emerging cybersecurity threats. Greenberg's reports often focus on the details of cyberattacks and looks at the broader implications for people, the government, and the industry as a whole. His 70.4k followers on Twitter are influenced by his updates and in-depth articles exploring the world of cybersecurity, not only informing the general public but also professionals about the hazards.

17. Paul Asadoorian- IT Security Engineer

[caption id="attachment_68516" align="alignnone" width="541"]Paul Asadoorian- IT Security Engineer Source: SC Magazine[/caption] Paul Asadoorian is a professional in the cybersecurity field for over 20 years, but his following comes from his blogs and podcasts. He’s best known as the founder and host of Security Weekly where Asadoorian brings together experts and practitioners from the cybersecurity field to discuss latest news and research in the field such as network security, application security, incident response, etc. Additionally, he is also the founder and CEO of Offensive Countermeasures, a company that helps cybersecurity professionals enhance their skills and stay ahead of evolving threats. His 77.3k followers on Twitter are mostly due to his large social media presence as a podcaster and his posts surrounding resources , opinions, and promotion of Security Weekly.

16. Nicole Perlroth- New York Times

[caption id="attachment_68518" align="alignnone" width="541"]Nicole Perlroth- New York Times Source:[/caption] Nicole Perlroth is a Pulitzer Prize-winning journalist who covers cybersecurity and digital espionage for The New York Times. She is regarded for her intensive reporting on cyber threats, hacking incidents, and the intersection of technology and national security. Perlroth has also written a book on the cyberweapons arms race. With 91.5k followers on Twitter, Perlroth shares her own articles, as well as insights and updates related to cybersecurity and technology which creates engagement for her from both cybersecurity professionals and general readers interested in security.

15. Graham Cluley- Smashing Security

[caption id="attachment_67630" align="alignnone" width="523"]Graham Cluley- Smashing Security Source: Smashing Security[/caption] Graham Cluley is an author and blogger who has written books on cybersecurity and continues to be avid in sharing news and stories on cybersecurity through the written word and speech. Currently, Graham Cluley is an independent cybersecurity analyst, writer, and public speaker. He also runs a podcast where he discusses internet threats and safety in an entertaining, engaging and informative way. Cluley’s 112.9k Twitter followers are updated with his podcast, tweets and YouTube videos which explain cybersecurity topics and how to tackle them in a way patented to the general users of the internet. 

14. Rachel Tobac- Hacker and CEO of SocialProof Security 

[caption id="attachment_68522" align="alignnone" width="541"]Rachel Tobac- Hacker and CEO of SocialProof Security  Source: LinkedIn[/caption] Rachel Tobac is an ethical hacker who helps companies keep safe through her work as CEO of SocialProof Security, which she co-founded. The company focuses on educating employees to recognize and deal with cyberattacks. She has a background in behavioural psychology and uses it to improve cybersecurity awareness and defences in the general public. Tobac also works with the non-profit Women in Security and Privacy (WISP) where she helps women advance in the security field and often speaks for underrepresented groups to pursue a career in cybersecurity. Tobac’s 106k strong following on Twitter is due to her activism and due to the tips and updates she shares related to the industry, with some posts being popular for starting debates amongst professionals.

13. Katie Moussouris- Founder of Luta Security

[caption id="attachment_68523" align="alignnone" width="541"]Katie Moussouris- Founder of Luta Security Source: SANS Cyber Security Certifications & Research[/caption] Katie Moussouris is the Founder of Luta Security which encompasses her aims surrounding vulnerability disclosure and safer and responsible research in security. She is a leading figure in both the aspects and has 20 years of experience on the field. Some of Moussouris’s leading work is the Microsoft's bug bounty programme, which she developed and was one of the first-of-its-kind in the industry. She also advocates for vulnerability disclosure, which merits more transparency between security researchers and organisations. Moussouris’s 115.5k followers come from her revolutionary developments. She is a frequent speaker at cybersecurity conferences and events. She often posts and talks about her advocacy for ethical hacking and responsible security practices along with her expertise on vulnerability disclosure and bug bounty programmes.

12. Chuck Brooks- President of Brooks Consulting International 

[caption id="attachment_68524" align="alignnone" width="541"]Chuck Brooks- President of Brooks Consulting International  Source: The Official Cybersecurity Summit[/caption] Brooks is the president of his consulting company where he advises clients on cybersecurity strategy, risk assessment, and business development. Along with that, he is a featured author in many technology and cybersecurity blogs. Brooks has previously worked in advisory roles with corporations and also at government agencies, including the Department of Homeland Security and the Defence Intelligence Agency. Brooks’ 116k LinkedIn followers are due to his regular contributions to industry research and news, media articles. Along with that, he is a popular keynote speaker who shares his expertise on a wide range of cybersecurity topics.

11. Daniel Miessler- Founder of Unsupervised Learning

[caption id="attachment_68525" align="alignnone" width="541"]Daniel Miessler- Founder of Unsupervised Learning Source: The Official Cybersecurity Summit[/caption] Miessler is the founder and CEO of Unsupervised Learning where he writes informative articles and tackles relevant issues surrounding cybersecurity and what the world after AI means for human beings.  Miesslers following of 139.4k on Twitter comes from professionals in the field and novice enthusiasts engaging with his content and discussions due to his experience in the field. He also avidly shares articles, podcasts, bringing his audience up to speed with cybersecurity.

10. Kevin Beaumont- Internet Cyber Personality

[caption id="attachment_68526" align="alignnone" width="541"]Kevin Beaumont- Internet Cyber Personality Source: iTWire[/caption] Kevin Beaumont is an experienced professional who has worked in various cybersecurity roles, including security engineer and consultant. He also specialises in threat detection and incident response. Kevin is now the Head of Cybersecurity Operations at Arcadia Ltd. along with being a cybersecurity researcher who runs his own platform where he discusses cybersecurity. Beaumont appeals to newer, younger cybersecurity enthusiasts with around 150.9k followers on Twitter due to his engagement with trolling on the internet. Additionally, he writes articles for Medium where he informs about cybercrime issues such as Microsoft Windows vulnerability. 

9. Lesley Carhart- hacks4pancakes

[caption id="attachment_68527" align="alignnone" width="541"]Lesley Carhart- hacks4pancakes Source: hacks4pancakes[/caption] Lesley Carhart is currently a threat analyst and principal responder at Dragos, a company which works to protect industrial control systems from cyber threats, and has experience as a security analyst, incident responder and threat hunter. Her work in both the public and private sectors allowed her to gain valuable insights into cybersecurity issues across different industries. Her following of 168k comes from her works such as blogger and speaker who offers career advice in the field of cybersecurity. She also speaks about topics such as industrial control, ransomware attacks and more.   

8. Bruce Schneier- Schneier on Security

[caption id="attachment_68528" align="alignnone" width="541"]Bruce Schneier- Schneier on Security Source: Wikipedia[/caption] Schneier is a specialist in computer security and privacy along with being a cryptographer. Schneier is regarded as one of the most influential people in his field of cryptography and has written numerous books on cybersecurity, some of which are considered seminal works in the field. He has also written articles about security and privacy for magazines such as Wired. Schneier’s following of 147.1k comes from being acknowledged as impactful in his field but also due to his blog where he addresses the prevalence of hacking and other cyber dangers intersecting with our everyday lives.

7. Eugene Kaspersky- CEO of Kaspersky Lab

[caption id="attachment_68530" align="alignnone" width="541"]Eugene Kaspersky- CEO of Kaspersky Lab Source: LinkedIn[/caption] Eugene Kaspersky is an individual most impactful in the cybersecurity, best known as the CEO of Kaspersky Lab, a company he co-founded in 1997 which identified government-sponsored cyberwarfare. Kaspersky’s following of 187.5k comes from how Kaspersky Lab has grown into a global cybersecurity powerhouse, offering a wide range of products and services, along with his advocacy for cybersecurity education. Kaspersky is also a keynote speaker on emerging threats, and the importance of cybersecurity awareness at industry conferences and events. Furthermore, he writes a blog where he regularly posts updates about his life in the industry. 

6. Eric Geller - Cybersecurity Journalist

[caption id="attachment_68532" align="alignnone" width="541"]Eric Geller - Cybersecurity Journalist Source: LinkedIn[/caption] Eric Geller is a freelance cybersecurity journalist recognised for his insightful coverage of digital security. With a comprehensive portfolio including esteemed publications like WIRED, Politico, and The Daily Dot, Geller offers in-depth analysis on cyber policy, encryption, and data breaches. His investigative reporting touches the intricate intersections of cybersecurity and everyday life, from election security to critical infrastructure protection. Geller's expertise extends to interviews with top officials and breaking news on government initiatives. With a Bachelor of Arts in Political Science from Kenyon College, Geller's accolades include induction into the Pi Sigma Alpha national political science Honors society.

5. Shira Rubinoff- The Futurum Group 

[caption id="attachment_68533" align="alignnone" width="541"]Shira Rubinoff- The Futurum Group  Source: The Futurum Group[/caption] Shira Rubinoff is a cybersecurity and blockchain advisor as well as being a popular keynote speaker and author. She is the President of SecureMySocial, a cybersecurity company that focuses on protecting organizations from social media risks such as data leakage, reputational damage, and insider threats. Her videos are many and impactful, consisting of interviews and conversations with other professionals. She is known to be one of the top businesswomen in the field and currently runs a cybersecurity consulting firm and serves as the Chair of the Women in Cybersecurity Council (WCI), aiming to influence more women to join the field. Her follower count of 190.4k isn’t only due to her experience as a businesswoman, but also her constant interaction on social media as she posts talks, videos, podcasts, written work and more about many topics in cybersecurity.

4. Mikko Hyppönen- Chief Research Officer at WithSecure 

[caption id="attachment_68535" align="alignnone" width="541"]Mikko Hyppönen- Chief Research Officer at WithSecure  Source: WithSecure[/caption] Miko Hyppönen has been in the world of cybersecurity since the late 1980s. Since then he has led researchers in identifying and eliminating emerging cyber threats, while providing insights and solutions to protect individuals, businesses, and governments from cybercrime. Hyppönen has written for many famous newspapers like the New York Times and has also appeared on international TV and lectured at universities like Oxford and Cambridge. His 230.5k followers is due to his engaging and informative presentations, which help raise awareness about cybersecurity threats. He also has a following for his blog posts and research papers detailing his expertise. 

3. Kim Zetter - Investigative Journalist and Book Author

[caption id="attachment_68536" align="alignnone" width="541"]Kim Zetter - Investigative Journalist and Book Author Source: IMDb[/caption] Kim Zetter is an award-winning investigative journalist renowned for her expertise in cybersecurity and national security. With a distinguished career spanning publications like WIRED, Politico, and The New York Times Magazine, Zetter is a respected authority on topics ranging from election security to cyber warfare. Her book, "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon," offers a gripping narrative of covert cyber operations. As a sought-after speaker and social media personality with over 7K followers on LinkedIn, she shares insights at conferences worldwide. Zetter's relentless pursuit of truth has earned her acclaim and established her as a leading voice in the cybersecurity journalism.

