Tue.Dec 12, 2023

article thumbnail

UK Downplays Ransomware Threat at Its Peril, Says Committee

Data Breach Today

Parliamentary Committee Says UK Must Be More Aggressive A U.K. parliamentary committee investigating ransomware threats recommended a more aggressive stance against threat actors and said the government should consider making incident reporting mandatory and provide government support for public sector victims "to the point of full recovery.

article thumbnail

Microsoft Patch Tuesday, December 2023 Edition

Krebs on Security

The final Patch Tuesday of 2023 is upon us, with Microsoft Corp. today releasing fixes for a relatively small number of security holes in its Windows operating systems and other software. Even more unusual, there are no known “zero-day” threats targeting any of the vulnerabilities in December’s patch batch. Still, four of the updates pushed out today address “critical” vulnerabilities that Microsoft says can be exploited by malware or malcontents to seize complete c

IT 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Ukrainian Mobile Operator Kyivstar Hit by Cyberattack

Data Breach Today

Ukrainian President Volodymyr Zelenskyy Is in Washington Ukrainian telecom operator Kyivstar was the target of a cyberattack that knocked internet access and mobile communications offline on the same day Ukrainian President Volodymyr Zelenskyy is in Washington to boost the case for additional military aid.

Military 301
article thumbnail

Dubai’s largest taxi app exposes 220K+ users

Security Affairs

The Dubai Taxi Company (DTC) app, which provides taxi, limousine, and other transport services, left a database open to the public, exposing sensitive customer and driver data. Dubai Taxi Company, a subsidiary of Dubai’s Roads and Transport Authority, leaked a trove of sensitive information from the DTC app, the Cybernews research team has found. Over 197K app users and nearly 23K drivers were exposed.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Lazarus Exploits Log4Shell to Deploy Telegram-Based Malware

Data Breach Today

North Korean Hackers Deploy Novel Malware Families North Korean hacking group Lazarus Group is exploiting Log4Shell to target manufacturing, agriculture and physical security sectors, resulting in the deployment of a tailored implant on compromised systems. The attack campaign targeted publicly accessible VMware Horizon servers.

More Trending

article thumbnail

Addressing Privacy and Data-Sharing Hurdles in Healthcare AI

Data Breach Today

Workarounds for Advancing AI in Administrative and Clinical Uses AI holds tremendous promise for both the administrative and clinical sides of healthcare, but obstacles still remain. One of the major hurdles is tied to patient privacy and the sharing of vast amounts of data needed to effectively tune AI models. What are some workarounds?

Privacy 270
article thumbnail

Navigating the Future: ACEDS and Hanzo Illuminate Collaboration Data Challenges in the Legal Sector

Hanzo Learning Center

In the ever-evolving world of legal technology, the annual webinar co-hosted by the Association of Certified E-Discovery Specialists (ACEDS) and Hanzo has become a beacon of insight and guidance. This year, marking the fourth collaboration between ACEDS and Hanzo, the webinar brought together a panel of seasoned professionals, each offering a unique perspective on the challenges and future of legal industry collaboration data.

article thumbnail

Northern Ireland's Police Service to Revamp Cybersecurity

Data Breach Today

Independent Review Issues 37 Recommendations to Police Service of Northern Ireland Following an information security breach rated as the worst in U.K. policing history, which exposed all serving Northern Ireland police officers' personal details online, officials have promised to implement data protection and cybersecurity changes recommended by an independent review.

article thumbnail

Apple released iOS 17.2 to address a dozen of security flaws

Security Affairs

Apple rolled out emergency security updates to backport patches for two actively exploited zero-day flaws to older devices. The company released iOS 17.2 and iPadOS 17.2 which address a dozen of security flaws. The most severe flaw is a memory corruption issue that resides in the ImageIO. Successful exploitation of the flaw may lead to arbitrary code execution.

Security 116
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Who's Calling? Spam, Scams and Wasted Time

KnowBe4

First ever insight into those annoying spam calls provides enlightening detail into how many calls are there, where are they coming from, and how much time is wasted dealing with them.

article thumbnail

Kyivstar, Ukraine’s largest mobile carrier brought down by a cyber attack

Security Affairs

Kyivstar, the largest Ukraine service provider, was hit by a cyber attack that paralyzed its services. The attack is linked to the ongoing conflict. Kyivstar , the largest Ukraine service provider was down after a major cyber attack. The Ukrainian telecommunications company provides communication services and data transmission based on a broad range of fixed and mobile technologies, including 4G (LTE) in Ukraine.

article thumbnail

New Windows/Linux Firmware Attack

Schneier on Security

Interesting attack based on malicious pre-OS logo images : LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible for booting modern devices that run Windows or Linux… The vulnerabilities are the subject of a coordinated mass disclosure released Wednesday.

article thumbnail

AI in the workplace: balancing benefits and security

Jamf

Artificial intelligence (AI) is an inevitable part of our future lives, whether at home or at work. In this blog, we'll go over what AI in the workplace looks like, including its benefits and challenges.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

North Korea-linked APT group Lazarus was spotted exploiting Log4j vulnerabilities to deploy previously undocumented remote access trojans. The North Korea-linked APT group Lazarus is behind a new hacking campaign that exploits Log4j vulnerabilities to deploy previously undocumented remote access trojans (RATs). Cisco Talos researchers tracked the campaign as Operation Blacksmith, the nation-state actors are employing at least three new DLang -based malware families.

article thumbnail

Unwrapping the Threat: AI-Powered Phishing Attacks Take Center Stage in 2023 Holidays

KnowBe4

As the holiday season approaches, so does the annual surge in online shopping and holiday package tracking. Unfortunately, this joyous time has also become a prime hunting ground for cybercriminals.

article thumbnail

Ukrainian military intelligence service hacked the Russian Federal Taxation Service

Security Affairs

The Ukrainian government’s military intelligence service announced the hack of the Russian Federal Taxation Service (FNS). Hackers of the Main Intelligence Directorate of the Ministry of Defense of Ukraine announced they have compromised the Russian Federal Taxation Service (FNS). The military intelligence service said that the hack was the result of a successful special operation on the territory of Russia.

Military 109
article thumbnail

More in store with IBM Storage Virtualize

IBM Big Data Hub

Managing data is difficult. In today’s hybrid cloud environments, data is spread across a large and complex data fabric encompassing on-premise storage and cloud infrastructure. This can lead to data becoming siloed and difficult to manage. With the ever-present threat of cyberattacks, it is more important than ever to ensure you have full visibility over your data storage and a simple way to configure your data for extreme resilience.

Cloud 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Effectively Draft Data Processing Agreements to Protect Information Shared with Service Providers – Part 2

Data Protection Report

In our previous post , we discussed specific considerations for common boilerplate provisions in data processing agreements (DPAs). Due to the sensitivity of data transfers and privacy laws, DPAs require careful drafting to ensure the data processor complies with appropriate privacy obligations and is responsible for any non-compliance. This post takes a closer look at DPA-specific obligations relating to the data processing itself.

article thumbnail

Promote resilience and responsible emissions management with the IBM Maximo Application Suite

IBM Big Data Hub

Embracing responsible emissions management can transform how organizations impact the health and profitability of their assets. This opportunity is undeniable. An IBM CEO study , based on interviews with 3,000 CEOs worldwide, reveals that CEOs who successfully integrate sustainability and digital transformation report a higher average operating margin than their peers.

article thumbnail

Thriving in HR: Celebrating Achievements and Navigating Challenges

OpenText Information Management

In HR’s ever-evolving landscape, staying ahead by using technology is imperative in facilitating change. During our recent OpenText customer roundtable on 31st October 2023, a dozen HR technology professionals delved into the achievements and hurdles of integrating OpenText™ Extended ECM for SAP® SuccessFactors® with their SAP SuccessFactors® suite and other supporting HR applications.

ECM 57
article thumbnail

The EU’s AI Act: the position is agreed

Data Protection Report

In the early hours of the morning of Saturday 9 December 2023, the European Parliament (the Parliament) and the Council of the EU (the Council) reached an agreement on the outstanding points on the EU’s Regulation on artificial intelligence (AI Act). Talks had previously stalled over how to regulate AI trained on large amounts of data and able to perform a wide range of functions, referred to as ‘foundation models’ or ‘general purpose AI’.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

10 Essential Strategies for Successful Information Governance and Data Retention for Executives via Robinson+Cole

IG Guru

Check out the article here. The post 10 Essential Strategies for Successful Information Governance and Data Retention for Executives via Robinson+Cole first appeared on IG GURU.

article thumbnail

Adapture Becomes an AWS Well-Architected Partner

Adapture

Atlanta-Based IT Consultancy Proves Its Skill in AWS Cloud Environments ATLANTA, Dec. 12, 2023 – Adapture, a leader in networking, security, and infrastructure consulting, has achieved AWS Well-Architected Partner status, which signifies that the company is well-versed in AWS best practices and is poised to implement them in its clients’ environments.

Cloud 52
article thumbnail

CyberheistNews Vol 13 #50 [Heads Up] Don't Be Fooled by This Sneaky Disney+ Phishing Scam

KnowBe4

[Heads Up] Don't Be Fooled by This Sneaky Disney+ Phishing Scam

article thumbnail

Happy Holidays blog post

Docuware

2023 has been an exciting and eventful year for our company. We celebrated DocuWare’s 35th anniversary and welcomed our 600th employee. We opened a new US office in Beacon, NY and launched our Instagram channel, @life.at.docuware. We also received industry awards in markets all over the world.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up , just as they have, year-to-year, for the past 20 years. Related: Adopting an assume-breach mindset With that in mind, Last Watchdog invited the cybersecurity experts we’ve worked with this past year for their perspectives on two questions that all company leaders should have top of mind: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at

article thumbnail

X-15A Flight No. 3-7-14: To the Edge of Space

Unwritten Record

Separation from B-52. 342-USAF-30182, [link] The X-15 did not take off. It must have stuck out its thumb, because it hitched a ride into flight. On July 17, 1962, Air Force Maj. Robert White took to the air with his X-15 mounted under the wing of a modified B-52. After separating from the mothership, he ignited his plane’s rockets and ascended to 59.6 miles above Earth, setting a new record.

article thumbnail

Russia Weaponizes Israel-Hamas Conflict in Targeted Phishing Attack

KnowBe4

Researchers at IBM X-Force are tracking a phishing campaign that’s using themes related to the Israel-Hamas war to deliver Headlace, a backdoor exclusively used by the suspected Russian state-sponsored threat actor ITG05. ITG05 has overlaps with groups tied to Russia’s GRU, including APT28 (also known as “Fancy Bear.