Fri.Dec 15, 2023

article thumbnail

Disinformation Rages in Russian Cyber Winter of Discontent

Data Breach Today

CISO Ian Thornton-Trump on Information Warfare, Disruptive Cyberattacks, Patching As Russia's all-out invasion of Ukraine continues, Moscow's strategy for targeting Ukrainian allies centers on "painting the picture of incompetent governments that can't protect from the Russian might" via misinformation and disinformation campaigns, said Ian Thornton-Trump, CISO of Cyjax.

article thumbnail

Multiple flaws in pfSense firewall can lead to arbitrary code execution

Security Affairs

Security flaws in Netgate pfSense firewall solution can potentially lead to arbitrary code execution on vulnerable devices. pfSense is a popular open-source firewall solution maintained by Netgate, researchers discovered multiple security issues affecting it. Researchers from SonarCloud discovered several security issues, Cross-Site Scripting (XSS) vulnerabilities and a Command Injection vulnerability in pfSense CE ( CVE-2023-42325 , CVE-2023-42327 , CVE-2023-42326 ).

Phishing 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK AI National Institute Urges 'Red Lines' For Generative AI

Data Breach Today

Alan Turing Institute Calls for 'Shift in Mindset' to Tackle National Security Risk The U.K. national institute for artificial intelligence urged the government to establish red lines against the use of generative AI in scenarios in which the technology could take an irreversible action without direct human oversight. The U.K. government has sought to cultivate responsible AI.

article thumbnail

Snatch ransomware gang claims the hack of the food giant Kraft Heinz

Security Affairs

The Snatch ransomware group announced it had hacked the food giant Kraft Heinz, the company is investigating the claims. Kraft Heinz is an American food company, it is one of the largest food and beverage manufacturers globally. Kraft Heinz produces a wide range of popular food products, including condiments, sauces, cheese, snacks, and ready-to-eat meals.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ISMG Editors: Decoding BlackCat Ransomware's Downtime Drama

Data Breach Today

Also: Fraud Trends; Cryptocurrency Regulatory Developments In the latest weekly update, editors at ISMG discuss whether police have seized ransomware group Alphv/BlackCat's data leak site, how fraudsters are adapting their tactics and techniques to exploit advancements in technology, and which cryptocurrency stories shaped the industry this year.

More Trending

article thumbnail

HHS 5-Year Health Data Strategy Prioritizes 'Responsible' AI

Data Breach Today

Biden Plan Aims to 'Harness' Data, AI to Better Patient Outcomes, Cut Cancer Deaths The Biden administration is heavily counting on "responsibly" leveraging AI as part of a five-year strategy that aims to harness data to enhance the health and wellness of Americans. That includes ambitions to drastically improve cancer care and reduce cancer deaths, among other top goals.

284
284
article thumbnail

Idaho National Laboratory data breach impacted 45,047 individuals

Security Affairs

The Idaho National Laboratory (INL) announced that it has suffered a data breach impacting more than 45,000 individuals. In November, the hacktivist group SiegedSec claimed responsibility for the hack of The Idaho National Laboratory (INL) and leaked stolen human resources data. SiegedSec is a threat actor that last year carried out multiple attacks against U.S. organizations, especially U.S. municipalities.

article thumbnail

CISA Urges Health Sector to Apply Critical Cyber Measures

Data Breach Today

Advice Is Based on Agency's 2-Week Security Assessment of a Large Entity The Cybersecurity and Infrastructure and Security Agency is urging health sector entities to take critical steps in fortifying their environments based on findings from a risk and vulnerability assessment performed by the federal agency on a healthcare industry organization earlier this year.

article thumbnail

BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign

Security Affairs

Resecurity has uncovered a meaningful link between three major ransomware groups, BianLian, White Rabbit, and Mario Ransomware. Based on a recent Digital Forensics & Incident Response (DFIR) engagement with a law enforcement agency (LEA) and one of the leading investment organizations in Singapore (and other victims), Resecurity (USA) has uncovered a meaningful link between three major ransomware groups.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cyberspace Solarium Commission Hails NDAA Cyber Provisions

Data Breach Today

Defense Bill Includes Many Critical Cybersecurity Components, CSC Says Co-chairs of the Cyberspace Solarium Commission praised the annual U.S. national defense bill for enacting recommendations from its 2020 report, saying the bill marks "meaningful" advancements for cybersecurity. With the bill, 58 out of the commission's 82 recommendations will have been enacted.

article thumbnail

A Robot the Size of the World

Schneier on Security

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats. It had actuators: Drones, autonomous cars. And it had smarts in the middle, using sensor data to figure out what to do and then actually do it. This was the Internet of Things (IoT).

