Cyber security

Search documents
Hacker breaches FEMA networks, steals employee data over several months
MINT· 2025-09-30 00:44
A hacker gained access to the Federal Emergency Management Agency’s computer networks for several months earlier this year and stole information about FEMA and US Customs and Border Protection employees, according to an overview of the incident.The Department of Homeland Security notified FEMA on July 7 that a hacker had gained access to its network through Citrix Systems Inc.’s remote desktop software using compromised credentials, according to the summary, which was reviewed by Bloomberg News. The intrude ...
Investors should be owning things beyond tech, says Hightower's Stephanie Link
CNBC Television· 2025-09-29 10:58
Economic Outlook - The Atlanta Fed tracker estimates Q3 GDP growth at approximately 39%, following a 38% growth in Q2 [2] - New home sales experienced a significant increase, rising 20% month-over-month and 15% year-over-year [3] - The market anticipates potential sideways movement in the short term, but expects a positive earnings outlook for the next quarter and Q4 overall [4] - The economy could slow to 25%, but the earnings picture will still be good [21] Labor Market Analysis - Weekly jobless claims are a key indicator, with current levels around 230000 per week based on the four-week moving average, considered healthy [2] - An increase in weekly jobless claims to approximately 250000-260000 would raise concerns, while recession levels are typically around 350000-375000 [17] - Wage growth is currently around 5%, supporting consumer spending [18] Investment Strategies - The market suggests owning stocks beyond the tech sector, highlighting housing and autos as potential recovery areas with lower interest rates [6][7] - Financials, particularly large-cap banks, are expected to perform well, with Morgan Stanley raising targets due to strong numbers and relatively cheap valuations [7] - The industrial sector and data center investments are expected to continue performing well with good visibility [8] - Cyber security is in early stages and driven by AI, consolidation is expected in the sector [11][12] Company Specific Recommendations - Capital One is favored due to its acquisition of Discover Financial, creating a scalable payments network, with potential earnings power of $26 per share and excess capital for shareholder returns [9][10] - CrowdStrike and Palo Alto Networks are recommended in the cyber security sector, despite CrowdStrike's higher price-to-sales ratio of 27 times, while Palo Alto is cheaper at 14 times [13] Monetary Policy Impact - The anticipated lowering of interest rates by the Federal Reserve is expected to shift money from money market accounts into investment opportunities [14] - Approximately $75 trillion is currently held in money market accounts, with a portion expected to seek better yields as rates decrease [15] Risk Factors - The labor market is the primary concern, with weekly jobless claims being a key indicator to watch for potential economic softening [16] - A government shutdown is not considered a major concern, with expectations of a short-lived impact and potential buying opportunities [19][20]
Palo Alto CEO Nikesh Arora goes one-on-one with Jim Cramer
CNBC Television· 2025-09-05 00:13
Let's talk about Palo Alto Network's wild ride. This cyber security kingpinman is a longtime holding for the travel trust and it has been a huge winner for the CBC Investing Club. But late July, the stock got clobbered after it learned about it $25 billion plan to acquire Cyber Arc, another heavy hitter that's all about protecting so-called administer accounts, the top target for hackers.Wall Street was worried that this deal was a colossal overpay meant to cover up some sort of slowdown in the core busines ...
Google says hackers stole its customers' data in a breach of its Salesforce database
TechCrunch· 2025-08-06 12:05
Core Insights - Google has confirmed a data breach involving customer information from one of its Salesforce database systems, which is used for storing contact information for small and medium businesses [1][2] - The hacking group responsible, known as ShinyHunters (UNC6040), has a history of targeting large companies and their cloud-based databases [2][3] - The stolen data consists mainly of basic business information that is largely publicly available, such as business names and contact details [2] Data Breach Details - Google did not disclose the number of affected customers, and there is no information on whether a ransom demand has been made [2] - This incident is part of a broader trend of breaches targeting Salesforce cloud systems, with recent incidents involving companies like Cisco and Qantas [3] - ShinyHunters employs voice phishing techniques to gain access to cloud-based Salesforce databases [3] Potential Threats - Google indicated that ShinyHunters may be preparing a data leak site, a tactic used by ransomware gangs to extort companies by publishing stolen data [4] - The group has connections with other cybercriminal organizations, including The Com, which is known for hacking, extortion, and threats of violence [4]
Check Point Software Leads Email Security Rankings in 2025 GigaOm Radar Anti-Phishing Report
Globenewswire· 2025-07-30 14:54
Core Insights - Check Point Software Technologies has been recognized as a Leader and Outperformer for its Harmony Email & Collaboration security solution in GigaOm's latest Radar for Anti-Phishing report, highlighting its advanced phishing and malware prevention capabilities driven by innovations like Infinity AI Copilot [1][2] Group 1: Recognition and Evaluation - GigaOm evaluated 16 leading solutions for anti-phishing, with Check Point's Harmony Email & Collaboration earning top scores in emerging features and business criteria, showcasing its effectiveness against AI-driven phishing attacks [2][3] - The recognition emphasizes Check Point's commitment to redefining threat prevention across communication channels and endpoints, with a comprehensive platform that stops various threats before they reach users [2] Group 2: Innovations and Features - Check Point was classified as an Outperformer due to its strong focus on emerging threats and a comprehensive set of innovations, including Infinity AI Copilot and an extensive security roadmap [3] - The Harmony Email & Collaboration solution integrates seamlessly with a wide range of security tools, enabling automated threat response and streamlined operations across existing security stacks [5] Group 3: Advanced Threat Intelligence - The solution leverages ThreatCloud AI's 300+ machine learning features to analyze metadata, attachments, and behavior patterns, automatically blocking compromised accounts and extending phishing protection to mobile devices [5] - Flexible consumption options are available, allowing organizations to tailor protection to their needs with various packages and optional add-ons [5]
Hackers leak thousands of photos and IDs from users in Tea app data breach
NBC News· 2025-07-30 03:00
Download Tea. You can literally look up so many things. It was marketed as an app for women to talk safely and anonymously about the men they're dating. Just download the tea app, type in his name, and you can literally see if he has red flags or green flags. Now, it's a nationwide security nightmare. What are we doing about the T app leak? Like, this is not okay. The T app announcing a massive data breach to their systems last week. Roughly 72,000 images, including 13,000 verification selfies and images of ...