2. Brian Krebs- Krebs on Security

[caption id="attachment_68537" align="alignnone" width="541"]Brian Krebs- Krebs on Security Source: Keppler Speakers[/caption] Brian Krebs is an investigative journalist who wrote for The Washington post from 1995 to 2009 for the security fix blog. He now runs his own blog, Krebs on Security. In it, he provides in-depth analysis and reports, along with promptly posted breaking news on cybercrime, hacking, data breaches, etc. Krebs has received many awards for his investigative journalism, including the Pulitzer Prize finalist for his coverage of cybersecurity problems. Krebs’ 347.9k are due to the reputation his blog widely holds for being a first choice when looking for accurate, fast information, as well as the truth as he’s known to hold individuals and organisations accountable for in his work.

1. Robert Herjavec- CEO of Global Cybersecurity Firm - Cyderes

[caption id="attachment_68538" align="alignnone" width="541"]Robert Herjavec- CEO of Global Cybersecurity Firm - Cyderes Source: Cyderes[/caption] Herjavec is the CEO of the Herjavec Group and the Global Cybersecurity Firm, Cyderes, which leads cybersecurity options and supports many security services including threat detection and response, identity and access management, and compliance solutions. Along with that, he features on BBC’s Shark Tank and also provides motivational business advice through his books and videos. His following of 2.2 million may be due to his appearance on the show, but he continues to actively post insights and gives commentary on cybersecurity trends and ever-changing threats. Most of his followers are there to witness what he shares on business and entrepreneurship. Herjavec frequently shares cybersecurity related articles and updates.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Game dev says contract barring “subjective negative reviews” was a mistake

13 May 2024 at 11:59
Artist's conception of NetEase using a legal contract to try to stop a wave of negative reviews of its closed alpha.

Enlarge / Artist's conception of NetEase using a legal contract to try to stop a wave of negative reviews of its closed alpha. (credit: NetEase)

The developers of team-based shooter Marvel Rivals have apologized for a contract clause that made creators promise not to provide "subjective negative reviews of the game" in exchange for early access to a closed alpha test.

The controversial early access contract gained widespread attention over the weekend when streamer Brandon Larned shared a portion on social media. In the "non-disparagement" clause shared by Larned, creators who are provided with an early download code are asked not to "make any public statements or engage in discussions that are detrimental to the reputation of the game." In addition to the "subjective negative review" example above, the clause also specifically prohibits "making disparaging or satirical comments about any game-related material" and "engaging in malicious comparisons with competitors or belittling the gameplay or differences of Marvel Rivals."

Extremely disappointed in @MarvelRivals.

Multiple creators asked for key codes to gain access to the playtest and are asked to sign a contract.

The contract signs away your right to negatively review the game.

Many streamers have signed without reading just to play

Insanity. pic.twitter.com/c11BUDyka9

— Brandon Larned (@A_Seagull) May 12, 2024

In a Discord post noticed by PCGamesN over the weekend, Chinese developer NetEase apologized for what it called "inappropriate and misleading terms" in the contract. "Our stand is absolutely open for both suggestions and criticisms to improve our games, and... our mission is to make Marvel Rivals better [and] satisfy players by those constructive suggestions."

Read 6 remaining paragraphs | Comments

We're getting the band (back?) together!

By: hanov3r
13 May 2024 at 01:30
There have been a few posts here on the blue in recent years celebrating some rising young music stars, Yoyoka Soma and Ellen Alaverdyan, to name two. Often, when we see talented young people like that, our first thought is "Hey, they should collaborate!". Well, our wish has been granted.

Kids Rock for Kids is an NYC-based non-profit helps young musicians use their talents to help kids in need. They've released the first video for their "Global Collaboration", bringing together an amazing collection of musicians from age 16 to age 9.

Nancy Neveloff Dubler, Mediator for Life’s Final Moments, Dies at 82

10 May 2024 at 21:45
A bioethicist, she pioneered bedside methods for helping patients, their families and doctors deal with anguishing life-and-death decisions in a high-tech age.

© James Estrin/The New York Times

Nancy Dubler, director of the bioethics division at Montefiore Medical Center in the Bronx, spoke in 2005 with Fred Haber, who was at his wife’s bedside after a mediation session.

Understanding Linux Cryptography: Security in the Open Source World

10 May 2024 at 04:00

Encryption plays a vital role by scrambling information, making it unreadable to anyone without the decryption key. Linux provides robust protocols like SSL/TLS to establish secure connections between clients and servers. Regularly update cryptographic software, libraries, and the Linux kernel for the latest security patches. Cryptography is the art of creating mathematical techniques to secure […]

The post Understanding Linux Cryptography: Security in the Open Source World appeared first on TuxCare.

The post Understanding Linux Cryptography: Security in the Open Source World appeared first on Security Boulevard.

Herbert Pardes, Who Steered the Growth of a Giant Hospital, Dies at 89

9 May 2024 at 14:56
A psychiatrist, he ran New York-Presbyterian after a landmark merger, improving its patient care and finances and raising money to expand its footprint across the region.

© Marilynn K. Yee/The New York Times

Dr. Herbert Pardes in 2003 as president and chief executive of NewYork-Presbyterian Hospital. He ran its sprawling domain for 11 years.

In AI, it's easy to argue about philosophical questions over-much

By: chavenet
9 May 2024 at 04:31
So please, remember: there are a very wide variety of ways to care about making sure that advanced AIs don't kill everyone. Fundamentalist Christians can care about this; deep ecologists can care about this; solipsists can care about this; people who have no interest in philosophy at all can care about this. Indeed, in many respects, these essays aren't centrally about AI risk in the sense of "let's make sure that the AIs don't kill everyone" (i.e., "AInotkilleveryoneism") – rather, they're about a set of broader questions about otherness and control that arise in the context of trying to ensure that the future goes well more generally. from Otherness and control in the age of AGI by Joe Carlsmith

The first essay, "Gentleness and the artificial Other," discusses the possibility of "gentleness" towards various non-human Others – for example, animals, aliens, and AI systems. The second essay, "Deep atheism and AI risk," discusses what I call "deep atheism" – a fundamental mistrust both towards Nature, and towards "bare intelligence." The third essay, "When 'yang' goes wrong," expands on this concern. In particular: it discusses the sense in which deep atheism can prompt an aspiration to exert extreme levels of control over the universe. The fourth essay, "Does AI risk 'other' the AIs?", examines Robin Hanson's critique of the AI risk discourse – and in particular, his accusation that this discourse "others" the AIs, and seeks too much control over the values that steer the future. The fifth essay, "An even deeper atheism," argues that this discomfort should deepen yet further when we bring some other Yudkowskian philosophical vibes into view – in particular, vibes related to the "fragility of value," "extremal Goodhart," and "the tails come apart." The sixth essay, "Being nicer than Clippy," tries to draw on this guidance. In particular, it tries to point at the distinction between a paradigmatically "paperclip-y" way of being, and some broad and hazily-defined set of alternatives that I group under the label "niceness/liberalism/boundaries." The seventh essay, "On the abolition of man," examines another version of that concern: namely, C.S. Lewis's argument (in his book The Abolition of Man) that attempts by moral anti-realists to influence the values of future people must necessarily be "tyrannical." The eighth essay, "On green," examines a philosophical vibe that I (following others) call "green," and which I think contrasts in interesting ways with "deep atheism." The ninth essay, "On attunement," continues the project of the previous essay, but with a focus on what I call "green-according-to-blue," on which green is centrally about making sure that we act with enough knowledge. Related: Why general artificial intelligence will not be realized [Nature] Previously: posting such things on an Internet forum could cause incalculable harm

Google Brings Gemini AI to Cybersecurity

Gemini AI, Google Gemini AI, Google Threat Intelligence

Google has brought together its Gemini AI model with its Mandiant cybersecurity unit and VirusTotal threat Intelligence to enhance threat landscape accessibility and efficiency. The company also plans to use its Gemini 1.5 Pro large language model, released in February, to ease the understanding of threat reports for a broader audience. At the RSA Conference in San Francisco, Google unveiled their latest AI-based solution to add more value to threat intelligence. Tackling the long-standing challenges of fragmented threat landscapes and cumbersome data collection processes, Google Threat Intelligence integrates Mandiant's frontline expertise, real-time contributions from VirusTotal's global community and Google's visibility into extensive user and device footprint to deliver a comprehensive defense against evolving cyber threats. Bernardo Quintero, founder of VirusTotal called this initiative a “sharing knowledge, protecting together” mission, which it has embraced with Google and Mandiant.
“I want to assure our entire community, from security researchers and industry partners to individual users, that VirusTotal's core mission remains unchanged. We remain deeply dedicated to collective intelligence and collaboration, fostering a platform where everyone can come together to share knowledge, access valuable threat information, and contribute to the fight against cyber threats,” Quintero said.
“VirusTotal remains committed to a level playing field, ensuring all partners, including Google Threat Intelligence, have equal access to the crowdsourced data VirusTotal collects. We also want to assure you that the core features and functionalities of VirusTotal will remain free and accessible to everyone, as always,” he added, clearing the air around VirusTotal’s future. “The strength of VirusTotal lies in its network of contributors and the vast amount of data they provide. This data serves as a valuable resource for the entire security industry, empowering our partners and others to enhance their products and contribute to a more secure digital world. This collaborative approach, based on transparency and equal access, strengthens the industry as a whole, ultimately leading to better protection for everyone.”

Challenges Addressed and Google’s Gemini AI Integration

For years, organizations have grappled with two primary hurdles in threat intelligence: a lack of holistic visibility into the threat landscape and the arduous task of collecting and operationalizing intelligence data. Google's new offering aims to address these challenges head-on providing insights and operational efficiency to security teams worldwide. The integration of Gemini, Google's AI-powered agent, enhances the operationalization of threat intelligence, streamlining the analysis process and accelerating response times. Using the Gemini 1.5 Pro large language model, Google claims to significantly reduce the time required to analyze malware attacks. For instance, the model took only 34 seconds to dissect the WannaCry virus and identify a kill switch, demonstrating its efficacy in threat analysis. Another key feature of Gemini AI is its ability to summarize threat reports into natural language, aiding companies in assessing potential attacks' impact and prioritizing responses. Threat Intelligence also offers a comprehensive threat monitoring network, empowering users to gain insights into the cybersecurity landscape and prioritize their defense strategies. Mandiant's experts, acquired by Google in 2022, play a vital role in assessing security vulnerabilities in AI projects through the Secure AI Framework. They conduct rigorous testing to fortify AI models against potential threats like data poisoning, ensuring their resilience against malicious exploitation. While Google is pioneering the integration of AI into cybersecurity, other tech giants like Microsoft are also exploring similar avenues, underscoring the growing significance of AI in safeguarding digital assets against evolving threats. As cyber threats continue to evolve, proactive defense strategies are more critical than ever. With Google Threat Intelligence, organizations can leverage cutting-edge technology to detect, analyze, and mitigate threats effectively, ensuring the security and resilience of their digital infrastructure in an increasingly complex threat landscape.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Environmental Changes Are Fueling Human, Animal and Plant Diseases, Study Finds

8 May 2024 at 11:31
Biodiversity loss, global warming, pollution and the spread of invasive species are making infectious diseases more dangerous to organisms around the world.