IoT 105
article thumbnail

45,000 Affected by Breach at Idaho National Laboratory

Data Breach Today

Breach Exposed Names, Social Security Numbers and Salaries The Idaho National Laboratory said hackers stole personal data of more than 45,000 individuals connected with the facility following a self-proclaimed hacktivist group's claims of a breach. The data theft stems from a Nov. 20 incident affecting the organization's off-site Oracle HCM HR system.

article thumbnail

Data of over a million users of the crypto exchange GokuMarket exposed

Security Affairs

GokuMarket, a centralized crypto exchange owned by ByteX, left an open instance, revealing the details of virtually all of its users, the Cybernews research team has discovered. The leak comes after the team discovered an unprotected MongoDB instance, which stored information on GokuMarket crypto exchange users. Businesses employ MongoDB to organize and store large swaths of document-oriented information, and in GokuMarket’s case, the details of over a million customers and admin users.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Federal Agencies Failing to Meet Critical Cyber Deadlines

Data Breach Today

Agencies Lack Capabilities to Track, Investigate and Remediate Threats, Report Says The departments of Commerce, State and Justice are among the 20 agencies identified in a Government Accountability Office report as having failed to meet key cyberthreat incident response deadlines outlined in the 2021 cybersecurity executive order.

article thumbnail

IRS Warns of Expected Wave of Tax Scams

KnowBe4

Urging taxpayers and tax professionals to be vigilant, the Internal Revenue Service (IRS) provides some simple guidance on how to spot new scams aimed at being able to file fake tax returns.

article thumbnail

Legal Trends to Watch in 2024

Data Breach Today

CISO Liability, AI, Ransomware and Shadow IT Attorney Jonathan Armstrong examines four cybersecurity legal trends that will shape 2024: heightened personal liability for security leaders, the impact of ransomware, legal and ethical concerns about AI, and the influence of shadow IT, especially regarding messaging apps.

article thumbnail

Weekly Update 378

Troy Hunt

I'd say the balloon fetish segment was the highlight of this week's video. No, seriously, it's a moment of levity in an otherwise often serious industry. It's still a bunch of personal info exposed publicly and that suchs regardless of the nature of the site, but let's be honest, the subject matter did make for some humorous comments 🤣 References Sponsored by: Identity theft isn’t cheap.

IoT 93
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

Schneier on Security

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Types of Records Management Systems

Record Nations

Business transactions create records that need to be stored securely and accessibly. Records include tax returns, employment forms, and financial documents that require a retention period of several years. Records management helps businesses maintain, use, store, and dispose of their records in compliance with retention laws while also supporting business processes.

article thumbnail

Customer service trends winning organizations need to follow

IBM Big Data Hub

Paying attention to the latest customer service trends ensures that an organization is prepared to meet changing customer expectations. Customer loyalty is waning, spurred on by the COVID-19 pandemic, social influences and the ease of switching brands. More than ever, organizations must stay on top of changes in the customer service experience to improve customer satisfaction and meet increased customer needs.

article thumbnail

OpenText & Salesforce help save the holidays with AI!

OpenText Information Management

This holiday season Santa needs help checking his lists! Santa receives millions of wish list letters from children around the world, and he needs to know what toys to build. The Elves are overwhelmed reading all these letters manually and inputting the data into Salesforce. They are also making sure all these letters are safely … The post OpenText & Salesforce help save the holidays with AI!

Sales 67
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Examples of sustainability in business

IBM Big Data Hub

Some of the first teachings about improving the planet seem simple: reduce, reuse, recycle. People have since made lifestyle choices and adjustments, such as biking to work and segregating garbage, to bring this rule to life and help save the environment. Now, climate change is affecting businesses as much as individuals. According to the United Nations Environment Programme (UNEP), both consumers and investors are being turned-off by companies that ignore their environmental impact.

article thumbnail

Reltio's 2023 journey in data management, AI, and digital transformation

Reltio

This year has been pivotal for Reltio and our customers and partners, who have navigated a landscape marked by macroeconomic challenges and an intensifying need to integrate new AI capabilities and realize the potential of digital transformation. Organizations face roadblocks from data fragmentation, quality, and integration. Persistent data management challenges hinder the advancement toward integrating AI solutions.

article thumbnail

Five open-source AI tools to know

IBM Big Data Hub

Open-source artificial intelligence (AI) refers to AI technologies where the source code is freely available for anyone to use, modify and distribute. When AI algorithms, pre-trained models, and data sets are available for public use and experimentation, creative AI applications emerge as a community of volunteer enthusiasts builds upon existing work and accelerates the development of practical AI solutions.

article thumbnail

5 Supply chain predictions for 2024

OpenText Information Management

In the fast-moving landscape of global commerce, the supply chain remains at the heart as businesses strive for efficiency, resilience, and sustainability. As we approach 2024, several trends are set to reshape the supply chain industry, offering new opportunities and challenges. Here are five supply chain predictions that we believe will shape the narrative in … The post 5 Supply chain predictions for 2024 appeared first on OpenText Blogs.

57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The risks of sideloaded apps

Jamf

Are sideloaded apps safe? Based on new EU legislation, Apple may start allowing for the sideloading of apps from third-party app stores. These apps can bring new risks to your organization's security posture. Read this blog to know what this can look like and how to mitigate the risks.

Risk 52
article thumbnail

ARMA’s Updated myLearning Platform is HERE!

IG Guru

Check out the announcement here. The post ARMA’s Updated myLearning Platform is HERE! first appeared on IG GURU.

86