From Copilot to Colleague: Building Trustworthy Productivity Agents for High-Stakes Work - Joel Hron
AI Engineer· 2025-07-23 12:15
AI转型与策略 - 行业 North Star 从 "helpfulness"(有用)转变为 "productive"(生产力),要求 AI 系统生成输出和决策 [1][7] - Agentic AI 被视为一个可调节的 spectrum,根据用例调整 autonomy(自主性)、context(上下文)、memory(记忆)和 coordination(协调)等 levers [9][10][11][12][13] - 构建 Agentic AI 系统时,应着眼于整个问题,而不是过度关注 MVP(最小可行产品),构建完整系统后再进行优化 [21][31] 行业应用与技术 - Thomson Reuters 拥有 4,500 名领域专家,并拥有超过 1.5 terabytes 的专有内容,为软件产品提供支持 [4] - Thomson Reuters 每年在 AI 产品开发上投入超过 2 亿美元 [5] - 通过分解传统应用程序,将组件作为工具提供给 agents 使用,为旧系统注入新的活力 [20][31] 评估与挑战 - Evals(评估)是 AI 开发中最困难的部分,用户期望确定性,但这与 AI 系统的运作方式不符 [15] - 人工评估结果存在高度 variability(变异性),即使是同一批领域专家,对相同数据的评估结果也会有 10% 以上的波动 [15] - 在构建具有更高 agency(代理能力)的系统时,引用源材料变得更具挑战性,agents 可能会出现 drift(漂移),难以追踪原因 [17]
Bugprints | Bhuvanyu Mammula | TEDxOOBSchool
TEDx Talks· 2025-07-03 15:19
Cybersecurity Vulnerabilities - A single human error in server configuration can cost millions, exposing the fragility of current systems [1] - Current cybersecurity measures often fail because they expect perfect user behavior, which is unrealistic [3] - Users commonly reuse passwords, ignore updates, and click on suspicious links, highlighting human fallibility [3] Proposed Solution: Behavioral Biometrics - The industry should shift from building systems against human error to building systems based on it [4] - "Baffins" leverages unique digital fingerprints, such as typing rhythm and hesitation patterns, for identification [5][6] - Imperfections can be used as identifiers, creating a login system that recognizes how a user makes mistakes [6] - The system can detect anomalies, such as unusually quick updates, as potential security threats [6] - Typing rhythm, speed, and pressure can be used as security measures to recognize users [7] Future Vision - Security systems should not expect perfect behavior but instead accommodate user imperfections [8] - The industry should stop chasing perfection and start building systems that work because of imperfections [9] - Perfection itself may be a vulnerability [9]
Doran: The market has had a big V-shaped recovery since April
CNBC Television· 2025-06-20 11:35
Market Trends & Economic Outlook - The market experienced a V-shaped recovery since April, supported by solid economic data [2] - The Fed lowered its GDP forecast and raised its inflation forecast for the second time this year [2] - Investors anticipate some impact from tariffs, but it's largely discounted in the market [2] - The market is expected to be rangebound in the near term due to a lack of immediate catalysts [6] Investment Opportunities & Risks - Gold (GLD) has had a significant run, up over 26% year-to-date, but may experience a pullback in the near term [7] - Central banks are structurally shifting foreign currency reserves out of the dollar and into gold [9] - Emerging markets central banks have increased their gold buying by five times every year [11] - Cybersecurity (CIBR) is a secular theme, with the cybersecurity ETF outperforming the S&P [14] - Cybersecurity threats are expected to become more sophisticated and intense, making companies like Crowd Strike and Palo Alto core portfolio holdings [15] Geopolitical Factors - The Iran-Israeli conflict seems contained and is not expected to have a major market impact [6] - Russia's invasion of Ukraine in 2022 and the freezing of their $300 billion in foreign reserves prompted central banks to diversify into gold [10]
Can We Build Technology We Actually Trust? | Nia Luckey | TEDxSugar Creek Women
TEDx Talks· 2025-06-16 16:54
Core Argument - The core argument is that trust in technology and teams is not solely a technical issue but a deeply human one, requiring a new approach called the "trust protocol" [2][3][5] - The trust protocol is based on three pillars: authentication, encryption, and resilience, which are crucial for individual, team, and organizational performance [6] Trust Protocol Pillars - Authentication is about proving identity and showing up authentically, reliably, and dependably, which is essential for team performance and preventing system failures [7] - Encryption involves creating safe spaces where personal and professional boundaries are respected, allowing for open conversations about what is broken and how to fix it [10] - Resilience is about preparing for mistakes and bouncing back stronger, preserving trust through inevitable challenges [12] Implications and Examples - A single compromised password, as seen in the Colonial Pipeline attack of 2021, can lead to significant consequences due to broken authentication and a lack of trust in alerts [8] - Technology failures are often caused by a combination of human mistrust and misuse rather than bad coding, with 70% of failures attributed to this combination [11] - Fostering deeper human connections lays the groundwork for the future, step by step, choice by choice, driving progress forward [14][15]