© Bill Draker/Rolf Nussbaumer Photography, via Alamy

White-footed mice, the primary reservoir for Lyme disease, have become more dominant in the U.S. as other rarer mammals have disappeared, one potential explanation for rising disease rates.

U.S. Unveiled International Cyberspace and Digital Policy Strategy at RSAC 2024

International Cyberspace and Digital Policy Strategy

The U.S. Secretary of State Antony Blinken unveiled an International Cyberspace and Digital Policy Strategy on Monday, outlining the Biden administration's plan to engage the global community on various technological security issues. Blinken introduced this robust international cyber strategy while delivering a keynote at the RSA cybersecurity conference in San Francisco. The strategic blueprint outlined in the latest strategy displayed the federal government's multifaceted approach to engaging the global community on a wide array of technological security issues, aiming to foster collaboration and cooperation among allies, partners and stakeholders worldwide.

What’s at the Core of the International Cyberspace and Digital Policy Strategy

At the heart of the plan lies the concept of "digital solidarity," characterized by mutual assistance to victims of malicious cyber activity and other digital harms. Digital solidarity entails collaborating on shared goals, capacity building, and mutual support to enhance security, resilience, self-determination, and prosperity. Against the backdrop of ongoing cyberattacks targeting U.S. allies by foreign actors like Russia, China, North Korea and Iran, efforts focus on supporting allies and partners, particularly emerging economies, in harnessing the benefits of digital technologies while sustaining economic and development objectives. The strategy emphasizes alignment with international partners on technology governance, fostering strong partnerships with civil society and the private sector, and promoting cybersecurity resilience through diverse products and services from trusted technology vendors. Moreover, it underscores cooperative efforts to defend and advance human rights and build digital and cyber capacity for long-term resilience and responsiveness. The Department of State, in collaboration with other federal agencies, will advance digital solidarity through four key areas of action supported by three guiding principles:
  1. Promoting an open, inclusive, secure, and resilient digital ecosystem.
  2. Aligning rights-respecting approaches to digital and data governance with international partners.
  3. Advancing responsible state behavior in cyberspace and countering threats through coalition-building and engagement.
  4. Strengthening international partner digital and cyber capacity.
Efforts to forge digital solidarity will be reinforced by active participation in international fora to shape obligations, norms, standards, and principles impacting cyberspace and digital technology issues. Leadership in these venues is crucial to safeguarding U.S. interests and values in the evolving digital landscape. Recognizing the significance of digital diplomacy, the Department of State will lead interagency efforts to coordinate cyber and digital technology diplomacy to advance U.S. national interests and values in the coming decade.

Cybersecurity Threats from Nation States

The strategy addresses the malign activities of nations such as Russia, China, Iran, and North Korea, condemning their exploitative use of technology for nefarious purposes, including hacking and espionage campaigns. It highlights concerns about these countries' efforts to undermine international regulatory frameworks and undercut U.S. technology manufacturers through state-sponsored subsidies. “Cyber criminals and criminal syndicates operating in cyberspace now represent a specific threat to the economic and national security of countries around the world,” the International Cyberspace and Digital Strategy said. “Cybercrime and online fraud cause significant harm to economic development, with small- to medium-sized enterprises and financial service providers especially at risk. According to one estimate, the global cost of cybercrime is estimated to top $23 trillion in 2027.”

AI Technology Governance

The landscape of AI technology governance is intricate, as per the latest strategy. While AI systems offer promising avenues for societal progress, the complexities of geopolitics further compound the challenges and uncertainties in their regulation and management. AI technologies hold immense potential to drive knowledge expansion, boost prosperity, enhance productivity, and tackle pressing global issues. However, the rapid proliferation of AI technologies also presents substantial risks and ethical considerations. These encompass a spectrum of concerns ranging from exacerbating inequality and economic instability to privacy breaches, discriminatory practices, and amplification of malicious cyber activities. Moreover, the dual-use nature of many AI applications poses challenges in ensuring that emerging technologies are not leveraged for nefarious purposes, including disinformation campaigns and military advancements lacking adequate human rights safeguards. Balancing risks and rewards requires safeguarding democratic values, human rights, and fostering international collaboration to harness AI's benefits while mitigating destabilizing impacts. The strategy also warns against complacency in critical technological domains, cautioning that failure to act could enable authoritarian states to shape the future of technology in a manner detrimental to U.S. interests and values. By advocating for concerted efforts to uphold a rights-respecting, open, and secure cyberspace, the United States aims to advance a vision of global governance that safeguards democratic principles and promotes innovation and prosperity.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

80% of All Security Exposures Come from Active Directory Accounts

80% of All Security Exposures Come from Active Directory Accounts

Data sourced from over 40 million exposures that pose high-impact risks to numerous critical business entities revealed that Active Directory typically accounts for 80% of all security exposures identified in organizations. The research from XM Cyber in collaboration with the Cyentia Institute found that identity and credential misconfigurations fuel a striking majority of security exposures across organizations. Among these exposures, a third directly jeopardize critical assets, serving as a prime target for adversaries seeking to exploit vulnerabilities.

Active Directory Exposures Dominate the Attack Surface

Active Directory accounts for over half of entities identified across all environments, as per the report from XM Cyber. Thus, a significant portion of security exposures lies within a company's Active Directory, a vital component for user-network resource connectivity. However, this critical infrastructure also presents an attractive target for attackers as it interests them with additional elevated rights. “An attacker who has compromised an Active Directory account could use it to elevate privileges, conceal malicious activity in the network, execute malicious code and even gain access to the cloud environment,” XM Cyber explained. “Many of these exposures stem from the inherent nature of dynamic configuration issues in Active Directory as well as the challenge of keeping it updated. This creates a blind spot that appears secure on the surface but hides a nest of problems that many security tools can’t see,” the report said. Misconfigurations and credential attacks emerge as the top contributors to these exposures, introducing gaps that traditional security tools often overlook, such as issues in member management and password resets. These issues “present a challenge for nearly every organization,” XM Cyber said. Techniques like credential harvesting, dumping, relay and domain credentials feature prominently in the list of top techniques identified by attack path analysis for AWS, Azure and GCP, and Tools like Mimikatz make these techniques even easier to execute and thus make it extremely popular. Poor practices also make credential-related attack paths more easy and potent. XM Cyber said it identified highly privileged Active Directory credentials cached on multiple machines in 79% of organizations, and one in five of those have admin-level permissions on 100 or more devices. Furthermore, poor endpoint hygiene afflicts the majority of environments, with over 25% of devices lacking EDR coverage or containing cached credentials, offering attackers ample entry points to establish footholds. These overlooked vulnerabilities in identity and endpoint security form a fertile ground for hackers, demanding urgent attention from organizations. Zur Ulianitzky, Vice President of Security Research at XM Cyber, emphasized the necessity of broadening exposure management beyond vulnerabilities to encompass all potential adversary pathways, including misconfigurations and user behavior. The research revealed that a mere 2% of exposures exist on critical 'choke points,' where adversaries exploit vulnerabilities to access crucial assets.

CVEs are a Drop in the Ocean

Despite organizations' focus on managing traditional software vulnerabilities tracked by CVE identifiers, these efforts barely scratch the surface. XM Cyber's analysis uncovered approximately 15,000 exposures per organization, with CVE-based vulnerabilities constituting less than 1% of this extensive exposure landscape. Even concerning exposures affecting critical assets, CVEs represent only a minute fraction, highlighting significant blind spots in security programs fixated solely on vulnerability patching.

Exposed Critical Assets in the Cloud

Active Directory is the largest attack surface, according to XM Cyber, but the largest share of exposures to critical assets is in the cloud. Cloud environments, amidst rapid adoption by organizations, are not immune to exposure risks. Over half (56%) of exposures affecting critical assets are traced back to cloud platforms, presenting a significant threat as attackers seamlessly traverse between on-premises and cloud environments. This fluid movement poses a substantial risk to cloud-based assets, allowing attackers to compromise critical resources with minimal effort.

Exposure Risks Across Sectors

Industry-specific analysis from the report reveals discrepancies in exposure risks across sectors. Industries like Energy and Manufacturing exhibit a higher proportion of internet-exposed critical assets affected by exposures compared to Financial Services organizations, despite the latter's larger digital footprint. Healthcare providers, facing inherent challenges in minimizing risk, contend with a median number of exposures five times higher than the Energy and Utilities sector, emphasizing the need for tailored exposure management strategies. Exposure Management is currently beyond addressing only vulnerabilities and CVEs. Organizations need to adopt a holistic and ongoing Exposure Management approach, incorporating attack path modeling to pinpoint and resolve infrastructure weak points. Emphasis should be placed on tackling identity issues, Active Directory exposures and cloud cyber hygiene, while advocating for tailored solutions according to industry and scale. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Finland Warns of New Android Malware that Siphons Money from your Bank

Android malware campaign

Finland has warned of an ongoing Android malware campaign that targets banking details of its victims by enticing them to download a malicious counterfeit McAfee app. Finland's Transport and Communications Agency – Traficom - issued a warning last week about an ongoing Android malware campaign that aims to withdraw money from the victim's online bank accounts. Traficom said this campaign exclusively targets Android devices, with no separate infection chain identified for Apple iPhone users. The agency has identified multiple cases of SMS messages written in Finnish language, instructing recipients to call a specified number. These messages often impersonate banks or payment service providers like MobilePay and utilize spoofing technology to appear as if they originate from domestic telecom operators or local networks. [caption id="attachment_66875" align="aligncenter" width="1024"]Finnish language smishing message, Android malware campaign Finnish language smishing message (Credit: Traficom)[/caption] The scammers answering these calls direct victims to install a McAfee app under the guise of providing protection. However, the McAfee app being promoted is, in fact, malware designed to compromise victims' bank accounts. According to reports received by the Cyber Security Center, targets are prompted to download a McAfee application via a link provided in the message. This link leads to the download of an .apk application hosted outside the app store for Android devices. Contrary to expectations, this is not antivirus software but malware intended for installation on the phone. The OP Financial Group, a prominent financial service provider in Finland, also issued an alert on its website regarding these deceptive messages impersonating banks or national authorities. The police have similarly emphasized the threat posed by this malware, warning that it enables operators to access victims' banking accounts and initiate unauthorized money transfers. In one reported case, a victim lost 95,000 euros (approximately $102,000) due to the scam.

Vultur Android Malware Campaign Trademarks

While Finnish authorities have not definitively identified the type of malware involved or shared specific hashes or IDs for the APK files, the attacks bear a striking resemblance to those reported by Fox-IT analysts in connection with a new version of the Vultur trojan. [caption id="attachment_66873" align="alignnone" width="1024"]Vultur Trojan infection chain Vultur Trojan infection chain (Credit: Fox-IT)[/caption] The new iteration of the Vultur trojan employs hybrid smishing and phone call attacks to persuade targets into downloading a fake McAfee Security app. This app introduces the final payload in three separate parts for evasion purposes. Notable features of this latest version include extensive file management operations, abuse of Accessibility Services, app blocking, disabling Keyguard, and serving custom notifications in the status bar.

Things to Do If You Suspect Being Victim

If you suspect that your device has been infected with the malware, it is advisable to contact your bank immediately to enable protection measures. Additionally, restoring "factory settings" on the infected Android device to wipe all data and apps is recommended. OP Financial Group emphasizes that they do not request customers to share sensitive data over the phone or install any apps to receive or cancel payments. “We will never send you messages with a link to the online bank login page. The bank also never asks you for your ID or card information via messages. Such messages are scams and you should not click on the links in them,” the OP Financial Group said. “Even in order to receive or cancel a payment, you do not need to log in from a link, confirm with codes or provide your information. If you are asked to do this, contact the bank's customer service.” Any similar requests should also be promptly reported to the police. The news of the online banking fraud comes days after a multi-national police operation crack opened a massive fraudulent call center network run across Europe that targeted especially senior citizens with an intent to dupe them of thousands of dollars. The crack down, dubbed Operation Pandora, was initiated when a vigilant bank teller in Freiburg, Germany, alerted law enforcement of a customer aged 76-years attempting to withdraw a large sum of money. Scammers employed various tactics, posing as relatives, bank employees or police officers, to deceive victims into surrendering their savings. The operation revealed call centers operating in different countries, each specializing in different types of telephone fraud, from investment scams to debt collection demands. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Six Australian MPs Confirm They were Targeted by China’s APT31 Hackers

APT31, Australian Parliament

Six Australian Members of the Parliament confirmed today that they were targeted by Chinese-state hackers APT31 in a brazen cyberattack whose aim was to gather intelligence on these individuals. The Inter-Parliamentary Alliance on China whose members were victims of this hacking attempt said, “The politicians confirmed details with both the IPAC Secretariat and the Australian Government.”
“The apparent intention [of the cyberattack] was to garner sufficient information to mount more sophisticated follow-on attacks, escalating in severity.”
Those targeted included Senator James Paterson, Senator Claire Chandler, Senator Alex Antic, David Smith MP, Daniel Mulino MP and Tim Wilson MP.

Security Agencies Chose to Remain Tight-Lipped

Australia’s security agencies reportedly received two warnings about Chinese hackers targeting Australian MPs, but they chose not to inform the lawmakers about the cyberattacks. “It is staggering that both the targeted members of parliament and the broader Australian public have been kept in the dark about a direct attempt at cyber interference against Australian parliamentarians,” Senator Claire Chandler said.
“Incredibly, despite Australian authorities being notified of this hacking attempt in 2022, agencies did not alert my colleagues and I that we had been targeted.It’s unacceptable that this information was withheld from us for two years,” Chandler added.
The Five Eyes intelligence agency reportedly alerted Australia’s security agencies in mid-2021 about attacks that occurred earlier in January. Then, in June 2022, the FBI officially notified Australian authorities about attempts by the Chinese hacking group APT31 to target six Australian MPs. However, the agencies opted against informing the Government or the affected MPs. The IPAC, consisting of 20 Australian MPs, only became aware of the attempted attack when the US Department of Justice indicted seven Chinese hackers in April this year -three years after the initial warning. The National Cyber Security Centre of the United Kingdom also called out the Chinese APT31 actors for their malicious cyber targeting of UK’s democratic institutions and parliamentarians earlier in March. Following this revelation, MPs demanded an explanation from the Australian Security Intelligence Organisation regarding the lack of notification. After receiving a briefing, they released a joint statement today expressing outrage and demanding a robust response to protect Australian sovereignty. “We were not informed by Australian agencies at any time since 2021 about this targeting,” the statement from IPAC members targeted by APT31 said.
“This was not an attack on any single party or House of Parliament. This was an attack on Australian parliamentarians from both Houses and both parties who have dared to exercise their legitimate democratic right to criticize Beijing. As such, it was an attack on Parliament as a whole and demands a robust and proportionate response,” the IPAC members’ statement said.
“It is very worrying for our democracy that elected members of parliament have been targeted by PRC-state sponsored hacking attempts specifically because we have expressed concern about the behavior of the PRC, including human rights violations in Xinjiang and coercive behavior against Australia,” Senator Claire Chandler said. “It is in Australia’s national interest for Australians to be properly informed about the behavior of the PRC government. The withholding of information about the targeting of Australian elected representatives by state-affiliated cyber criminals means that Australians have been given a misleading impression of the PRCs behavior towards our country,” Chandler added. The targeted IPAC members insisted on being informed about future attempts to target them by state-sponsored groups, for which they have received an assurance from the government.
“I welcome the assurance that in future agencies will inform MPs about any attempts by state-sponsored cyber actors to target parliamentarians,” Senator Claire Chandler said.
The Australian agencies likely refrained from informing MPs because they considered the attacks crude and unsuccessful, according to Austrlian news agency The Nightly. Moreover, they occurred during a period when MPs and the public were already being cautioned to enhance their cybersecurity. Paterson, who is also the co-chair of IPAC Australia, denounced the attempted hack.
“Targeting parliamentarians, as the CCP has done, is not the act of a friend. It is yet another obstacle to a normal bilateral relationship. We should never hesitate to call out this behavior or be afraid to impose real costs to deter it,” he tweeted.

APT31 Used Pixel Tracking Emails

APT31 hackers targeted MPs with pixel tracking emails from a domain pretending to be a news outlet. If opened, these emails tracked the recipients' online behavior. According to the FBI's indictment released last month, the hackers spammed various government individuals worldwide associated with IPAC, with more than 10,000 malicious emails that also exploited zero-days and resulted in potential compromise of economic plans, intellectual property and trade secrets. Last month, FBI Director Christopher Wray highlighted the magnitude of Chinese hacking, stating that it surpassed that of every other major nation combined. He underscored the overwhelming scale of Chinese cyber operations, indicating the challenges faced by law enforcement in countering these threats. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

How To Know When a Good Dog Has Gone Bad

5 May 2024 at 20:15
Gov. Kristi Noem suggested that President Biden should have euthanized the family dog, as she did. Animal experts said that such an option should be a last resort.

© Carolyn Kaster/Associated Press

President Biden’s dog, Commander, a German shepherd, being walked outside the West Wing of the White House last year.

Witty song from "Fiorello" the Broadway musical.

By: Czjewel
4 May 2024 at 05:42
The great Howard DaSilva performs the showstopping number "Little Tin Box" Fiorello! is a musical about New York City mayor Fiorello La Guardia, a reform Republican, which debuted on Broadway in 1959, and tells the story of how La Guardia took on the Tammany Hall political machine. The book is by Jerome Weidman and George Abbott, drawn substantially from the 1955 volume Life with Fiorello by Ernest Cuneo, with lyrics by Sheldon Harnick, and music by Jerry Bock.

It won the three major theatre awards - Tony Award (shared with The Sound of Music), the New York Drama Critics Circle award, and the Pulitzer Prize for Drama. It is one of only ten musicals to win the latter award. As a side note Mr. DaSilva was blacklisted for many years by Hollywood In 1947, his career was threatened when the House Un-American Activities Committee (HUAC) began its investigation into alleged Communist influence of Hollywood. Actor Robert Taylor, called as a "friendly witness", accused many of his fellow actors and writers of either being communists or having communist sympathies. When questioned about da Silva, Taylor said, "I can name a few who seem to sort of disrupt things once in a while. Whether or not they are communists I don't know. One chap we have currently, I think is Howard da Silva. He always seems to have something to say at the wrong time."

Massive Data Breach Affects Victims of Family Violence and Sexual Assault in Victoria

Monash Health Data Breach

A cyberattack targeting a Victorian company has resulted in the exposure of personal data belonging to thousands of victims of family violence and sexual assault, as well as about 60,000 current and former students at Melbourne Polytechnic.

Monash Health Data Breach

Monash Health, the state's largest health service, confirmed it was caught in the cross-hairs of a data breach, which also affected government entities that were clients of the company ZircoDATA.
Monash Health, Victoria's largest health service, found itself entangled in the aftermath of a data breach, which compromised sensitive information collected by family violence and sexual support units between 1970 and 1993. The breach, attributed to an unauthorized third party gaining access to the systems of document-scanning business ZircoDATA, impacted approximately 4000 individuals who had sought support from these vital services. The disclosure of details about the sexual violence and assault support units has been deeply distressing for affected victim-survivors. The breach, which involved personal data collected over decades, has raised concerns about the safety and privacy of those who relied on these support services during times of vulnerability. Amid the fallout from the breach, efforts have been underway to mitigate the risks and support those affected. Monash Health, in collaboration with relevant authorities, has been diligently verifying the identities and addresses of the impacted individuals before initiating contact, ensuring that victims are not inadvertently exposed to further harm.
“The majority of these entities are still in the process of working with ZircoDATA to identify impacted data and any victims, and are yet to begin notifying impacted individuals,” newly appointed coordinator Lieutenant-General Michelle McGuinness said in a statement on X.
In addition to Monash Health, other government entities that were clients of ZircoDATA have also been affected by the breach but “the impact for most government entities is likely to be minimal,” the National Cyber Security Coordinator said. The breach has prompted federal authorities, including the Australian Federal Police, to launch investigations and coordinate responses to address the scope of the incident and safeguard affected individuals.

ZircoDATA Breach Also Impacts Melbourne Polytechnic

Meanwhile, Melbourne Polytechnic, a prominent educational institution, announced that enrollment information for 60,000 past and present students, stored by ZircoDATA, had been accessed in the breach. Although the breach primarily involved "low-risk identity attributes," the institution has taken proactive steps to offer affected individuals access to cyber support and identity services. The cybersecurity landscape continues to evolve rapidly, with healthcare emerging as one of the sectors most vulnerable to cyberattacks. A recent report by cybersecurity firm Sophos revealed that healthcare was one of only five sectors to report an increase in cyberattacks over the last year, highlighting the urgent need for heightened vigilance and resilience in safeguarding sensitive data and critical infrastructure. As organizations grapple with the aftermath of data breaches, there is a pressing need to strengthen cybersecurity measures and response protocols to effectively mitigate risks and protect individuals' privacy and security. Collaborative efforts between government agencies, healthcare providers, educational institutions, and cybersecurity experts are essential in addressing the complex challenges posed by cyber threats and ensuring the resilience of our digital infrastructure. In the wake of this cyberattack, authorities have emphasized the importance of transparency, accountability, and support for those affected. By prioritizing the safety and well-being of individuals impacted by data breaches, we can collectively work towards building a more secure and resilient digital ecosystem that safeguards the privacy and security of all stakeholders. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
❌
❌