Information Security

Related News

Morning Headlines 11/20/24

  • Mr. HIStalk
  • Published date: 2024-11-19 23:04:14

Review of the Department of Health and Human Services’ Compliance ...

Review of the Department of Health and Human Services Compliance with the Federal Information Security Modernization Act of 2014 for Fiscal Year 2024 HHS OIG rates HHSs information security program … [+989 chars]

Russian Phobos ransomware operator faces cybercrime charges

  • Pierluigi Paganini
  • Published date: 2024-11-19 22:36:29

Russian Phobos ransomware operator Evgenii Ptitsyn, accused of managing attacks, was extradited from South Korea to the US to face cybercrime charges. Russian Phobos ransomware operator Evgenii Ptitsyn, suspected of playing a key role in the ransomware operat…

Russian Phobos ransomware operator faces cybercrime charges  | Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals  | Recently disclosed VMware vCenter Server bugs a… [+117460 chars]

News 11/20/24

  • Mr. HIStalk
  • Published date: 2024-11-19 22:33:38

Top News HHS OIG rates HHS’s information security program as ...

Top News HHS OIG rates HHSs information security program as not effective in its annual review, the same rating it gave HHS last year. OIG made six recommendations to HHS: <ol><li>Update its inve… [+6231 chars]

Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence

  • Michael Wright
  • Published date: 2024-11-19 21:45:22

The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure by Design Pledge” for enterprise software manufacturers, focusing on improving the security of their products and services. This pledge outlines seven key principle…

The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure by Design Pledge” for enterprise software manufacturers, focusing on improving the security of their pro… [+7034 chars]

Using AI to Prevent Unauthorized Access in Complex IT Ecosystems

  • Dariia Herasymova
  • Published date: 2024-11-19 20:25:38

AI is invaluable for cybersecurity professionals trying to help stop unauthorized access to their complex IT ecosystems.

AI is revolutionizing cybersecurity, making it quicker, smarter, and far more able to adapt to novel challenges. It rapidly analyzes massive volumes of data to identify uncommon patterns or behavior … [+6471 chars]

Defence automates IT access removal for ex-employees

  • None
  • Published date: 2024-11-19 20:12:11

Comes amid inquiry into unauthorised IT system access across federal government.

Defence has automated the removal of IT systems access for exiting employees and contractors amid an inquiry into IT governance within federal government. Known as the ‘Defence Account Retirement Se… [+1594 chars]

Behavioral change platform Vitality acquires coaching provider WellSpark

  • None
  • Published date: 2024-11-19 19:35:03

Vitality will integrate WellSpark's coaching tools to enhance the services it offers employers and health plans.

UK-based Vitality, which offers tools to promote positive behavioral change in patients, announced its acquisition of U.S.-based coaching platform WellSpark.  WellSpark was formed out of EmblemHealt… [+2118 chars]

How AI in Retail Is Enhancing Efficiency, Freeing Retailers From ‘Excel Hell’

  • Arthur Zaczkiewicz
  • Published date: 2024-11-19 18:55:15

Max Ma and Lauren Taubes highlight the company’s commitment to breaking down operational silos and enhancing collaboration

Since its inception, 7thonline has worked to revolutionize the retail and wholesale industry by integrating advanced data science with more than 25 years of business acumen. Founded by Max Ma, a form… [+10902 chars]

Prosecutors urge judge to consider postponing Trump's sentencing

  • Graham Kates
  • Published date: 2024-11-19 18:24:58

President-elect Donald Trump's six-year New York criminal odyssey might need to continue for at least another four, prosecutors said Tuesday.

President-elect Donald Trump's six-year New York criminal odyssey might need to continue for at least another four, prosecutors said Tuesday.  Lawyers for Manhattan District Attorney Alvin Bragg wro… [+4189 chars]

Information Warfare Spreading Chaos: A Guide To Outsmarting Fake News

  • Alex Vakulov, Contributor, Alex Vakulov, Contributor https://www.forbes.com/sites/alexvakulov/
  • Published date: 2024-11-19 17:38:52

Uncover the tactics behind information warfare, from fake news to social media manipulation. Learn how to identify disinformation and protect yourself from these threats.

Zombie people with an old tv instead of head. Television manipulation and crowd control. getty Information warfare is the targeted use of information and mass media to influence public opinion, po… [+7335 chars]

YC-backed Formal brings a clever security reverse-proxy out of stealth | TechCrunch

  • Romain Dillet
  • Published date: 2024-11-19 17:01:53

Formal is a security startup coming out of stealth on Tuesday with a nice list of investors and an interesting product positioning. The company has

Formal is a security startup coming out of stealth on Tuesday with a nice list of investors and an interesting product positioning. The company has designed a reverse-proxy for data stores and APIs s… [+3346 chars]

Could You Get $10,000 From 23andMe's Data Breach Settlement? Here's What to Know

  • Thomas Kika
  • Published date: 2024-11-19 16:45:00

Nearly 7 million of 23andMe's customers were exposed in a recent data leak. Now they -- and potentially, you -- could be in line for a major payout.

DNA-testing company 23andMe said it will settle a $30 million class-action lawsuit accusing it of failing to sufficiently protect its users, after a data breach exposed the personal information of ro… [+4047 chars]

IONIX Cloud Exposure Validator Tames the Storm of Cloud Security Alerts; Brings CTEM to the World of Cloud Security

  • David
  • Published date: 2024-11-19 16:27:00

IONIX announced the launch of its Cloud Exposure Validator to help security teams manage the overwhelming volume of alerts generated by Cloud Security Platforms such as Wiz, Palo Alto Prisma Cloud and others.

IONIX announced the launch of its Cloud Exposure Validator to help security teams manage the overwhelming volume of alerts generated by Cloud Security Platforms such as Wiz, Palo Alto Prisma C… [+4742 chars]

Managing Risk in Turbulent Times (Nicole Pienkos)

  • Editorial Team
  • Published date: 2024-11-19 16:22:03

The expanded scope of risk management in banking Chief Risk Officers (CROs) must stay vigilant on c...

The expanded scope of risk management in banking Chief Risk Officers (CROs) must stay vigilant on current threats and risk issues while also keeping an eye on future risk management trends. Bankers … [+4644 chars]

Most GenAI Use in Enterprises is Unregulated, Unlicensed

  • David
  • Published date: 2024-11-19 15:52:00

72% of workers uploading company data to GenAI lack employer licenses, 65% of companies have no GenAI policies in place

Enterprises are facing a growing data security risk from the unregulated use of generative artificial intelligence (GenAI) platforms, according to new research previewed today by data resilience … [+2196 chars]

Microsoft to offer hackers millions in Zero Day Quest event

  • Alexander Culafi
  • Published date: 2024-11-19 15:37:00

Microsoft launched Zero Day Quest on Tuesday with a preliminary event offering bug bounty researchers rewards with multipliers for select security scenarios.

Microsoft on Tuesday unveiled Zero Day Quest, a bug bounty event offering up to $4 million in rewards to security researchers. The announcement was one of several related to security at this year's … [+3635 chars]

US space tech firm Maxar says employee personal data leaked in hack

  • Sead Fadilpašić
  • Published date: 2024-11-19 15:10:00

A hacker with a Hong Kong address lurked on Maxar servers for a week, stealing sensitive employee information.

<ul><li>Maxar notifies California Attorney General of data breach</li><li>It says sensitive employee data was stolen in the attack</li><li>The attacker used a Hong Kong address to breach the systems<… [+2404 chars]

China-linked actor’s malware DeepData exploits FortiClient VPN zero-day

  • Pierluigi Paganini
  • Published date: 2024-11-19 15:05:27

Chinese threat actors use custom post-exploitation toolkit ‘DeepData’ to exploit FortiClient VPN zero-day and steal credentials. Volexity researchers discovered a vulnerability in Fortinet’s Windows VPN client that China-linked threat actor BrazenBamboo abuse…

Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals  | Recently disclosed VMware vCenter Server bugs are actively exploited in attacks  | Foreign adversary hacked em… [+117396 chars]

Number of older adults who lost $100,000 or more to fraud has tripled since 2020, FTC says

  • Greg Iacurci, CNBC
  • Published date: 2024-11-19 15:02:44

The number of older Americans who report losing more than $100,000 to fraud in a given year has more than tripled since 2020, according to the Federal Trade Commission, a trend that experts say represents a grave and growing threat to older adults’ financial …

The number of older Americans who report losing more than $100,000 to fraud in a given year has more than tripled since 2020, according to the Federal Trade Commission, a trend that experts say repre… [+4988 chars]

Data breach exposes over 56 million clothing store customers

  • Kurt Knutsson, CyberGuy Report
  • Published date: 2024-11-19 15:00:15

Breach site confirmed 56,904,909 Hot Topic users' data leaked online. Tech expert Kurt “CyberGuy" Knutsson says the company's silence makes matters even worse.

A cybersecurity vendor claimed last month that a hacker stole data from the fashion retailer Hot Topic, including the personal information of millions of customers. At that time, there was no confirm… [+6603 chars]

Ionix unveils Cloud Exposure Validator to streamline cloud security alert management

  • Duncan Riley
  • Published date: 2024-11-19 14:00:48

Israeli attack surface management startup Ionix Inc. today announced the launch of Cloud Exposure Validator, a new tool to help security teams manage alerts generated by cloud security platforms. The Validator analyzes and reprioritizes alerts from cloud secu…

Israeli attack surface management startup Ionix Inc. today announced the launch of Cloud Exposure Validator, a new tool to help security teams manage alerts generated by cloud security platforms. Th… [+3949 chars]

Communication platforms play a major role in data breach risks

  • Jennifer Gregory
  • Published date: 2024-11-19 14:00:00

Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it comes…

Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially tr… [+6078 chars]

Enhancing Traveler Data Security: Best Practices for Managing Sensitive Info

  • Owais Sultan
  • Published date: 2024-11-19 13:58:28

Protect traveler data with these tips: use VPNs, manage app permissions, and secure travel documents. Travel companies should…

Protect traveler data with these tips: use VPNs, manage app permissions, and secure travel documents. Travel companies should encrypt data, follow transparency, and conduct audits. The travel indust… [+7673 chars]