Mon.Mar 25, 2024

article thumbnail

US Indicts Accused APT31 Chinese Hackers for Hire

Data Breach Today

Prosecutors Say China Set Up a Wuhan Front Company for Geopolitical Hacks U.S. federal prosecutors indicted seven Chinese nationals they accuse of hacking for a Beijing economic and intelligence espionage group whose operations reacted to geopolitical trends. The suspects allegedly were contractors for a front company set up by an arm of the Ministry of State Security.

Security 299
article thumbnail

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The Last Watchdog

The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. Related: More background on CSF However, it’s important to note that most of the framework core has remained the same. Here are the core components the security community knows: Govern (GV): Sets forth the strategic path and guidelines for managing cybersecurity risks, ensuring harmony with business go

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Protection Fines: UK Privacy Watchdog Updates Guidance

Data Breach Today

Regulator Emphasizes Upside of Transparency, Downside of Intentional Infringement After suffering a data breach, organizations that work closely with regulators and cybersecurity officials will be treated with greater leniency if their case results in penalties and a fine, says new guidance on data protection fines published by the U.K. Information Commissioner's Office.

Privacy 292
article thumbnail

CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. CVE-2023-48788 Fortinet FortiClient EMS SQL Injection Vulnerability CVE-2021-44529 Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulne

IT 120
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hospitals Lobby Feds to Clarify Breach Duties in UHG Attack

Data Breach Today

AHA Wants Change Healthcare on Hook for Notification in Potential Breach As thousands of hospitals, clinics and doctor practices potentially have to notify millions of patients about the Change Healthcare breach, the American Hospital Association said the IT services firm and parent company, UnitedHealth Group, should be the sole sender of notifications.

IT 292

More Trending

article thumbnail

European Commission to Investigate Meta Subscription Model

Data Breach Today

'Pay or Consent' May Violate the Digital Services Act, Say EU Officials The European Commission will scrutinize Meta's pivot to a subscription model in response to a string of rulings from data protection boards limiting the social media giant's ability to legally collect user data. Europe announced a slew of investigations into American big-tech companies.

290
290
article thumbnail

GoFetch side-channel attack against Apple systems allows secret keys extraction

Security Affairs

Researchers demonstrated a new side-channel attack, named GoFetch, against Apple CPUs that could allow an attacker to obtain secret keys. A team of researchers from several US universities demonstrated a new microarchitectural side-channel attack named GoFetch that could allow attackers to extract secret keys from systems using Apple CPUs. GoFetch side-channel attack can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs).

Libraries 113
article thumbnail

Why Endpoint Security Tools Are Still Such a Challenge

Data Breach Today

LinkedIn Chief Security Architect Calls for More Integration of Devices, Identities Despite advances in endpoint security, Sergei Rousakov, chief security architect at LinkedIn, said the landscape remains complex. He said endpoint tools need to take a more integrated approach that includes identity and device context to truly protect against cybersecurity threats.

Security 289
article thumbnail

There Is Only So Much Lipstick You Can Put on a Cybercriminal Troll

KnowBe4

The one thing I love about our annual conference in Orlando, KB4-CON, is its thought-provoking nature. Year after year, the events team manages to keep a fine balance between product updates and thought leadership talks. The convention is the best time to shine for all of us at KnowBe4, and nothing is shinier these days than the promise of an AI-powered future.

IT 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The AI Revolution and White-Collar Workers

Data Breach Today

Will AI Be a Catalyst for Innovation or a Source of Displacement? If we proactively tackle the complexities of the AI revolution, we can ensure that it serves as a catalyst for innovation rather than a source of displacement. With thoughtful planning and inclusive policies, the integration of AI into the professional world can enhance human potential.

IT 284
article thumbnail

FBI: Losses Due to Cybercrime Jump to $12.5 Billion as Phishing Continues to Dominate

KnowBe4

The FBI’s Internet Crime Complaint Center (IC3) newly-released Internet Crimes Report provides an unbiased big picture of the cyber crimes that were the most used and most successful.

Phishing 109
article thumbnail

UK Discloses Chinese Espionage Activities

Data Breach Today

Deputy Prime Minister Says Violet Typhoon Is Behind Attacks on UK Politicians Chinese state hackers targeted multiple British politicians, the U.K. government said Monday in a coordinated disclosure of Chinese state hacking activities designed to ramp up international pressure on Beijing. The British government summoned the Chinese ambassador to the Foreign Office.

article thumbnail

Ahead of the curve: How generative AI is revolutionizing the content supply chain

IBM Big Data Hub

The global adoption of generative AI is upon us, and it’s essential for marketing organizations to understand and play in this space to stay competitive. With content demands expected to grow in the next few years, organizations need to create more content at a faster pace to meet customer expectations and business needs. Knowing how to manifest these improvements is not always clear: Enter generative AI and the content supply chain.

Risk 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Report Urges Congress to Form an Armed Cyber Military Branch

Data Breach Today

Research Shows Military Suffers From Disjointed Cyber Operations Amid New Threats The Foundation for Defense of Democracies on Monday released a white paper that urges Congress to establish a seventh military branch to serve as an independent armed cyber service amid growing threats in cyberspace from foreign adversaries such as Russia and China.

Military 276
article thumbnail

Cloud-Conscious Cyber Attacks Spike 110% as Threat Groups Sharpen their Attack Skills

KnowBe4

Cybercriminals are catching up to all the digital transformation done over the last decade, as new data shows increased expertise in leveraging and.

article thumbnail

Go behind the scenes for the Jaguar TCS Racing Team’s 100th Race: A Formula E Milestone

OpenText Information Management

Ready for an electrifying ride? The Jaguar TCS Racing Team is gearing up for a monumental milestone - their 100th race in the heart-pounding world of Formula E. And, guess what? You're invited to join in the excitement. But this isn't just any race: it's a celebration of speed, innovation, and the sheer will to win. Join us as we explore how the team uses OpenText AI and Analytics software to optimize their way to more victories, points, and podium finishes.

Analytics 104
article thumbnail

Celebrating the women of IBM AI Ethics

IBM Big Data Hub

For more than 100 years, IBM’s founding principles have inspired efforts to promote equality, fairness and inclusion in the workplace and society. The company has lived the value of “respect for the individual” by championing employment practices that reward ability over identity and that make work more attainable for all. In 1935, approximately twenty years after IBM was founded, it began hiring women into professional roles.

Risk 103
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Average Malicious Website Exists for Less Than 10 Minutes

KnowBe4

A new Chrome update brings to light Google findings about malicious websites that have serious implications on detecting malicious links, spoofed brands and the use of legitimate web services.

article thumbnail

Chinese Hackers Charged in Decade-Long Global Spying Rampage

WIRED Threat Level

US and UK officials hit Chinese hacking group APT31 with sanctions and criminal charges after they targeted thousands of businesses, politicians, and critics of China.

article thumbnail

Mitigating the impact of climate change in insurance and other financial services  

IBM Big Data Hub

As the effects of climate change intensify, extreme weather events are becoming increasingly frequent and severe. The US experienced 25 extreme weather events in 2023, each causing losses of over USD 1 billion, with a total cost of USD 73.8 billion. These climate events have a huge potential impact on financial institutions. In 2021, large-scale floods affected the European countries of Austria, Germany, Belgium, the Netherlands and Luxembourg, causing USD 43 billion worth of damage in addition

article thumbnail

New Hampshire’s Comprehensive Data Privacy Legislation

Data Matters

As the state boasting the headquarters of the International Association of Privacy Professionals, many have been watching the development of the New Hampshire comprehensive consumer data privacy law with great interest, wondering if it may be a practical model for the nation. On March 6, 2024, Governor Chris Sununu signed SB 255-FN (“the Act”) into law.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Vulnerability Recap 3/25/24 – More Ivanti Issues to Patch

eSecurity Planet

While only a few major vulnerabilities emerged this week, Ivanti announced another notable set of flaws in both its Standalone Security and Neurons for ITSM products. We also saw a physical security issue in Saflok electronic locks, which affects hotels in over a hundred countries. Fortra, Apple, and Amazon Web Services had vulnerabilities, too. IT teams should pay close attention to vulnerability news so they know when and how to patch their business systems.

article thumbnail

HID Connects Podcast Season 2 Episode 4 — Physical Security: What Is “Open” & Why Does It Matter?

HID Global

Security and privacy is crucial for all types of organizations. So, what does “open architecture” mean in the context of security? We go over the details in this podcast.

article thumbnail

Unexpected behavior: Microsoft Entra ID Platform Single Sign-On and Device Compliance

Jamf

Customers using the private preview of Microsoft Entra ID Platform Single Sign-On extension (PSSOe) are experiencing an issue with Device Compliance registration which causes devices to become non-compliant and marked as unmanaged. Guidance follows on how to check settings for the configuration profiles for Single Sign-On and how to remediate affected devices.

article thumbnail

Keeping collections community shaped

CILIP

CILIP Copyright COnference 2024 By Paul Howarth , Head of Content and Resource Development, Suffolk Libraries. At its heart, successful public library collection management is about providing materials that meet the needs of our communities. That’s a given, but communities are not static things; their interests, needs and demands are constantly changing.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Unexpected behavior: Microsoft Entra ID Platform Single Sign-On and Device Compliance

Jamf

Customers using the private preview of Microsoft Entra ID Platform Single Sign-On extension (PSSOe) are experiencing an issue with Device Compliance registration which causes devices to become non-compliant and marked as unmanaged. Guidance follows on how to check settings for the configuration profiles for Single Sign-On and how to remediate affected devices.

article thumbnail

The Passwordless World Is Here. Is Your Business Part of It?

HID Global

Embrace a passwordless future with RFID technology for seamless, secure workplace access. Discover how to improve identity authentication & security today.

article thumbnail

Webinar: Preserve365: World-Class Digital Preservation in your Microsoft 365 environment via Preservica on March 26th at 11am ET

IG Guru

You have only a few days left to register with Preservica on March 26th at 11am ET for a live replay of our launch webinar featuring a panel of industry experts who explore the challenges and importance of managing long-term records in Microsoft 365. Don’t miss out on our demonstration of how Preserve365 works and […] The post Webinar: Preserve365: World-Class Digital Preservation in your Microsoft 365 environment via Preservica on March 26th at 11am ET first appeared on IG GURU.