DataBreachToday.com
Live Webinar | Vulnerability Management 2.0: Addressing ANZ Web Exposure Before It’s Exploited
4 hours 40 minutes ago
Faster Not Bigger: New R1T2 LLM Combines DeepSeek Versions
4 hours 40 minutes ago
German Consultancy's Latest LLM Aims to Reduce Costs, Preserve Reasoning Skills
Say hello to DeepSeek-TNG R1T2 Chimera, a large language model built by German firm TNG Consulting, using three different DeepSeek LLMs. The goal of R1T2 is to provide a faster LLM with more predictable performance that maintains full reasoning accuracy.
Say hello to DeepSeek-TNG R1T2 Chimera, a large language model built by German firm TNG Consulting, using three different DeepSeek LLMs. The goal of R1T2 is to provide a faster LLM with more predictable performance that maintains full reasoning accuracy.
Editors' Panel: Pro-Iran Hackers Threaten to Leak Trump Data
4 hours 40 minutes ago
Also: Medicare Data Breach; Gartner Security & Risk Management Summit Takeaways
In this week's update, ISMG editors discussed Iran-linked hackers claiming to steal emails from Trump's inner circle, how to refine application development in the age of AI, and a U.S. Medicare data breach amplifying concerns over the safety, security and privacy of federal health systems.
In this week's update, ISMG editors discussed Iran-linked hackers claiming to steal emails from Trump's inner circle, how to refine application development in the age of AI, and a U.S. Medicare data breach amplifying concerns over the safety, security and privacy of federal health systems.
EU Pledges 'No Pause' Over Enforcement of Bloc's AI Act
4 hours 40 minutes ago
Rejects Business and AI Leaders' Call for Two-Year Enforcement Moratorium
Expect to see no pause in the EU's enforcement of new rules governing artificial intelligence, a spokesman for the European Commission said amid intensifying calls for officials to "stop the clock" over implementing the bloc's AI Act, in the name of innovation and competition.
Expect to see no pause in the EU's enforcement of new rules governing artificial intelligence, a spokesman for the European Commission said amid intensifying calls for officials to "stop the clock" over implementing the bloc's AI Act, in the name of innovation and competition.
Why the HIPAA Security Rule Proposal Draws Expert Concerns
9 hours 41 minutes ago
While many of the proposed updates to the HIPAA security rule are reasonable expectations, others will be extremely onerous to implement if federal regulators finalize the rule's overhaul as it's written today, said Samantha Jacques of McLaren Health and Stephen Goudreault of security firm Gigamon.
Live Webinar | Effortless OT Resilience: Real-World Recovery Strategies for U.S. Manufacturers
9 hours 41 minutes ago
Columbia University Hack Exposes Higher Ed Cyber Gaps
15 hours 41 minutes ago
Experts Warn Funding Gaps Elevate Cyber Risk
A breach of Columbia University’s IT systems after repeated attacks by U.S. President Donald Trump is highlighting how universities are unprepared for today’s threat landscape. Schools often leave campuses without enough resources for strong cyber defenses.
A breach of Columbia University’s IT systems after repeated attacks by U.S. President Donald Trump is highlighting how universities are unprepared for today’s threat landscape. Schools often leave campuses without enough resources for strong cyber defenses.
Breach Roundup: Phony Chinese Sites Mimic Retail Brands
15 hours 41 minutes ago
Also, Spain Arrests Hacker Behind Leaks Targeting Politicians and Journalists
This week, Chinese sites mimicked brands, Spain arrested data leak hackers, Swiss health nonprofit ransomware attack, ICC probed a cyberattack, UNFI restored systems, a flaw in smart tractors, RomCom RAT. A U.K. man sentenced for locking employer out of network. A WordPress hack installs a Trojan.
This week, Chinese sites mimicked brands, Spain arrested data leak hackers, Swiss health nonprofit ransomware attack, ICC probed a cyberattack, UNFI restored systems, a flaw in smart tractors, RomCom RAT. A U.K. man sentenced for locking employer out of network. A WordPress hack installs a Trojan.
Static Credentials Flaw Patched in Cisco Systems
15 hours 41 minutes ago
Flaw Exposes Remote Privilege Escalation Risk
Cisco released urgent security updates to fix a critical vulnerability in Unified Communications Manager that could allow unauthenticated attackers gain root access to affected systems. The maximum-severity vulnerability allows unauthenticated remote attackers to log in using static credentials.
Cisco released urgent security updates to fix a critical vulnerability in Unified Communications Manager that could allow unauthenticated attackers gain root access to affected systems. The maximum-severity vulnerability allows unauthenticated remote attackers to log in using static credentials.
Phishing Scammers Push for Callbacks in Latest Innovation
1 day 2 hours ago
Telephone-Oriented Attack Delivery Social Engineering Tactic Thrives
The phishing industry is a never ending source of innovation. Cyber fraudsters are determined to sneak their way into your inbox. Recent attacks involve callback phishing, a social engineering tactic designed to break down victims' defenses by spurring them into calling the scammers themselves.
The phishing industry is a never ending source of innovation. Cyber fraudsters are determined to sneak their way into your inbox. Recent attacks involve callback phishing, a social engineering tactic designed to break down victims' defenses by spurring them into calling the scammers themselves.
Cryptohack Roundup: Inside the $100M Nobitex Breach
1 day 2 hours ago
Also: Dismantling a 460 Million Euro Crypto Fraud Network
This week, a peek into Iran's largest crypto exchange blending privacy, scale and sanctions evasion, Europol and Spanish police dismantled a crypto fraud network, $9.5M Resupply hack, sentencing in a $40M ponzi scheme and a North Korean crypto theft and employment fraud ring.
This week, a peek into Iran's largest crypto exchange blending privacy, scale and sanctions evasion, Europol and Spanish police dismantled a crypto fraud network, $9.5M Resupply hack, sentencing in a $40M ponzi scheme and a North Korean crypto theft and employment fraud ring.
Ransomware Group Hunters International Announces Exit
1 day 2 hours ago
Cybercrime Experts Greet Announcement With Skepticism
Hunters International said Thursday it closed shop, provoking skepticism among cybercrime experts who said it's more likely the Russian-speaking hackers behind the ransomware group will start up again under a new brand name. "Ransomware groups often rebrand themselves."
Hunters International said Thursday it closed shop, provoking skepticism among cybercrime experts who said it's more likely the Russian-speaking hackers behind the ransomware group will start up again under a new brand name. "Ransomware groups often rebrand themselves."
Medical Device Maker Surmodics Recovering From Attack
1 day 2 hours ago
Latest Medical Device Vendor to Disclose a Recent Cyber Incident
A Minnesota maker of catheters notified federal regulators it is recovering from a cyberattack discovered in early June that rendered a portion of its IT systems and data inaccessible. Threat actors gained unauthorized access to some IT systems making certain systems and data unavailable.
A Minnesota maker of catheters notified federal regulators it is recovering from a cyberattack discovered in early June that rendered a portion of its IT systems and data inaccessible. Threat actors gained unauthorized access to some IT systems making certain systems and data unavailable.
Live Webinar | Boosting OT Resilience on a Budget: Real-World Strategies for U.S. Manufacturers
1 day 11 hours ago
Sovereign by Design: Data Control in a Borderless World
1 day 11 hours ago
How IT Leaders Can Navigate Regulatory Complexity, Use Tech for Digital Sovereignty
From Schrems II to TikTok fines, data sovereignty is redefining the rules of digital engagement. It is no longer an option for enterprises. CIOs must navigate a maze of data laws and tech strategies to stay compliant and competitive in a world without digital borders.
From Schrems II to TikTok fines, data sovereignty is redefining the rules of digital engagement. It is no longer an option for enterprises. CIOs must navigate a maze of data laws and tech strategies to stay compliant and competitive in a world without digital borders.
Your Security Stack Is Only as Secure as Your Sales Team
1 day 20 hours ago
Cybersecurity Awareness Programs Need Focus on Human Risk and Changing Behaviors
Thanks to Cybersecurity Awareness Month, everyone knows security is a priority, but what are we doing differently to change the culture? If our goal is to reduce risk - and not just to meet regulatory expectations - then we need to focus on behavior, not just boxes on a checklist.
Thanks to Cybersecurity Awareness Month, everyone knows security is a priority, but what are we doing differently to change the culture? If our goal is to reduce risk - and not just to meet regulatory expectations - then we need to focus on behavior, not just boxes on a checklist.
Webinar | Customer Data and Managing Risk in the Age of AI
1 day 20 hours ago
Boosting OT Resilience on a Budget: Real-World Strategies for U.S. Manufacturers
1 day 20 hours ago
Court Approves 23andMe Sale to TTAM Research Institute
1 day 20 hours ago
23andMe's Ex-CEO Anne Wojcicki Made Privacy Pledge With Successful Bid of $305M
A bankruptcy court gave the green light for TTAM Research Institute - a firm launched by 23andMe's co-founder and former CEO Anne Wojcicki - to buy 23andMe for $305 million. TTAM has promised to uphold the consumer genetics testing firm's current privacy policies and implement more data safeguards.
A bankruptcy court gave the green light for TTAM Research Institute - a firm launched by 23andMe's co-founder and former CEO Anne Wojcicki - to buy 23andMe for $305 million. TTAM has promised to uphold the consumer genetics testing firm's current privacy policies and implement more data safeguards.
Checked
4 hours 40 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed