Data on as many as 100,000 Nova Scotia healthcare staff stolen in MOVEit breach
Data on at least 100,000 employees in Nova Scotia’s healthcare sector were stolen as the result of the vulnerability in Progress Software’s MOVEit file transfer application, the province said Tuesday. Data stolen includes Social Insurance numbers, addresses and banking information of employees of Nova Scotia Health, the public service and the IWK Health Centre, which
Survey reveals insecurity increase in Software-as-a-Service (SaaS) market
A survey conducted by CSA and Adaptive Shield revealed an increase in the amount of security incidents within the Software-as-a-Service (SaaS) market. According to data, over the last two years, more than 1,000 security experts have experienced SaaS-related vulnerabilities, with 55% of them having such events. These problems include data leaks, dangerous third-party apps, data […]
Pros and cons of underwater data centers
The concept of underwater data centers, also known as data centers, submerged in water, has attracted significant attention following Microsoft’s pioneering initiative called Project Natick. While some companies recognize the potential of this innovative approach, others remain skeptical about its practicality and viability. At the core of underwater data centers lies the idea of submerging […]
Intuitive AI launches AI recycling assistant, Oscar Sort
Oscar Sort, a “smart recycling assistant” has been designed by Intuitive AI, a Canadian startup. It uses AI to simplify recycling and reduce human errors. It detects recyclable and compostable items by allowing customers to point their trash item at a screen, which determines whether or not it is recyclable. Tim Hortons, TD Garden, JPMorgan […]
Priceline partners Google AI chatbot
Priceline, a Booking Holdings subsidiary, is collaborating with Google Cloud to introduce AI technologies to its platform. This cooperation intends to enhance the trip booking experience by including interactive and conversational elements. Priceline’s CEO, Brett Keller, emphasizes the AI chatbot’s effectiveness in helping clients swiftly limit down their trip options. AI technology integration is intended […]
British Airways, BBC, Boots affected by MOVEit vulnerability
British Airways, the BBC, and U.K. pharmacy chain Boots fell victim to a data breach caused by a vulnerability in the MOVEit document-transfer application. Microsoft’s Lace Tempest team has confirmed that the breach was orchestrated by individuals associated with the Russian Clop ransomware gang. The intrusion took advantage of a flaw in Zellis’ infrastructure. Zellis […]
Palant uncovers 34 malicious browser extensions
Palant has uncovered 34 malicious browser extensions that were cleverly disguised as essential utilities like ad blockers and browser themes and have been causing havoc on an estimated 87 million users globally. Rather than collecting personal information, these extensions penetrated customers’ computers with malware, causing disruption. Some customers saw incomplete extension development, while others had […]
DHS and University of Alabama’s collaborative “Night Fury” project
In a joint effort, the Department of Homeland Security (DHS) and the University of Alabama at Birmingham (UAB) initiated a collaborative project called “Night Fury” in 2018. The project’s primary objective was to address the pressing concern of potential terrorist accounts proliferating on social media platforms. Additionally, it aimed to combat disinformation and monitor the […]
U.S. cyber command undergoes leadership change
Air Force Lt. Gen. Timothy Haugh has been appointed as the new commander of the United States Cyber Command and the head of the National Security Agency (NSA). This leadership change, initiated by President Joe Biden, follows the impending resignation of Gen. Nakasone and aims to ensure a smooth transition in the crucial cyber defense […]
Google confirms scammers’ use of the Gmail “Checkmark”
Google’s Gmail checkmark system, which uses a blue checkmark to help users identify recognized corporations and organizations, is reportedly being utilized by fraudsters to trick users and undermine its original purpose. The weakness was discovered by cybersecurity engineer Chris Plummer, who demonstrated that scammers had discovered a technique to mislead Gmail into recognizing their bogus […]