DataBreachToday.com
Asian Governments Rush to Ban DeepSeek Over Privacy Concerns
2 months ago
Governments Are Skeptical of Chinese A1 Platform's Data Security Controls
Countries across Asia are racing to ban government officials, national agencies and critical infrastructure organizations from using Chinese artificial intelligence company DeepSeek's open-source chatbot application, citing data security and privacy risks.
Countries across Asia are racing to ban government officials, national agencies and critical infrastructure organizations from using Chinese artificial intelligence company DeepSeek's open-source chatbot application, citing data security and privacy risks.
SolarWinds To Be Purchased By Turn/River Capital for $4.4B
2 months ago
CEO: Going Private Will Help SolarWinds Expand Its Operational Resilience Vision
SolarWinds agreed to be bought by Turn/River Capital for $4.4 billion just six years after the observability and IT management software firm went public. The proposed deal will help SolarWinds expand its vision in operational resilience and ensure the company's IT infrastructure remains robust.
SolarWinds agreed to be bought by Turn/River Capital for $4.4 billion just six years after the observability and IT management software firm went public. The proposed deal will help SolarWinds expand its vision in operational resilience and ensure the company's IT infrastructure remains robust.
Lakeside Software MSI Flaw Identified by Google Mandiant
2 months ago
SysTrack LsiAgent Installer Flaw Escalates Privileges Locally
A flawed Microsoft software installer application developed by Lakeside Software could enable attackers with lower privileges to gain full system access. The local privilege escalation vulnerability uncovered by Google Mandiant has since been patched.
A flawed Microsoft software installer application developed by Lakeside Software could enable attackers with lower privileges to gain full system access. The local privilege escalation vulnerability uncovered by Google Mandiant has since been patched.
French AI Action Summit, What Can We Expect?
2 months ago
Summit to Focus on Open-Source, AI Governance and Development
The historic presidential Élysée Palace in Central Paris will host world leaders, tech CEOs and researchers for the French AI Action Summit, a two-day event that will commence on Monday. U.S. Vice President JD Vance, OpenAI CEO Sam Altman and Google's Sundar Pichai will be on hand.
The historic presidential Élysée Palace in Central Paris will host world leaders, tech CEOs and researchers for the French AI Action Summit, a two-day event that will commence on Monday. U.S. Vice President JD Vance, OpenAI CEO Sam Altman and Google's Sundar Pichai will be on hand.
Live Webinar | What Really Happens Before Ransomware Strikes?
2 months ago
Modern Bank Heists 2025: Revenge of the Zero Days
2 months ago
Tom Kellermann's Annual Report on Key Threats to Financial Sector
Zero days. Supply chain attacks. APIs and cloud environments as growing threat vectors. These are among the topics discussed in this seventh annual Modern Bank Heists report, and author Tom Kellermann discusses their impact on financial institutions - and which defensive gaps need to be filled now.
Zero days. Supply chain attacks. APIs and cloud environments as growing threat vectors. These are among the topics discussed in this seventh annual Modern Bank Heists report, and author Tom Kellermann discusses their impact on financial institutions - and which defensive gaps need to be filled now.
ISMG Editors: AI Security Wake-Up Call From DeepSeek
2 months ago
Also: Addressing AI Vulnerabilities and Governance Challenges
DeepSeek, an advanced open-source AI model, is under scrutiny for its safety guardrails failing multiple security tests and a data leak that exposed user information and API keys. Sam Curry, CISO at Zscaler, discusses AI security, risk management and upcoming U.S. policy changes.
DeepSeek, an advanced open-source AI model, is under scrutiny for its safety guardrails failing multiple security tests and a data leak that exposed user information and API keys. Sam Curry, CISO at Zscaler, discusses AI security, risk management and upcoming U.S. policy changes.
Webinar | AI-Powered Defense Against AI-Driven Threats
2 months ago
Encryption Debate: Britain Reportedly Demands Apple Backdoor
2 months ago
Secret Order Seeks to Compel Apple to Weaken Encryption, Washington Post Reports
The British government has unexpectedly reignited the long-running encryption debate, reportedly issuing a secret order to Apple requiring that it provide direct access to global users' fully encrypted cloud backups and prohibited the technology giant from alerting any targeted accountholders.
The British government has unexpectedly reignited the long-running encryption debate, reportedly issuing a secret order to Apple requiring that it provide direct access to global users' fully encrypted cloud backups and prohibited the technology giant from alerting any targeted accountholders.
Breach Roundup: Hacker Claims 20 Million OpenAI Logins Taken
2 months ago
Also: Researchers Bypass GitHub Copilot's Protections, Deloitte Pays $5M for Breach
This week: A hacker claims to have 20 million OpenAI logins, Sweden clears ship in Baltic cable damage, researchers find ways to bypass GitHub Copilot's protections, Netgear patches router flaws, undetectable Mac backdoor raises alarms, Spain nabs hacker, and Deloitte pays $5M for RIBridges breach.
This week: A hacker claims to have 20 million OpenAI logins, Sweden clears ship in Baltic cable damage, researchers find ways to bypass GitHub Copilot's protections, Netgear patches router flaws, undetectable Mac backdoor raises alarms, Spain nabs hacker, and Deloitte pays $5M for RIBridges breach.
Federal Cyber Workers Can Now Accept Trump Resignation Offer
2 months ago
CISO Buyout Offers, Industry-Wide Skills Shortage Raise Fears of Cybersecurity Gaps
The Cybersecurity and Infrastructure Security Agency has reversed an exemption for its staffers to participate in the administration's "Fork in the Road" resignation program, as lawmakers and security experts warn of a growing cyber workforce shortage threatening U.S. national security.
The Cybersecurity and Infrastructure Security Agency has reversed an exemption for its staffers to participate in the administration's "Fork in the Road" resignation program, as lawmakers and security experts warn of a growing cyber workforce shortage threatening U.S. national security.
Will DOGE Access to CMS Data Lead to HIPAA Breaches?
2 months ago
Experts Cast Nervous Eye on Musk and Team's Handling of Health-Related Info
Privacy experts are keeping a nervous eye on the potential for compromises involving Americans' health and personal information resulting from the White House's Department of Government Efficiency - led by Elon Musk - accessing government IT systems containing Medicare and health related data.
Privacy experts are keeping a nervous eye on the potential for compromises involving Americans' health and personal information resulting from the White House's Department of Government Efficiency - led by Elon Musk - accessing government IT systems containing Medicare and health related data.
Why Cybersecurity Giants Are Rushing to Acquire DSPM Startups
2 months ago
Data Security Posture Management Becomes Key to Cloud Visibility But Lacks Controls
The rapid rise of DSPM has fueled deals by major security firms looking to enhance their platforms. Industry leaders see DSPM as crucial for cloud data visibility, security integration and regulatory compliance. But can standalone DSPM vendors survive, or will they be absorbed by larger platforms?
The rapid rise of DSPM has fueled deals by major security firms looking to enhance their platforms. Industry leaders see DSPM as crucial for cloud data visibility, security integration and regulatory compliance. But can standalone DSPM vendors survive, or will they be absorbed by larger platforms?
Live Webinar | QR Codes Exposed: From Convenience to Cybersecurity Nightmare
2 months ago
AI Rise: Can We Still Trust What We See?
2 months ago
AI-Powered Social Engineering and Deepfake Threats in 2025
Security researchers predict threat actors will use artificial intelligence and large language models to enhance phishing attacks and create convincing fake personas, while defensive AI enters a new phase of semiautonomous operations.
Security researchers predict threat actors will use artificial intelligence and large language models to enhance phishing attacks and create convincing fake personas, while defensive AI enters a new phase of semiautonomous operations.
Still-Lucrative Ransomware's Profits Plunged 35% Last Year
2 months ago
Collapse of LockBit and BlackCat/ALPHV Tied to Ongoing Decline in Big-Game Hunting
Ransomware may still be raking in massive cryptocurrency profits for practitioners, but 2024 turned out to be less of a banner year than predicted, with blockchain researchers reporting that the sum total of known ransom payments to ransomware groups in 2024 plummeted by 35%.
Ransomware may still be raking in massive cryptocurrency profits for practitioners, but 2024 turned out to be less of a banner year than predicted, with blockchain researchers reporting that the sum total of known ransom payments to ransomware groups in 2024 plummeted by 35%.
Cryptohack Roundup: Critical Ethereum Vulnerability
2 months ago
Also: Conviction in £1.5M Fraud, Sentencing in Torture and Theft Case
This week's stories include a critical Ethereum vulnerability, conviction in a £1.5M fraud, sentencing in a torture and crypto theft case, SEC's new roadmap, Jan crypto stats, Coinbase social engineering victims, and U.S. lawmakers' digital assets working group.
This week's stories include a critical Ethereum vulnerability, conviction in a £1.5M fraud, sentencing in a torture and crypto theft case, SEC's new roadmap, Jan crypto stats, Coinbase social engineering victims, and U.S. lawmakers' digital assets working group.
Ransomware: Victims Who Pay a Ransom Drops to All-Time Low
2 months ago
Incident Response Firm Reports 25% of Victims Paid - Typically for a Decryptor
The slice of organizations opting to pay extortion after being hit by ransomware dropped to an all-time low of 25%. Underpinning the drop is a combination of better defenses, improved business resilience as well as organizations simply deciding to not pay criminals.
The slice of organizations opting to pay extortion after being hit by ransomware dropped to an all-time low of 25%. Underpinning the drop is a combination of better defenses, improved business resilience as well as organizations simply deciding to not pay criminals.
Thailand to Cut Off Power to Scam Centers - Will It Work?
2 months ago
Officials Hope to Curb Global Fraud by Targeting Border Operations in Myanmar
In a drastic move to curb fraud along the Myanmar border, Thailand announced plans to cut power and telecommunications in border areas of Myanmar linked to scam operations. The move is aimed at crippling criminal syndicates running notorious call centers that orchestrate scams, financial fraud and human trafficking.
In a drastic move to curb fraud along the Myanmar border, Thailand announced plans to cut power and telecommunications in border areas of Myanmar linked to scam operations. The move is aimed at crippling criminal syndicates running notorious call centers that orchestrate scams, financial fraud and human trafficking.
Checked
9 hours 43 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed