Thu.Nov 16, 2023

article thumbnail

Ukraine Tracks a Record Number of Cyber Incidents During War

Data Breach Today

Hackers Steal CCTV Footage to Study Efficacy of Missile Strikes and Drone Attacks Ukraine's national computer emergency response team, CERT-UA, says it sees an increase in cyber incidents as Russia's invasion continues. While wiper attacks are ongoing, a rising Russian hacker tactic involves stealing private CCTV footage to study the efficacy of missile strikes and drone attacks.

IT 316
article thumbnail

Alleged Extortioner of Psychotherapy Patients Faces Trial

Krebs on Security

Prosecutors in Finland this week commenced their criminal trial against Julius Kivimäki , a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report, Finnish authorities laid out how they connected the extortion spree to Kivimäki, a notorious hacker who was convicted in 2015 of perpetrating tens of thousands of cybercrimes, including data breaches, payment fraud, operating a botnet and calli

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lawsuit: Health Insurer's AI Tool 'Illegally' Denies Claims

Data Breach Today

Plaintiffs Say UnitedHealthcare Algorithm Rejects Coverage for Elderly Patients The estates of two deceased UnitedHealthcare Medicare Advantage policyholders allege in a proposed federal class action lawsuit filed this week that the insurance giant is using an AI tool to illegally deny necessary coverage for post-acute care, such as skilled nursing, to elderly plan members.

Insurance 284
article thumbnail

Topic Be Damned! AI is the Question

Weissman's World

OK, I give up. It seems that no matter what I get asked to talk about – privacy, information-related risks, the convergence of data and infogov – the first Q&A question I get these days almost always is about AI. What is it? Is it going to take my job? How do I utilize it?… Read More » Topic Be Damned! AI is the Question The post Topic Be Damned!

Privacy 156
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How State Governments Can Regulate AI and Protect Privacy

Data Breach Today

Regulating AI is "like regulating Jell-O," said Massachusetts risk counsel Jenny Hedderman, but states are looking at regulating "areas of harm" rather than AI as a whole. In this episode of "Cybersecurity Insights," Hedderman discusses privacy, third-party vendor risk, and lawyers' use of AI.

Privacy 274

More Trending

article thumbnail

CISA, FBI Issue New Warning Following Las Vegas Cyberattack

Data Breach Today

Agencies Release Joint Advisory Urging Organizations to Implement New Mitigations CISA and the FBI released an advisory recommending that critical infrastructure organizations implement a series of recommendations to thwart a unique hacking group known for targeting commercial facilities, as seen in the recent cyberattack targeting MGM Resorts International.

273
273
article thumbnail

Zimbra zero-day exploited to steal government emails by four groups

Security Affairs

Google TAG revealed that threat actors exploited a Zimbra Collaboration Suite zero-day ( CVE-2023-37580 ) to steal emails from governments. Google Threat Analysis Group (TAG) researchers revealed that a zero-day vulnerability, tracked as CVE-2023-37580 (CVSS score: 6.1), in the Zimbra Collaboration email software was exploited by four different threat actors to steal email data, user credentials, and authentication tokens from government organizations.

article thumbnail

EU AI Act Will Be an 'Enabler for Trust,' Lawmaker Says

Data Breach Today

Trilogue Talks in Final Stages, Says European Parliament Member European lawmakers behind an artificial intelligence regulation that's close to finalization predicted Thursday the law will set global standards. "We want AI to develop in Europe, and this is why we want to build a trustworthy ecosystem," said Brando Benifei.

article thumbnail

Running Signal Will Soon Cost $50 Million a Year

WIRED Threat Level

Signal’s president reveals the cost of running the privacy-preserving platform—not just to drum up donations, but to call out the for-profit surveillance business models it competes against.

Privacy 117
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google Says 4 Attack Campaigns Exploited Zimbra Zero-Day

Data Breach Today

Zimbra Patched the Cross-Site Scripting Vulnerability on July 25 A zero-day flaw in the Zimbra Collaboration email server proved to be a bonanza for hackers as four distinct threat actors exploited the bug to steal email data and user credentials, says Google. Most of the exploit activity occurred after Zimbra had posted a hotfix on July 5.

273
273
article thumbnail

Despite Hype, the Password-Free Workplace Is Still a Long Way Off

Dark Reading

More than half of organizations are nowhere near ditching passwords, even as cyberattackers continue to have a field day with workers' poor credential choices.

Passwords 119
article thumbnail

SonicWall Buys Solutions Granted to Offer MSPs More Services

Data Breach Today

Buying Master MSSP Will Bring MDR, SOC and Vulnerability Management to MSPs, MSSPs SonicWall acquired a longtime master MSSP partner to bring MDR, SOC and vulnerability management capabilities to its managed service providers. Buying Solutions Granted will help SonicWall detect and respond to endpoint or cloud-based threat activity on behalf of its MSP and MSSP partners.

Cloud 273
article thumbnail

A Spy Agency Leaked People's Data Online—Then the Data Was Stolen

WIRED Threat Level

The National Telecommunication Monitoring Center in Bangladesh exposed a database to the open web. The types of data leaked online are extensive.

Privacy 128
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

BlackCat Gang Tattles to SEC About Victim Not Disclosing Breach

Data Breach Today

Ransomware Group Says MeridianLink Didn't Tell SEC About Cyberattack Within 4 Days The BlackCat ransomware group tattled to U.S. federal regulators about an alleged victim not disclosing a material cyberattack within four business days. The group, also known as Alphv, listed MeridianLink on its data leak site and threatened to leak stolen data.

article thumbnail

Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass

Dark Reading

There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.

114
114
article thumbnail

SEC Aims to Avoid Cyber Disclosure Rule 'Compliance Burdens'

Data Breach Today

Official Says Disclosure Rule Includes Exceptions, Extensions for Smaller Companies The U.S. Securities and Exchange Commission's requirement for publicly traded companies to report cyber incidents that have a material impact within four days is "not about playing gotcha with public companies," said the commission’s director of the corporation finance division.

article thumbnail

3 Ways Behavioral Economics Obstructs Cybersecurity

Dark Reading

People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hanzo Wins “Best Use of AI for eDiscovery” In 2023 LegalTech Breakthrough Awards Program

Hanzo Learning Center

Hanzo wins 'Best Use of AI for eDiscovery' at 2023 LegalTech Breakthrough Awards, for its innovative AI-driven tool, Hanzo Illuminate with Spotlight AI.

IT 117
article thumbnail

The data quality rule of 1%: how to size for success

Collibra

In this post, we will be providing a practical walkthrough for ROI in your data quality program. When kickstarting data quality with different organizations we’ve discovered this is a common need. Questions include, ‘how many columns or assets should I govern’ and ‘how many require data quality checks’? As a governance team, we are often sizing up the landscape of large enterprises to answer these questions.

article thumbnail

APTs Swarm Zimbra Zero-Day to Steal Government Info Worldwide

Dark Reading

At least four separate campaigns against CVE-2023-37580 in the popular Zimbra Collaboration Suite aimed to siphon up reams of sensitive mail data.

article thumbnail

BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims

KnowBe4

Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber incident reporting to increase pressure on their victims. This latest maneuver highlights a sophisticated understanding of regulatory impacts in ransomware strategies.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

'Randstorm' Bug: Millions of Crypto Wallets Open to Theft

Dark Reading

The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.

Passwords 102
article thumbnail

FTC’s Voice Cloning Challenge

Schneier on Security

The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.

article thumbnail

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Dark Reading

Organizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.

article thumbnail

How to Help "Frequent Clickers" Become More Mindful

KnowBe4

Within our organizations, there are those employees who consistently exhibit mindfulness, avoiding every phishing attempt. Yet, there are also those users who, despite repeated education efforts, habitually fall prey to phishing emails and simulations, neglecting the tell-tale signs of social engineering. These individuals are known as "frequent clickers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Consumer Software Security Assessment: Should We Follow NHTSA's Lead?

Dark Reading

Vehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.

article thumbnail

US Congress Report Calls for Privacy Reforms After FBI Surveillance 'Abuses'

WIRED Threat Level

A new report by an oversight committee in the US House of Representatives says the FBI has routinely violated rules governing FISA's Section 702 surveillance program and must be reined in.

Privacy 82
article thumbnail

'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation

Dark Reading

Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.

100
100