Mon.Jan 29, 2024

article thumbnail

SolarWinds Requests Court Dismiss Regulator's Fraud Case

Data Breach Today

Calls Securities and Exchange Commission's Cybersecurity Allegations 'Unfounded' Network monitoring software vendor SolarWinds moved to dismiss a federal lawsuit accusing the company and its CISO of securities fraud after they allegedly misstated the efficacy of its cybersecurity controls. Russian intelligence hacked the company in an incident disclosed in 2020.

article thumbnail

NSA buys internet browsing records from data brokers without a warrant

Security Affairs

The U.S. National Security Agency (NSA) admitted to buying internet browsing records from data brokers to monitor Americans’ activity online without a court order. U.S. Senator Ron Wyden, D-Ore., released documents that confirmed the National Security Agency (NSA) buys Americans’ internet browsing records without a court order. The data acquired by the intelligence agency can reveal the websites visited by the US citizens and what apps they use.

Metadata 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Italian Regulator Again Finds Privacy Problems in OpenAI

Data Breach Today

ChatGPT Maker Has 30 Days to Respond ChatGPT maker OpenAI has 30 days to respond to the Italian data regulator after an investigation by the agency concluded the company apparently had violated European privacy laws. Europe is preparing to implement a comprehensive regulation on artificial intelligence.

article thumbnail

Experts detailed Microsoft Outlook flaw that can leak NTLM v2 hashed passwords

Security Affairs

A flaw in Microsoft Outlook can be exploited to access NTLM v2 hashed passwords by tricking users into opening a specially crafted file. The vulnerability CVE-2023-35636 impacting Microsoft Outlook is a Microsoft Outlook information disclosure issue that could be exploited by threat actors to access NT LAN Manager (NTLM) v2 hashed passwords. NTLMv2, which stands for NT LAN Manager version 2, is an authentication protocol used in Microsoft Windows networks.

Passwords 119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cybersecurity Incident Shuts Down New Jersey Schools

Data Breach Today

Thousands of Students Forced to Stay Home Amid Cybersecurity Incident A school district in Freehold Township, New Jersey was forced to close its schools and offices for thousands of students Monday after suffering a cybersecurity incident that caused technical difficulties across its network environment, administrators said.

More Trending

article thumbnail

Insurance Broker Notifying 1.5 Million of Health Info Hack

Data Breach Today

California Firm Said August Attack Affected Clients' Data A California insurance broker that handles employee benefits, workers' compensation and property liability is notifying more than 1.5 million individuals about a ransomware/data exfiltration attack last August that involved health insurance information, passport numbers and Social Security numbers.

Insurance 260
article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

I've always thought of it a bit like baseball cards; a kid has a card of this one player that another kid is keen on, and that kid has a card the first one wants so they make a trade. They both have a bunch of cards they've collected over time and by virtue of existing in the same social circles, trades are frequent, and cards flow back and forth on a regular basis.

article thumbnail

Forget Deepfake Audio and Video. Now There’s AI-Based Handwriting!

KnowBe4

Researchers have developed AI technology that can mimic someone’s handwriting with only a few paragraphs of written content. Experts worry about the possibility of misuse.

Security 102
article thumbnail

Microsoft Executives Hacked

Schneier on Security

Microsoft is reporting that a Russian intelligence agency—the same one responsible for SolarWinds—accessed the email system of the company’s executives. Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Lawmakers Tell DOJ to Quit Blindly Funding ‘Predictive’ Police Tools

WIRED Threat Level

Members of Congress say the DOJ is funding the use of AI tools that further discriminatory policing practices. They're demanding higher standards for federal grants.

article thumbnail

A New Book, “Tomorrow’s Jobs Today,” Reveals Insights Into ChatGPT, Blockchain, AI

Information Governance Perspectives

Tomorrow’s Jobs Today on Audible With AI tools like ChatGPT dramatically transforming global labor markets, this book teaches ambitious new graduates and job seekers to embrace disruption in the information age and take advantage of rare opportunities emerging in an era defined by uncertainty. Silicon Valley, CA., January 29th, 20234/PRNewswire-PRWeb/ — JIA Publishing proudly offers the follow-up edition of Tomorrow’s Jobs Today , now available in bookstores everywhere.

article thumbnail

Identify Weak User Passwords With KnowBe4’s Enhanced Weak Password Test

KnowBe4

Passwords are part of every organization’s security risk profile. Just one weak password with access to an organization’s critical systems can cause a breach, take down a network or worse. Whether we like it or not, passwords are here to stay as a form of authentication.

article thumbnail

Business continuity vs. disaster recovery: Which plan is right for you?

IBM Big Data Hub

Business continuity and disaster recovery plans are risk management strategies that businesses rely on to prepare for unexpected incidents. While the terms are closely related, there are some key differences worth considering when choosing which is right for you: Business continuity plan (BCP): A BCP is a detailed plan that outlines the steps an organization will take to return to normal business functions in the event of a disaster.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malvertising Targets Chinese-Speaking Users

KnowBe4

Researchers at Malwarebytes warn that a malvertising campaign is targeting Chinese-speaking users with phony ads for encrypted messaging apps. The ads impersonate apps that are restricted in China, such as Telegram or LINE.

article thumbnail

VulnRecap 1/29/24 – Apple, Apache & VMware Under Attack

eSecurity Planet

In this week’s urgent updates, Apple and VMware issued updates for zero-day flaws currently under attack, and researchers detected a rise in attacks on unpatched Apache and Atlassian Confluence servers. Meanwhile, the release of proof-of-concept code starts the countdown to attack on other critical vulnerabilities, including Cisco Enterprise Communication, Fortra GoAnywhere, and GitLab.

article thumbnail

Bravo Host Andy Cohen Scammed Out of a “Sizable” Amount of Money by Fraudsters Posing as the Bank

KnowBe4

Bravo host Andy Cohen tells how he became the victim of an impersonation scam that gave scammers access to and control over his bank account.

Access 105
article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

How 5G Operators Can Prepare for The Quantum Era madhav Tue, 01/30/2024 - 05:25 The Quantum State of Play in 5G Quantum computing has found theoretical application in modern computation systems, including cellular networks like 5G. However, privacy and data security concerns are set to play a vital role as new vendors and technologies emerge to capitalize on 5G capabilities.

Risk 71
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Scammers Use Airdrops to Lure Users With Phony NFTs

KnowBe4

Researchers at Check Point warn that scammers are using airdrops to distribute phony n on-fungible tokens ( NFTs) that direct users to malicious sites.

article thumbnail

The blueprint for a modern data center 

IBM Big Data Hub

Part one of this series examined the dynamic forces behind data center retransformation. Now, we’ll look at designing the modern data center, exploring the role of advanced technologies, such as AI and containerization, in the quest for resiliency and sustainability. Strategize and plan for differentiation As a leader, you need to know where you want to take the business—understanding the trajectory of your organization is nonnegotiable.

Cloud 70
article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from January 2024

KnowBe4

Check out the January updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

Upcoming Webinars via Informata

IG Guru

Upcoming Industry Meetings and Webinars – January 16-February 15, 2024 The post Upcoming Webinars via Informata first appeared on IG GURU.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What’s new in OpenText Business Network Cloud

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes exciting updates to the OpenText™ Business Network Cloud. Check out the latest updates below. January 2024: What’s new in OpenText Business Network Cloud Edition 24.1? AI-Assisted Process Automation for Trading Partner Set-up OpenText is the leader in information management. OpenText Cloud Editions (CE) equips organizations with … The post What’s new in OpenText Business Network Cloud appeared first on OpenText Blogs.

Cloud 62
article thumbnail

California EDD Prepaid Debit Card SMISHING Scam

PerezBox

This morning I received a text message informing me that my California EDD Prepaid Debit Card was being suspended with a deposit of $6,390 until I verified my Bank of America credit card: If you don’t live in California, this screams scam; but if you live in California and work with the CA EDD this… The post California EDD Prepaid Debit Card SMISHING Scam appeared first on PerezBox.

article thumbnail

Optimize the Sales experience with a complete customer view

OpenText Information Management

As the digital landscape for sales teams has shifted over recent years, so too have consumer expectations. Customers are used to the convenience and speed of information and digital transactions in their day-to-day lives. Now emerging artificial intelligence (AI) technologies make it even faster and easier to self-serve in business interactions. Customers want quick responses, … The post Optimize the Sales experience with a complete customer view appeared first on OpenText Blogs.

Sales 57
article thumbnail

The Little Girl with the Big Voice

Information Governance Perspectives

Despite her success as one of the most recognizable performers of the Golden Age and a fifty-year career in show business, Mary Small, the original Little Girl with the Big Voice, disappeared into obscurity, died penniless, and was buried in an unmarked grave. This revealing biography by her long-lost grandson breathes new life into the obituary she never received yet so richly deserved.

52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The latest news from Archive-It, January 2024

Archive-It

by the Archive-It team Call for Proposals Advancing Inclusive Computational Research with ARCH The Internet Archive invites applications to Advancing Inclusive Computational Research with ARCH. This pilot program will support less well-resourced organizations throughout the world with access to the Archives Research Compute Hub (ARCH) and thousands of web archive collections, technical support and training, and learning opportunities with a supportive cohort of peers.

article thumbnail

Tears From Heaven’s Fountain

Information Governance Perspectives

A young man dies before his time and is accepted into heaven. He wanders around for a bit before approaching an angel. “Is everything okay?” the angel asks, seeing the man is all alone. “Yes, I suppose,” the man answers. “But I’m thirsty. Is there no place where I can have a drink?” The angel points to a faucet behind him and says, “There. Drink as much as you wish.

IT 52
article thumbnail

How does data deduplication work?

IBM Big Data Hub

Recent years have witnessed an explosion in the proliferation of self-storage units. These large, warehouse units have sprung up nationally as a booming industry because of one reason—the average person now has more possessions than they know what to do with. The same basic situation also plagues the world of IT. We’re in the midst of an explosion of data.