DataBreachToday.com
US Appeals Court Reverses Tornado Cash Sanctions
8 months 4 weeks ago
Department of Treasury Overstepped its Authority, Fifth Circuit Rules
A U.S. federal appeals court ruled U.S. Department of Treasury exceeded its authority by sanctioning Tornado Cash, a cryptocurrency mixing service used by North Korean hackers to launder more than $455 million. Smart contracts "are not capable of being owned," the court ruled.
A U.S. federal appeals court ruled U.S. Department of Treasury exceeded its authority by sanctioning Tornado Cash, a cryptocurrency mixing service used by North Korean hackers to launder more than $455 million. Smart contracts "are not capable of being owned," the court ruled.
Script Kiddie 'Matrix' Builds Massive Botnet
8 months 4 weeks ago
Likely Russian Hacker Exploits IoT Vulnerabilities, Many Known for Years
An apparent Russian script kiddie is converting widespread security gaps into powerful botnets capable of launching global-scale distributed denial-of-service attacks. A threat actor with the online moniker "Matrix" is exploiting IoT vulnerabilities such as default credentials and outdated software.
An apparent Russian script kiddie is converting widespread security gaps into powerful botnets capable of launching global-scale distributed denial-of-service attacks. A threat actor with the online moniker "Matrix" is exploiting IoT vulnerabilities such as default credentials and outdated software.
T-Mobile Disputes Claims of Chinese Hack on Customer Data
8 months 4 weeks ago
Largest US Telco Blocks Hackers But Warns Other Networks May Be Compromised
T-Mobile disputed claims Wednesday that Chinese state-sponsored hackers breached its systems and stole customer data, warning that some U.S. communications networks may still be compromised and detailing how its layered defenses and third-party cybersecurity partnerships thwarted the attack.
T-Mobile disputed claims Wednesday that Chinese state-sponsored hackers breached its systems and stole customer data, warning that some U.S. communications networks may still be compromised and detailing how its layered defenses and third-party cybersecurity partnerships thwarted the attack.
New EU Tech Commissioner to Focus on Tech Sovereignty
8 months 4 weeks ago
Henna Virkkunen Vows to Boost European innovation, Cut Regulations
Newly appointed EU tech commissioner Henna Virkkunen will lead efforts to establish Europe's tech sovereignty, said European Commission President Ursula von der Leyen, who will start a second term on Dec. 1. Virkkunen was a liberal-conservative Finnish member of the European Parliament.
Newly appointed EU tech commissioner Henna Virkkunen will lead efforts to establish Europe's tech sovereignty, said European Commission President Ursula von der Leyen, who will start a second term on Dec. 1. Virkkunen was a liberal-conservative Finnish member of the European Parliament.
Russian Hackers Target Mozilla, Windows in New Exploit Chain
8 months 4 weeks ago
ESET Discovers Two Major Vulnerabilities Exploited by Russian RomCom Hacking Group
Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code.
Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code.
New Sysdig CEO: Focus on Falco, AI and Fast Threat Response
8 months 4 weeks ago
New Sysdig CEO Bill Welch Aims to Expand Real-Time Response and GSI Partnerships
New CEO Bill Welch discusses Sysdig's cloud security strategy, emphasizing AI, open-source leadership with Falco, and expansion plans to serve SMBs and midmarket businesses. He shares goals for real-time response and building a sustainable, profitable company.
New CEO Bill Welch discusses Sysdig's cloud security strategy, emphasizing AI, open-source leadership with Falco, and expansion plans to serve SMBs and midmarket businesses. He shares goals for real-time response and building a sustainable, profitable company.
Victims Must Disclose Ransom Payments Under Australian Law
8 months 4 weeks ago
New Law Calls for Better Reporting, Securing Devices and Critical Infrastructure
The Australian government's proposed cybersecurity legislation passed both houses of the Parliament on Monday, formalizing the government's strategy to boost ransomware payment reporting, mandate basic cybersecurity standards for connected devices and enhance critical infrastructure security.
The Australian government's proposed cybersecurity legislation passed both houses of the Parliament on Monday, formalizing the government's strategy to boost ransomware payment reporting, mandate basic cybersecurity standards for connected devices and enhance critical infrastructure security.
Webinar | The CISO's Guide to a Strong Security Culture
9 months ago
US DOD Eyes $15B AI Contract to Scale Advana Platform
9 months ago
Pentagon Seeking Industry Feedback in Developing New AI Contract Vehicle
The U.S. Department of Defense is seeking industry proposals for a new artificial intelligence contract vehicle to help revamp its multi-domain analytics platform, Advana, according to a newly released draft solicitation. The new contract vehicle could extend through July 2035.
The U.S. Department of Defense is seeking industry proposals for a new artificial intelligence contract vehicle to help revamp its multi-domain analytics platform, Advana, according to a newly released draft solicitation. The new contract vehicle could extend through July 2035.
Watchdog Report: HHS OCR Should Beef-Up HIPAA Audit Program
9 months ago
HHS OIG: Current Audit Program Is Not Pushing Entities Enough to Improve Cyber
The U.S. Department of Health and Human Services' Office for Civil Rights should restart and toughen the scope of its HIPAA audits. A watchdog agency says HHS needs to better assess whether regulated healthcare organizations are taking required actions to reduce their cybersecurity risk.
The U.S. Department of Health and Human Services' Office for Civil Rights should restart and toughen the scope of its HIPAA audits. A watchdog agency says HHS needs to better assess whether regulated healthcare organizations are taking required actions to reduce their cybersecurity risk.
AI Startup Execs Say It Should Be Easier to Tap UK Funding
9 months ago
'You Wonder, Should I Just Spend It on a Place to Stay in America For a Week'
Revisions to U.K. government research funding guidelines and their complex application pose a challenge to early-stage tech companies, experts on Tuesday told a parliamentary committee inquiry. "We have definitely had issues," said Peadar Coyle, founder of AudioStack.
Revisions to U.K. government research funding guidelines and their complex application pose a challenge to early-stage tech companies, experts on Tuesday told a parliamentary committee inquiry. "We have definitely had issues," said Peadar Coyle, founder of AudioStack.
UK NHS Hospital Reports 'Major' Cyberincident
9 months ago
Outpatient Appointments Cancelled at Wirral University Teaching Hospital
A U.K. National Heath Service teaching hospital in northwest England reported a major cyberincident on Tuesday that forced the healthcare facility to cancel outpatient appointments for the day. Maternity services, neo-natal and emergency triage are "running as normal."
A U.K. National Heath Service teaching hospital in northwest England reported a major cyberincident on Tuesday that forced the healthcare facility to cancel outpatient appointments for the day. Maternity services, neo-natal and emergency triage are "running as normal."
Protecting AI Competitive Advantage: From Development to Deployment
9 months ago
Road Blocks in Sustainability Data Management | Live Webinar
9 months ago
OnDemand | The CISO's Guide to a Strong Security Culture
9 months ago
Russian Hackers Exploit WiFi in Sophisticated New Attack
9 months ago
'Nearest Neighbor Attack' Bypasses Cyber Defenses by Breaching WiFi Networks
A Russian cyberespionage group hacked a Washington, D.C.-based organization focused on Ukraine by deploying a new attack technique that exploits Wi-Fi connectivity, according to new research. The "nearest neighbor attack: methodology could lead to a significant broadening of targeting and attacks.
A Russian cyberespionage group hacked a Washington, D.C.-based organization focused on Ukraine by deploying a new attack technique that exploits Wi-Fi connectivity, according to new research. The "nearest neighbor attack: methodology could lead to a significant broadening of targeting and attacks.
Crosspoint to Invest $5M in Each Innovation Sandbox Finalist
9 months ago
Money Aims to Simplify Fundraising for RSA Conference Innovation Sandbox Finalists
Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively.
Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively.
Experts Urge Sober Assessment of Russian Hacking
9 months ago
Speech by UK Minister Pat McFadden Sparks Backlash
A warning from a British government official over the Russian cyberwar sparked a backlash from cybersecurity specialists who urged a measured approach. Russian attacks could "turn the lights off for millions of people," said Pat McFadden, minister for intergovernmental
A warning from a British government official over the Russian cyberwar sparked a backlash from cybersecurity specialists who urged a measured approach. Russian attacks could "turn the lights off for millions of people," said Pat McFadden, minister for intergovernmental
Mysterious Elephant Using Hajj-Themed Bait in Attacks
9 months ago
Group Deploys Upgraded Malware Disguised as Microsoft File on Pilgrimage Goers
A South Asian threat actor identified as Mysterious Elephant or APT-K-47 by Knownsec 404 researchers is using a Hajj-themed lure to trick victims into malicious payload disguised as a Windows file. The hacker is using upgraded Asyncshell malware disguised as a Microsoft Compiled HTML Help file.
A South Asian threat actor identified as Mysterious Elephant or APT-K-47 by Knownsec 404 researchers is using a Hajj-themed lure to trick victims into malicious payload disguised as a Windows file. The hacker is using upgraded Asyncshell malware disguised as a Microsoft Compiled HTML Help file.
Checked
9 hours 12 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed