"California AI Safety Legislation Vetoed"

"California AI Safety Legislation Vetoed"

Recently, legislation that mandated safety requirements for major artificial intelligence model developers in California was vetoed by Gov. Gavin Newsom.  Newsom said that the bill lacks consideration of the environments where the models are deployed, the data used by such models, and their purpose.  Newsome said the bill applies stringent standards to even the most basic functions so long as a large system deploys it.  Newsome said that he did not believe this was the best approach to protecting the public from real threats posed by the technology.

Submitted by Adam Ekwall on

"Patelco Credit Union Data Breach Impacts Over 1 Million People"

"Patelco Credit Union Data Breach Impacts Over 1 Million People"

Patelco Credit Union has recently informed authorities that information about more than 1 million individuals was stolen in a ransomware attack this summer.  The cyberattack was identified on June 29 and resulted in Patelco taking some of its day-to-day banking systems offline.  The company said it led to an outage affecting the union’s online banking services, mobile application, and call center.  The credit union noted that the attackers had access to its systems starting May 23 and that they stole a database containing personal information.

Submitted by Adam Ekwall on

"Hawaii Health Center Discloses Data Breach After Ransomware Attack"

"Hawaii Health Center Discloses Data Breach After Ransomware Attack"

The Community Clinic of Maui in Hawaii recently informed authorities that a cyberattack suffered earlier this year has resulted in a data breach impacting over 120,000 individuals.  The company says it detected a cybersecurity incident on May 7 and later determined that the attackers may have stolen personal data between May 4 and May 7.

Submitted by Adam Ekwall on

"Accounting Firm WMDDH Discloses Data Breach Impacting 127,000"

"Accounting Firm WMDDH Discloses Data Breach Impacting 127,000"

Public accounting firm Wright, Moore, DeHart, Dupuis & Hutchinson (WMDDH) recently started notifying over 127,000 individuals that their personal information was stolen in a July 2023 data breach.  The incident was identified on July 11, 2023, when unusual network activity was observed on WMDDH’s network.  However, it took roughly ten months for WMDDH to determine who the compromised personal information belonged to and an additional two months to identify contact information for the impacted individuals.

Submitted by Adam Ekwall on

"Cyberattacks Hit Over a Third of English Schools"

"Cyberattacks Hit Over a Third of English Schools"

According to the Office of Qualifications and Examinations Regulation (Ofqual), over a third (34%) of English schools and colleges were hit by a cyber incident in the previous academic year 2023/24.  The exam watchdog found that 20% of schools and colleges were unable to recover immediately following an incident, with 4% taking more than half a term to return to normal operations.  Additionally, 9% of headteachers admitted they had experienced a “critically damaging” cyberattack in the last academic year.

Submitted by Adam Ekwall on

2024 Colloquium for Information Systems Security Education (CISSE)

"The 2024 Colloquium for Information Systems Security Education (CISSE) celebrates its 28th anniversary as the premier Cybersecurity Education Conference. Join us to explore the latest trends in cyber education and engage with SME's from academia, government, and industry. This year's conference will convene in Tampa, Florida, from November 13th to 15th, 2024. We are delighted to welcome the University of Tampa as our esteemed host and academic partner for this event."

INTERFACE Omaha

"IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

"Russian Hackers Target Ukrainian Servicemen via Messaging Apps"

"Russian Hackers Target Ukrainian Servicemen via Messaging Apps"

The State Service of Special Communications and Information Protection of Ukraine (SSSCIP) published its "Russian Cyber Operations (H1 2024)" analysis, which revealed that Russian hackers are using messaging apps to steal personal data from Ukrainian servicemen. The research noted that hackers' capabilities are growing, and cyberspace is indeed a battlefield. Since corporate services are often secure, hackers are utilizing messaging apps such as Signal to steal data. This article continues to discuss key findings from the analysis of Russian cyber operations.

Submitted by Gregory Rigby on

"Exploding Pagers and Walkie-Talkies Are a Reminder of How Easily Your Devices Can Be Hacked"

"Exploding Pagers and Walkie-Talkies Are a Reminder of How Easily Your Devices Can Be Hacked"

Recent attacks on walkie-talkies and pagers in Lebanon bring further attention to security vulnerabilities in everyday technology. These incidents emphasize the need for people to understand device risks and take precautions in a digital world. Research findings indicate a rise in cyber threats and privacy breaches. The recent attacks in Lebanon have raised new concerns about technology security in an era where Artificial Intelligence (AI) presents significant challenges. This article continues to discuss the Lebanon device attacks and how to avoid such attacks.

Submitted by Gregory Rigby on

"Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions"

"Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions"

Government agencies from the Five Eyes countries released guidance on detecting Active Directory (AD) intrusions. According to the agencies, Microsoft AD, a popular enterprise authentication and authorization solution, is a valuable target for malicious actors. This article continues to discuss the joint guidance for identifying AD compromises.

Submitted by Gregory Rigby on
Subscribe to