DataBreachToday.com
AI Rise: Can We Still Trust What We See?
1 year ago
AI-Powered Social Engineering and Deepfake Threats in 2025
Security researchers predict threat actors will use artificial intelligence and large language models to enhance phishing attacks and create convincing fake personas, while defensive AI enters a new phase of semiautonomous operations.
Security researchers predict threat actors will use artificial intelligence and large language models to enhance phishing attacks and create convincing fake personas, while defensive AI enters a new phase of semiautonomous operations.
Still-Lucrative Ransomware's Profits Plunged 35% Last Year
1 year ago
Collapse of LockBit and BlackCat/ALPHV Tied to Ongoing Decline in Big-Game Hunting
Ransomware may still be raking in massive cryptocurrency profits for practitioners, but 2024 turned out to be less of a banner year than predicted, with blockchain researchers reporting that the sum total of known ransom payments to ransomware groups in 2024 plummeted by 35%.
Ransomware may still be raking in massive cryptocurrency profits for practitioners, but 2024 turned out to be less of a banner year than predicted, with blockchain researchers reporting that the sum total of known ransom payments to ransomware groups in 2024 plummeted by 35%.
Cryptohack Roundup: Critical Ethereum Vulnerability
1 year ago
Also: Conviction in £1.5M Fraud, Sentencing in Torture and Theft Case
This week's stories include a critical Ethereum vulnerability, conviction in a £1.5M fraud, sentencing in a torture and crypto theft case, SEC's new roadmap, Jan crypto stats, Coinbase social engineering victims, and U.S. lawmakers' digital assets working group.
This week's stories include a critical Ethereum vulnerability, conviction in a £1.5M fraud, sentencing in a torture and crypto theft case, SEC's new roadmap, Jan crypto stats, Coinbase social engineering victims, and U.S. lawmakers' digital assets working group.
Ransomware: Victims Who Pay a Ransom Drops to All-Time Low
1 year ago
Incident Response Firm Reports 25% of Victims Paid - Typically for a Decryptor
The slice of organizations opting to pay extortion after being hit by ransomware dropped to an all-time low of 25%. Underpinning the drop is a combination of better defenses, improved business resilience as well as organizations simply deciding to not pay criminals.
The slice of organizations opting to pay extortion after being hit by ransomware dropped to an all-time low of 25%. Underpinning the drop is a combination of better defenses, improved business resilience as well as organizations simply deciding to not pay criminals.
Thailand to Cut Off Power to Scam Centers - Will It Work?
1 year ago
Officials Hope to Curb Global Fraud by Targeting Border Operations in Myanmar
In a drastic move to curb fraud along the Myanmar border, Thailand announced plans to cut power and telecommunications in border areas of Myanmar linked to scam operations. The move is aimed at crippling criminal syndicates running notorious call centers that orchestrate scams, financial fraud and human trafficking.
In a drastic move to curb fraud along the Myanmar border, Thailand announced plans to cut power and telecommunications in border areas of Myanmar linked to scam operations. The move is aimed at crippling criminal syndicates running notorious call centers that orchestrate scams, financial fraud and human trafficking.
Mental Malware: Overcoming Self-Doubt That Holds You Back
1 year ago
Mitigate Career Risk With a Self-Audit, Targeted Training and Real-World Testing
Changing jobs or going after that promotion can be difficult, even in a field like cybersecurity where the demand for skilled professionals is high. Often, the biggest career challenge is not that advanced persistent threat or the zero-day vulnerability. It's what we call "mental malware."
Changing jobs or going after that promotion can be difficult, even in a field like cybersecurity where the demand for skilled professionals is high. Often, the biggest career challenge is not that advanced persistent threat or the zero-day vulnerability. It's what we call "mental malware."
Why You Need Both Threat Detection And Threat Hunting: Best Defense and Offense Practices
1 year ago
Forrester: DeepSeek's Security, Privacy, Geopolitical Risks
1 year ago
Analyst Allie Mellen on Open-Source AI Adoption, Vendor Considerations, Data Risks
AI adoption is accelerating across security operations, but DeepSeek has introduced security, privacy, and geopolitical risks that organizations should carefully assess. Forrester's Allie Mellen shares advice on AI adoption by cybersecurity, third-party risks and data protection.
AI adoption is accelerating across security operations, but DeepSeek has introduced security, privacy, and geopolitical risks that organizations should carefully assess. Forrester's Allie Mellen shares advice on AI adoption by cybersecurity, third-party risks and data protection.
Five Eyes Releases Guidance on Securing Edge Devices
1 year ago
Guidance Intended to Help Companies Detect Compromises Faster
Countries forming the Five Eyes intelligence alliance outlined Tuesday minimum security requirements that edge device vendors should follow to enable swifter forensics analysis in the wake of cyberattacks. Edge devices have become the repeated target of nation-state hackers.
Countries forming the Five Eyes intelligence alliance outlined Tuesday minimum security requirements that edge device vendors should follow to enable swifter forensics analysis in the wake of cyberattacks. Edge devices have become the repeated target of nation-state hackers.
Ex-HIPAA Officer: State Illegally Shared PHI for Research
1 year ago
Lawsuit Claims R.I. Health Information Exchange Retaliated Against 'Whistleblower'
The former HIPAA compliance officer of Rhode Island's state health information exchange is suing the organization in a federal lawsuit claiming that she was terminated from her job after blowing the whistle on the HIE's alleged unlawful disclosures of patient information for research purposes.
The former HIPAA compliance officer of Rhode Island's state health information exchange is suing the organization in a federal lawsuit claiming that she was terminated from her job after blowing the whistle on the HIE's alleged unlawful disclosures of patient information for research purposes.
White House Defends Musk Amid Sensitive Data Access Uproar
1 year ago
Lawmakers Warn of Security Risks as DOGE is 'Running Roughshod' in Federal Systems
Democrats on Capitol Hill are calling on the White House to provide transparency into billionaire Elon Musk's attempts to shrink the U.S. government after reports indicated his unvetted aides gained access to key federal systems containing troves of sensitive data on millions of Americans.
Democrats on Capitol Hill are calling on the White House to provide transparency into billionaire Elon Musk's attempts to shrink the U.S. government after reports indicated his unvetted aides gained access to key federal systems containing troves of sensitive data on millions of Americans.
Live Webinar | Accelerating Secure DevOps: Proven Practices
1 year ago
Okta Carries Out Another Round of Layoffs, Axing 180 Workers
1 year ago
3rd Round of Layoffs in 3 Years Comes as Rival CyberArk Surpasses Okta's Valuation
Okta will execute its third round of layoffs in three years, cutting 180 employees to reallocate resources toward priorities to drive growth. The San Francisco-based identity security giant on Tuesday shared plans to reduce its staff by 3% in what has become somewhat of an annual tradition for Okta.
Okta will execute its third round of layoffs in three years, cutting 180 employees to reallocate resources toward priorities to drive growth. The San Francisco-based identity security giant on Tuesday shared plans to reduce its staff by 3% in what has become somewhat of an annual tradition for Okta.
Meta Plans to Restrict High-Risk AI Models
1 year ago
'Frontier AI Framework' Identifies Risk Categories, Action Plan
Meta has set new limits on the release of its advanced artificial intelligence models, establishing a framework detailing the criteria for restricting systems deemed too dangerous for public release. Meta's Frontier AI Framework identifies two risk categories: high and critical.
Meta has set new limits on the release of its advanced artificial intelligence models, establishing a framework detailing the criteria for restricting systems deemed too dangerous for public release. Meta's Frontier AI Framework identifies two risk categories: high and critical.
3 Health Groups Report 2024 Hacks Affecting 1.2 Million
1 year ago
Attacks Hit Hospitals, Clinics in California, Alabama and Colorado
Three healthcare entities - including a California hospital and outpatient care provider, an Alabama cardiology practice, and a Colorado community health system, are notifying a total of more than 1.2 million individuals that their sensitive information was compromised in 2024 hacks.
Three healthcare entities - including a California hospital and outpatient care provider, an Alabama cardiology practice, and a Colorado community health system, are notifying a total of more than 1.2 million individuals that their sensitive information was compromised in 2024 hacks.
Reimagining KYC to Meet Regulatory Scrutiny
1 year ago
FIs Expected to Move from Periodic Reviews to Perpetual KYC
Banks are struggling to keep up with evolving KYC expectations. Despite efforts to modernize, outdated processes continue to leave compliance gaps, leading to increased regulatory action. Penalties for financial institutions surged with KYC-related fines more than doubling to $51 million.
Banks are struggling to keep up with evolving KYC expectations. Despite efforts to modernize, outdated processes continue to leave compliance gaps, leading to increased regulatory action. Penalties for financial institutions surged with KYC-related fines more than doubling to $51 million.
AttackIQ Strengthens Security Testing With DeepSurface Buy
1 year ago
Purchase Enhances Exposure Validation and Breach Simulation
AttackIQ has acquired Deep Surface to bolster its adversary exposure validation capabilities. The deal integrates vulnerability prioritization, identity discovery, and attack path analysis into AttackIQ’s breach and attack simulation platform, improving cybersecurity posture for enterprises.
AttackIQ has acquired Deep Surface to bolster its adversary exposure validation capabilities. The deal integrates vulnerability prioritization, identity discovery, and attack path analysis into AttackIQ’s breach and attack simulation platform, improving cybersecurity posture for enterprises.
DeepSeek Blocked In US Federal Agencies
1 year ago
Security Concerns, Chinese Ownership Drive Concerns
U.S. federal agencies and corporations with ties to the government are blocking employees from using Chinese chatbot DeepSeek over security and privacy concerns. China could potentially use DeepSeek AI models to spy on American citizens, acquire proprietary secrets and conduct influence campaigns.
U.S. federal agencies and corporations with ties to the government are blocking employees from using Chinese chatbot DeepSeek over security and privacy concerns. China could potentially use DeepSeek AI models to spy on American citizens, acquire proprietary secrets and conduct influence campaigns.
New Microsoft Unit to Navigate Impact of AI
1 year ago
'Advanced Planning Unit' to Focus on Societal, Economic, Workplace Implications
Microsoft has created a new research-focused entity as part of its artificial intelligence division to analyze and anticipate the technology's societal, economic and workplace implications. It will report directly to Mustafa Suleyman, CEO of Microsoft AI.
Microsoft has created a new research-focused entity as part of its artificial intelligence division to analyze and anticipate the technology's societal, economic and workplace implications. It will report directly to Mustafa Suleyman, CEO of Microsoft AI.
Checked
12 hours 27 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed