Day: August 2, 2022

How to Block Websites on iPhone (& Any Device) — A Guide for Parents Looking to Minimize Distractions

The internet is filled with distracting, explicit, or even dangerous content. Thankfully, you can get around it easily by blocking websites. Whether you’re trying to block websites to protect children from seeing inappropriate videos or minimize distractions, we’ve got you covered. With our simple guide, you’ll learn how to quickly create blocklists on iPhone, Android, …

How to Block Websites on iPhone (& Any Device) — A Guide for Parents Looking to Minimize Distractions Read More »

Ex-Twitter Worker's Codefendant Slipped FBI, Jury Told

By Bonnie Eslinger (August 2, 2022, 11:42 PM EDT) — A California federal jury considering criminal charges against an ex-Twitter employee accused of helping Saudi Arabia spy on critics heard FBI testimony Tuesday that another former Twitter worker charged in the case remains at large after slipping FBI surveillance, taking an Uber to the airport …

Ex-Twitter Worker's Codefendant Slipped FBI, Jury Told Read More »

Netskope Expands Into Cloud Networking With Infiot Purchase

Cloud Security , Critical Infrastructure Security , Digital Identity Acquisition to Offer Netskope Customers the Entire SASE Stack in One Place Michael Novinson (MichaelNovinson) • August 2, 2022     Naveen Palavalli, vice president and head of product, solutions and tech marketing, Netskope (Image: Netskope) With its acquisition of Infiot this week, Netskope now carries …

Netskope Expands Into Cloud Networking With Infiot Purchase Read More »

How a crypto bridge bug led to a $200m ‘decentralized crowd looting’

Cryptocurrency bridge service Nomad, which describes itself as “an optimistic interoperability protocol that enables secure cross-chain communication,” has been drained of tokens notionally worth $190.7 million if exchanged for US dollars. “We are working around the clock to address the situation and have notified law enforcement and retained leading firms for blockchain intelligence and forensics,” …

How a crypto bridge bug led to a $200m ‘decentralized crowd looting’ Read More »

Comcast Business collaborates with Fortinet to help enterprises protect their distributed workforces

Comcast Business forms a strategic partnership with Fortinet to deliver enterprises a new set of secure access service edge (SASE), and security service edge (SSE) solutions to help enterprises protect their distributed workforces using a cloud-delivered approach to security policy enforcement. This collaboration expands Comcast Business’s managed services expertise, while giving enterprises greater flexibility to …

Comcast Business collaborates with Fortinet to help enterprises protect their distributed workforces Read More »

Accenture acquires Tenbu to expand data and AI capabilities across the cloud continuum

Accenture has acquired Tenbu. With more than 150 certifications, Tenbu’s team of 170 data specialists will join the Data & AI team within Accenture Cloud First. Terms of the acquisition were not disclosed. “Our goal is to help clients with total enterprise reinvention by building their digital core, optimizing operations and accelerating growth – and …

Accenture acquires Tenbu to expand data and AI capabilities across the cloud continuum Read More »

Netskope acquires Infiot to provide users with optimized connections between any enterprise location

Netskope announced it has acquired Infiot, a pioneer in enabling secure access with zero trust security, network and application optimization, and AI-driven operations. As Netskope Borderless WAN, the addition of Infiot’s technology will enable Netskope customers to apply uniform security and quality of experience (QoE) policies to the widest range of hybrid work needs, from …

Netskope acquires Infiot to provide users with optimized connections between any enterprise location Read More »

Taiwanese President and Top Govt Sites Hit by DDoS Attacks Amid Pelosi visit

The DDoS attacks also targeted the country’s largest airport, the Defence and Foreign Ministry. As US House Speaker Nancy Pelosi began her visit to Taiwan, the island nation’s websites were hit with a series of DDoS attacks (Distributed Denial-of-Service attacks). While it is not yet clear who was behind the attacks, experts say that they …

Taiwanese President and Top Govt Sites Hit by DDoS Attacks Amid Pelosi visit Read More »

Recent Exploits of Blockchain Bridges Highlight Need for Cybersecurity in Crypto and Risk of Liability

According to recent media reports there have been several instances of blockchain bridges being hacked this year, including reports on August 2 that a bridge lost close to $200 million to upwards of 40 hackers who exploited a bug in its protocol, and reports in June that another bridge lost $100 million from hackers allegedly …

Recent Exploits of Blockchain Bridges Highlight Need for Cybersecurity in Crypto and Risk of Liability Read More »

Change CEO Says UnitedHealth Deal Won't Harm Rivals

By Bryan Koenig (August 2, 2022, 10:28 PM EDT) — Change Healthcare’s CEO testified on Tuesday as part of the U.S. Department of Justice’s efforts to preserve the health care technology company’s value as an “independent” source of health insurance claims data for UnitedHealth Group’s insurer rivals, only to repeatedly argue that the agency’s challenge …

Change CEO Says UnitedHealth Deal Won't Harm Rivals Read More »

Troy Leach joins Cloud Security Alliance as Chief Strategy Officer

Troy Leach has joined Cloud Security Alliance as Chief Strategy Officer, reporting to the offices of the CEO and President. The announcement comes five months after Leach joined CSA as Security Executive in Residence. In addition to focusing on corporate strategy, Leach will bring forward his expertise through his leadership of a variety of external …

Troy Leach joins Cloud Security Alliance as Chief Strategy Officer Read More »

Large Language AI Models Have Real Security Benefits

GPT-3, the large neural network created with extensive training using massive datasets, provides a variety of benefits to cybersecurity applications, including natural-language-based threat hunting, easier categorization of unwanted content, and clearer explanations of complex or obfuscated malware, according to research to be presented at the Black Hat USA conference next week. Using the third version …

Large Language AI Models Have Real Security Benefits Read More »

Big Clinic Breach Tied to Vendor's 2021 Ransomware Attack

3rd Party Risk Management , Governance & Risk Management , Healthcare Florida Urgent Care Center Says Incident Involved Billing Vendor PracticeMax Marianne Kolbasuk McGee (HealthInfoSec) • August 2, 2022     An operator of Florida urgent care clinics is only now reporting to federal regulators a health data breach affecting hundreds of thousands of individuals …

Big Clinic Breach Tied to Vendor's 2021 Ransomware Attack Read More »

Aetna Reports 326,000 Affected by Mailing Vendor Hack

Insurer Says OneTouchPoint Was a Subcontractor Marianne Kolbasuk McGee (HealthInfoSec) • August 2, 2022     Health insurer Aetna ACE reported to federal regulators a health data breach affecting nearly 326,000 individuals tied to an apparent ransomware incident involving OneTouchPoint, a subcontractor that provides printing and mailing services to one of the insurer’s vendors. See …

Aetna Reports 326,000 Affected by Mailing Vendor Hack Read More »

Massive New Phishing Campaign Targets Microsoft Email Service Users

Researchers are warning about a new, large-scale phishing campaign aimed at Microsoft Outlook email services users. The team at ThreatLabz discovered the new phishing kit and said it uses an adversary-in-the-middle (AiTM) model, which can be effective for evading detection by email and network security protections, as well as bypassing multifactor authentication protections. ThreatLabz researchers …

Massive New Phishing Campaign Targets Microsoft Email Service Users Read More »