DataBreachToday.com
DeepSeek's New AI Model Shakes American Tech Industry
5 months 1 week ago
AI Startup's R1 Model Draws Praise and Skepticism
An open reasoning model from Chinese artificial intelligence startup DeepSeek has the tech industry assessing its potential impact as shares of U.S. technology mainstays plummeted in trading on Monday. Hangzhou-based DeepSeek released its R1 model on Jan. 20.
An open reasoning model from Chinese artificial intelligence startup DeepSeek has the tech industry assessing its potential impact as shares of U.S. technology mainstays plummeted in trading on Monday. Hangzhou-based DeepSeek released its R1 model on Jan. 20.
SonicWall's Zero-Day Provokes Patch Alerts
5 months 1 week ago
Preauthentication Deserialization Flaw Could Result in Remote Code Execution
Software vendors and national security agencies are urging immediate patching of a critical SonicWall flaw days after the security device manufacturer disclosed that hackers are actively exploiting a zero-day. The flaw doesn't require user authentication.
Software vendors and national security agencies are urging immediate patching of a critical SonicWall flaw days after the security device manufacturer disclosed that hackers are actively exploiting a zero-day. The flaw doesn't require user authentication.
Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000
5 months 1 week ago
RansomHub Theft Hit Patients of 2 Dozen HCF Facilities and Home Healthcare Unit
A chain of more than two dozen skilled nursing and rehabilitation facilities is notifying tens of thousands of patients whose information was compromised in a hacking incident last fall. Russian-speaking cybercriminal gang RansomHub claims to have published 250GB of data stolen in the heist.
A chain of more than two dozen skilled nursing and rehabilitation facilities is notifying tens of thousands of patients whose information was compromised in a hacking incident last fall. Russian-speaking cybercriminal gang RansomHub claims to have published 250GB of data stolen in the heist.
Swedish Authorities Seize Vessel in Cable Sabotage Probe
5 months 1 week ago
Undersea Cable Damage in Baltic Sparks Concerns of Russian 'Shadow Fleet' Activity
Swedish authorities seized a vessel in the Baltic Sea as part of a criminal investigation into sabotage of an undersea cable between Sweden and Latvia after a series of regional cable disruptions, including one involving suspected Russian shadow fleet activity, raising security concerns.
Swedish authorities seized a vessel in the Baltic Sea as part of a criminal investigation into sabotage of an undersea cable between Sweden and Latvia after a series of regional cable disruptions, including one involving suspected Russian shadow fleet activity, raising security concerns.
Don't Get Schooled: Lessons From PowerSchool's Big Breach
5 months 1 week ago
Why MFA and Data Minimization Remain Key for Preventing Massive Data Breaches
While PowerSchool's investigation into the massive theft of its customers' data is continuing, clear lessons have already emerged. Count among them the importance of using multifactor authentication, which could have safeguarded access to PowerSchool's exploited customer support systems.
While PowerSchool's investigation into the massive theft of its customers' data is continuing, clear lessons have already emerged. Count among them the importance of using multifactor authentication, which could have safeguarded access to PowerSchool's exploited customer support systems.
Information Security Career Advice: 'Pick Your Battles'
5 months 1 week ago
With the pace of global change so often creating a sense of accelerating chaos, it's easy to view cyber defenders as firefighters constantly on call. But Black Hat conference founder and creator Jeff Moss warned that "things have been on fire for as long as I can remember."
Why AI in Healthcare Harkens Back to Early Social Media Use
5 months 1 week ago
While artificial intelligence platforms and tools promise to offer encouraging potential in healthcare, many are unprepared to deal with the risks these emerging technologies pose - similar to the early days of social media, said Keith Fricke, partner and principal of tw-Security.
Patching Lags for Vulnerabilities Targeted by Salt Typhoon
5 months 1 week ago
Chinese Hackers Hitting Unpatched Products From Microsoft, Sophos, Fortinet, Ivanti
Chinese nation-state hackers who surreptitiously gained "broad and full" access to telecommunications networks in the U.S. and dozens of other countries have regularly exploited known flaws in their networking gear that the victims failed to patch, security experts have warned.
Chinese nation-state hackers who surreptitiously gained "broad and full" access to telecommunications networks in the U.S. and dozens of other countries have regularly exploited known flaws in their networking gear that the victims failed to patch, security experts have warned.
OpenAI Launches AI Agent 'Operator'
5 months 1 week ago
Operator Cannot Yet Reliably Perform Complex, Customized Tasks
OpenAI introduced an AI agent capable of independent action with the launch of Operator, an general-purpose AI tool that interacts with websites to perform tasks. The agent can navigate menus and complete forms to do tasks such as travel booking, ordering takeout, buying stuff or scheduling tasks.
OpenAI introduced an AI agent capable of independent action with the launch of Operator, an general-purpose AI tool that interacts with websites to perform tasks. The agent can navigate menus and complete forms to do tasks such as travel booking, ordering takeout, buying stuff or scheduling tasks.
Curbing the Rise in Investment Scams
5 months 1 week ago
Fraud Expert Ken Westbrook on Successful Ways to Stop Fake Investment Sites
According to the FBI, losses from investment scams surged 38% between 2022 and 2023. Fraudsters are using highly effective tactics, including sending text messages to lure victims to fake cryptocurrency platforms, said Ken Westbrook, founder and CEO of Stop Scams Alliance.
According to the FBI, losses from investment scams surged 38% between 2022 and 2023. Fraudsters are using highly effective tactics, including sending text messages to lure victims to fake cryptocurrency platforms, said Ken Westbrook, founder and CEO of Stop Scams Alliance.
Trans-Atlantic Commercial Data Flows Could be Imperiled
5 months 1 week ago
The EU-US Data Privacy Framework Requires a Functional PCLOB
A Trump administration move to gut a key oversight body meant to guarantee European data rights in the United States could endanger the legal basis underpinning commercial data flows across the Atlantic. The board is charged with overseeing U.S. surveillance practices.
A Trump administration move to gut a key oversight body meant to guarantee European data rights in the United States could endanger the legal basis underpinning commercial data flows across the Atlantic. The board is charged with overseeing U.S. surveillance practices.
State and Federal Healthcare Cyber Regs to Watch in 2025
5 months 1 week ago
Under the Trump administration, the proposed update to the HIPAA Security Rule - issued in the final weeks of the Biden administration - is likely to get trimmed but not totally cut, predicts regulatory attorney Sharon Klein of the law firm Blank Rome. What else should the health sector expect?
Breach Roundup: Researchers Find Flaws in Palo Alto Firewalls
5 months 1 week ago
Also: US Prosecutors Charge Suspected North Korean IT Worker Collaborators
This week, researchers spied Palo Alto firewall flaws, a North Korean IT worker conspiracy, ChatGPT as DDoS vector. Chinese hackers targeted a VPN maker, a fake PyPI package and a Russian threat actor shifted tactics. BreachForums' admin faces prison, and scammers used the release of Ross Ulbricht.
This week, researchers spied Palo Alto firewall flaws, a North Korean IT worker conspiracy, ChatGPT as DDoS vector. Chinese hackers targeted a VPN maker, a fake PyPI package and a Russian threat actor shifted tactics. BreachForums' admin faces prison, and scammers used the release of Ross Ulbricht.
Securing APIs at Scale: How to Achieve Comprehensive API Visibility and Threat Detection
5 months 1 week ago
APIs are the backbone of modern applications, enabling connectivity and functionality across diverse systems. However, the growing complexity of API ecosystems introduces vulnerabilities that attackers exploit to disrupt operations, steal data or launch other malicious activities. Without real-time visibility and robust threat detection, businesses face significant risks.
CISA Warns of Flaws in Aircraft Collision Avoidance Systems
5 months 1 week ago
Hackers Unlikely to Exploit Flaws in the Wild
Security researchers found an unpatchable flaw in the system that prevents commercial aircraft from crashing into each other, the U.S. federal government said in a Tuesday advisory that called the likelihood of its exploitation "unlikely" outside of a laboratory setting.
Security researchers found an unpatchable flaw in the system that prevents commercial aircraft from crashing into each other, the U.S. federal government said in a Tuesday advisory that called the likelihood of its exploitation "unlikely" outside of a laboratory setting.
Lawsuit Claims LinkedIn Used Private Messages to Train AI
5 months 1 week ago
California User's Class Action Suit Says LinkedIn Violated Contract, Privacy Regs
A LinkedIn user has sued the company for flouting privacy requirements by allowing third-party companies to access user data - including Premium users' private messages - to train their artificial intelligence models. A LinkedIn spokesperson called the lawsuit "false claims with no merit."
A LinkedIn user has sued the company for flouting privacy requirements by allowing third-party companies to access user data - including Premium users' private messages - to train their artificial intelligence models. A LinkedIn spokesperson called the lawsuit "false claims with no merit."
Moss on AI Disruption: 'Everything, Everywhere, All at Once'
5 months 1 week ago
The pace of change including the rise of artificial intelligence and a sense of accelerating chaos can make cybersecurity professionals feel like "things are kind of everything, everywhere, all at once," said Black Hat conference founder Jeff Moss. How should they respond?
Defending the Digital Frontline with Strategies for Defense Agencies | Live Webinar
5 months 1 week ago
Insights from Fortinet's 2025 State of Cloud Security Report
5 months 1 week ago
Fortinet's Vincent Hwang on Addressing Security, Compliance Gaps
According to Fortinet's 2025 State of Cloud Security Report, 76% of organizations have a shortage of cloud security expertise, compounding cloud adoption and security challenges. How should organizations address the skills gap? Vincent Hwang of Fortinet shares analysis and advice.
According to Fortinet's 2025 State of Cloud Security Report, 76% of organizations have a shortage of cloud security expertise, compounding cloud adoption and security challenges. How should organizations address the skills gap? Vincent Hwang of Fortinet shares analysis and advice.
Checked
6 hours 11 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed