DataBreachToday.com
AI Browsers Vulnerable to Data Theft, Malware
4 months 1 week ago
AI Actions Bypass Security Tools
Artificial intelligence-powered browsers could expose enterprises to data theft, malware distribution and unauthorized access to corporate apps, new research shows. AI browsers built to complete tasks autonomously lack the security awareness to verify whether an instruction is safe.
Artificial intelligence-powered browsers could expose enterprises to data theft, malware distribution and unauthorized access to corporate apps, new research shows. AI browsers built to complete tasks autonomously lack the security awareness to verify whether an instruction is safe.
ISMG Editors: How the US Federal Shutdown Exposes Cyber Gaps
4 months 1 week ago
Also: Shutdown's Ripple Effects on Healthcare, Mounting Threats to Aging OT Systems
In this week's update, four ISMG editors discussed the fallout from the U.S. federal shutdown and the impact on state and regional cyber offices, the knock-on effects for healthcare, and the growing cyberthreats facing aging operational technology environments.
In this week's update, four ISMG editors discussed the fallout from the U.S. federal shutdown and the impact on state and regional cyber offices, the knock-on effects for healthcare, and the growing cyberthreats facing aging operational technology environments.
SonicWall Warns Cloud Backup Users of Security Risk
4 months 1 week ago
Akira Ransomware Hackers Targeting SonicWall Devices
Firewall maker SonicWall said Friday all customers who used its cloud backup services are at increased "risk of targeted attacks" following a recent cyberattack. The California firm in September disclosed that unidentified hackers launched brute-force attacks against servers storing backup files.
Firewall maker SonicWall said Friday all customers who used its cloud backup services are at increased "risk of targeted attacks" following a recent cyberattack. The California firm in September disclosed that unidentified hackers launched brute-force attacks against servers storing backup files.
ALN, Octapharma Plasma Agree to Settle Breach Lawsuits
4 months 1 week ago
2 Firms Hit by Separate 2024 Attacks to Pay Total of $6.5M in Class Action Claims
A Nebraska-based revenue cycle management firm and a Swiss-based blood products manufacturer with plasma collection centers in the United States are the latest healthcare sector companies agreeing to pay multimillion dollar lawsuit settlements for two separate 2024 hacks affecting scores of patients.
A Nebraska-based revenue cycle management firm and a Swiss-based blood products manufacturer with plasma collection centers in the United States are the latest healthcare sector companies agreeing to pay multimillion dollar lawsuit settlements for two separate 2024 hacks affecting scores of patients.
Pentera Acquires DevOcean to Streamline Vulnerability Fixes
4 months 1 week ago
Pentera-DevOcean Platform to Deliver Unified Attack Simulation and Remediation
Pentera has acquired DevOcean to close a major operational gap in threat resolution. With AI-based prioritization and remediation orchestration across over 100 tools, Pentera is building a unified platform to address both attack simulation and fix deployment.
Pentera has acquired DevOcean to close a major operational gap in threat resolution. With AI-based prioritization and remediation orchestration across over 100 tools, Pentera is building a unified platform to address both attack simulation and fix deployment.
Chinese-Linked Hackers Breach Top Political US Law Firm
4 months 1 week ago
Williams & Connolly Hit in Zero-Day Campaign Impacting Client Emails
A zero-day vulnerability was used to breach email accounts at the elite D.C. law firm Williams & Connolly, with officials reportedly suspecting the hack is part of a China-linked campaign targeting the U.S. legal sector to support espionage, steal intelligence and establish long-term access routes.
A zero-day vulnerability was used to breach email accounts at the elite D.C. law firm Williams & Connolly, with officials reportedly suspecting the hack is part of a China-linked campaign targeting the U.S. legal sector to support espionage, steal intelligence and establish long-term access routes.
Breach Roundup: Insurers Spend Big on Cybersecurity
4 months 1 week ago
Also, a Renault Breach, WhatsApp Malware and Qilin Claims Asahi Attack
This week, insurer cybersecurity spending, a Renault breach, a WhatsApp malware campaign in Brazil. Germany skeptical of Chat Control. Two UK teens arrested for ransomware attack. Qilin claimed the attack on Japan's Asahi. Hackers weaponized Nezha. An Invoice data breach exposed personal records.
This week, insurer cybersecurity spending, a Renault breach, a WhatsApp malware campaign in Brazil. Germany skeptical of Chat Control. Two UK teens arrested for ransomware attack. Qilin claimed the attack on Japan's Asahi. Hackers weaponized Nezha. An Invoice data breach exposed personal records.
Australia Levies First-Ever Privacy Act Fine in Lab Breach
4 months 1 week ago
Australian Clinical Labs Ordered to Pay $5.8M in Data Theft at Medlab Pathology Unit
An Australian court has fined a medical lab $5.8 million for cybersecurity failures leading up to - and following - a 2022 cyberattack that affected 223,000 patients. The penalty marked the first time Australia has levied a civil monetary fine for violations of its Privacy Act of 1988.
An Australian court has fined a medical lab $5.8 million for cybersecurity failures leading up to - and following - a 2022 cyberattack that affected 223,000 patients. The penalty marked the first time Australia has levied a civil monetary fine for violations of its Privacy Act of 1988.
GitHub Copilot Chat Flaw Let Private Code Leak Via Images
4 months 1 week ago
Researcher Found Bug Could Exfiltrate Secrets Via Camo Images
A now-patched flaw in GitHub Copilot Chat could have allowed attackers to steal private source code and secrets by embedding hidden prompts that hijacked the artificial intelligence assistant's responses. The exploit also used the code hosting platform's image proxy to leak the stolen data.
A now-patched flaw in GitHub Copilot Chat could have allowed attackers to steal private source code and secrets by embedding hidden prompts that hijacked the artificial intelligence assistant's responses. The exploit also used the code hosting platform's image proxy to leak the stolen data.
Live Webinar | End-of-Life Failures: The Compliance Trap You Must Avoid
4 months 1 week ago
Reading the Fine Print When Managing Vendor Risk
4 months 1 week ago
Risk and Compliance Review Professionals Can Save Millions and Help Avoid Breaches
Risk and compliance review requires more than just checking off boxes. It involves understanding what the fine print reveals about how a vendor protects data, manages incidents and upholds contractual obligations. Professionals who review contracts become trusted voices in procurement and security.
Risk and compliance review requires more than just checking off boxes. It involves understanding what the fine print reveals about how a vendor protects data, manages incidents and upholds contractual obligations. Professionals who review contracts become trusted voices in procurement and security.
AI Security Goes Mainstream as Vendors Spend Heavily on M&A
4 months 1 week ago
Platform Vendors Target Runtime Defense, Prompt Flow, Agent Identity and Output
As autonomous AI grows, so does the security risk. Prompt injection, identity control and AI observability are at the center of a dozen recent acquisitions, as vendors including Cisco, CrowdStrike, Palo Alto Networks and SentinelOne try to adapt to the autonomy and unpredictability of LLM-powered bots.
As autonomous AI grows, so does the security risk. Prompt injection, identity control and AI observability are at the center of a dozen recent acquisitions, as vendors including Cisco, CrowdStrike, Palo Alto Networks and SentinelOne try to adapt to the autonomy and unpredictability of LLM-powered bots.
Researchers Out Front Companies for Chinese Intelligence
4 months 1 week ago
Beijing-Based Institute Researches Steganography, Forensics, Network Penetration
Beware previously undocumented front companies for China's main intelligence service that appear to be tasked with gathering and developing steganography, digital forensic, network penetration and other cybersecurity tools to serve Beijing's military and intelligence apparatus, warn researchers.
Beware previously undocumented front companies for China's main intelligence service that appear to be tasked with gathering and developing steganography, digital forensic, network penetration and other cybersecurity tools to serve Beijing's military and intelligence apparatus, warn researchers.
Free Healthcare 'Toolkit' Ranks and Maps Third-Party Risk
4 months 1 week ago
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk
Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those difficulties.
Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those difficulties.
EU Unveils AI Tech Sovereignty Plans
4 months 1 week ago
AI Strategies Seeks to Bolster Its Position in the Global AI Race
The European Union is pledging $1 billion euros to boost a continental vision of artificial intelligence amid mounting fears the trading bloc is falling behind on research and adoption into the cutting edge technology. "We will help speed up the process," said the European Commission president.
The European Union is pledging $1 billion euros to boost a continental vision of artificial intelligence amid mounting fears the trading bloc is falling behind on research and adoption into the cutting edge technology. "We will help speed up the process," said the European Commission president.
Arrests Underscore Fears of Teen Cyberespionage Recruitment
4 months 1 week ago
Telegram Used to Lure Teen Recon Recruits
The late September arrest of two teenagers in the Netherlands on suspicion of capturing Wi-Fi signals for pro-Russian hackers has sparked warnings from security analysts over a digital drive for low-skill reconnaissance tasks by nation-state spymasters.
The late September arrest of two teenagers in the Netherlands on suspicion of capturing Wi-Fi signals for pro-Russian hackers has sparked warnings from security analysts over a digital drive for low-skill reconnaissance tasks by nation-state spymasters.
Why CISOs Must Prioritize OT Penetration Testing
4 months 1 week ago
What Makes OT Pentesting Unique — and Risky? Inside a Penetration Test: From Scoping to Reporting.
Live Webinar | Beyond DLP: Why Data Protection and Insider Risk Should Now Be One Strategy
4 months 1 week ago
Why Enterprises Continue to Stick With Traditional AI
4 months 1 week ago
Explainability, Cost, Compliance Drive AI Choices in Enterprises
LLMs may dominate headlines, but enterprises are taking a more measured approach. Sujatha S Iyer, AI security head at ManageEngine, says the future of AI for many businesses lies not in deploying massive models but in explainable, efficient and compliant systems designed to solve specific problems.
LLMs may dominate headlines, but enterprises are taking a more measured approach. Sujatha S Iyer, AI security head at ManageEngine, says the future of AI for many businesses lies not in deploying massive models but in explainable, efficient and compliant systems designed to solve specific problems.
Checked
2 hours 38 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed