Tue.Jul 11, 2023

article thumbnail

Clop Crime Group Adds 62 Ernst & Young Clients to Leak Sites

Data Breach Today

Victims Include Airline, Banks, Hospitals, Retailers in Canada The growing list of MOVEit cyberattack victims has grown. Sixty-two 62 clients of Big Four accounting firm Ernst & Young now appear on the Clop ransomware group's data leak sites. A spokesperson for Ernst & Young confirmed that a "limited" attack on the company's systems had occurred.

Retail 246
article thumbnail

Apple & Microsoft Patch Tuesday, July 2023 Edition

Krebs on Security

Microsoft Corp. today released software updates to quash 130 security bugs in its Windows operating systems and related software, including at least five flaws that are already seeing active exploitation. Meanwhile, Apple customers have their own zero-day woes again this month: On Monday, Apple issued (and then quickly pulled) an emergency update to fix a zero-day vulnerability that is being exploited on MacOS and iOS devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spanish Police Arrest Phishing Ring Targeting Bank Customers

Data Breach Today

Police Say Cybercrime Group Defrauded Banking Customers out of 100,000 Euros Spanish law enforcement authorities said they have brought down a cybercriminal ring that deployed a range of hacking techniques to target banking customers. The group operators extorted 100,000 euros and offered crime as a service to other criminals, the police said.

Phishing 189
article thumbnail

GUEST ESSAY: 7 tips for protecting investor data when it comes to alternative asset trading

The Last Watchdog

When it comes to alternative asset trading, protecting investor data is of critical importance. Related: Preserving the privacy of the elderly As more traders and investors engage in these investment avenues, it is crucial to adopt robust security measures to safeguard sensitive and regulated information. Here are seven tips to protect investor data in alternative asset trading.

IT 161
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Web-Browsing Glitch Prompts Apple to Withdraw Zero-Day Fix

Data Breach Today

The Latest Rapid Security Response Might Prevent Websites From Displaying Properly Apple is advising users to remove the software patch released on Monday aimed at fixing a zero-day vulnerability being exploited in the wild. The tech giant said the patch might prevent some websites from displaying properly and that it hopes to release a new patch soon.

Security 144

More Trending

article thumbnail

Custom Trojan Attacking Latin American Organizations

Data Breach Today

Toitoin Trojan Campaign Uses Six-Staged Infection Chain to Steal Data A new malware campaign powered with multistage attack methodology is targeting businesses in the LATAM region using specially crafted modules. The newly identified Trojan, dubbed Toitoin, follows a six-stage attack plan in which each stage is custom-designed to carry out malicious activities.

130
130
article thumbnail

The 4th Wave of IDP is Here

AIIM

Since the earliest forays into  optical character recognition  (OCR) by Ray Kurzweil in the early 1970s, software developers have been on a mission to teach computers how to do the paperwork for us. What if the computer could replace the interminable number of hours needed each day in offices around the globe for humans to read documents, understand the meaning, and extract the right data for the next step in a work process?

article thumbnail

Lawsuits Filed Against Johns Hopkins in MOVEit Hack Mess

Data Breach Today

University, Healthcare System Facing Proposed Class Actions Suits for Data Breach Johns Hopkins University and its Johns Hopkins Health System are facing at least two proposed federal class action lawsuits filed in recent days following the institution's disclosure that it was among victims of the recent spate of hacks involving MOVEit file transfer software.

article thumbnail

Microsoft Discloses 5 Zero-Days in Voluminous July Security Update

Dark Reading

Fixes for more than 100 vulnerabilities affect numerous products, including Windows, Office,Net, and Azure Active Directory, among others.

Security 128
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Jamf releases a new API connector for Okta workflows

Jamf

Learn about Jamf’s two API connectors for Okta Workflows and how they empower Jamf + Okta customers to extend capabilities while automating actions with minimal coding knowledge required.

98
article thumbnail

Deal-maker or deal-breaker: the legal ins and outs of using AI in M&A

Data Protection Report

Deals involving AI bring about specific and unique issues for consideration during the due diligence process. Understanding the specific challenges created by AI is important for companies to ensure that the AI technology holds genuine value and would not raise red flags during the course of a transaction. Some important advice for companies looking to purchase AI in a recent Lexpert article authored by our Head of Technology and Co-Head of Information Governance, Privacy and Cybersecurity Imran

article thumbnail

Critical VMware Bug Exploit Code Released Into the Wild

Dark Reading

The exploit code was brought to VMware's attention by an anonymous researcher, in tandem with the Trend Micro Zero Day Initiative.

97
article thumbnail

Silk Road’s Second-in-Command, Variety Jones, Gets 20 Years in Prison

WIRED Threat Level

Roger Thomas Clark, also known as Variety Jones, will spend much of the rest of his life in prison for his key role in building the world’s first dark-web drug market.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Finalization of the EU-U.S. Data Privacy Framework

Data Matters

On July 10, 2023, the European Commission published its final Adequacy Decision for EU-U.S. data transfers. The draft decision reflects the multi-year coordination between the EU and U.S. to identify and implement a lasting solution to facilitate international data transfers following the Court of Justice of the European Union’s judgment in Schrems II.

article thumbnail

VMware warns customers of exploit available for critical vRealize RCE flaw CVE-2023-20864

Security Affairs

VMware warns customers of the public availability of an exploit code for the RCE vulnerability CVE-2023-20864 affecting vRealize. VMware warned customers of the availability of an exploit code for the critical RCE vulnerability CVE-2023-20864 in the VMware Aria Operations for Logs analysis tool (formerly vRealize Log Insight). VMware Aria Operations for Networks (formerly vRealize Network Insight) is a network monitoring tool that helps organizations build an optimized, highly available, and

article thumbnail

SpecterOps Closes Series A Extension From Ballistic Ventures, Bringing Funding Round Total to $33.5M

Dark Reading

Investment will drive company-wide expansion across BloodHound Enterprise, BloodHound FOSS, consulting and training programs, and research and development.

67
article thumbnail

Apple issued Rapid Security Response updates to fix a zero-day but pulled them due to a Safari bug

Security Affairs

Apple released Rapid Security Response updates for iOS, iPadOS, macOS, and Safari web browser to address an actively exploited zero-day. Apple has released Rapid Security Response updates for iOS, iPadOS, macOS, and Safari web browser to address a zero-day flaw, tracked as CVE-2023-37450, that has been actively exploited in the wild. Tricking the victim into processing specially crafted web content may lead to arbitrary code execution.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Webinar: Magic or Myth? AI, Advertising, and the FTC: Avoiding Costly Pitfalls on Thursday July 13 at 1pm Eastern

IG Guru

Check out the event and registration here. The post Webinar: Magic or Myth? AI, Advertising, and the FTC: Avoiding Costly Pitfalls on Thursday July 13 at 1pm Eastern first appeared on IG GURU.

85
article thumbnail

HCA Healthcare data breach impacted 11 million patients

Security Affairs

HCA Healthcare disclosed a data breach that exposed the personal information of roughly 11 million patients. HCA Healthcare this week announced that the personal information of roughly 11 million patients was compromised in a data breach. The organization discovered the security breach on July 5 when a threat actor claimed the hack on an underground forum.

article thumbnail

Top Takeaways From Table Talks With Fortune 100 CISOs

Dark Reading

As organizations struggle to keep up with new regulations and hiring challenges, chief information security officers share common challenges and experiences.

article thumbnail

Bringing observability to business

IBM Big Data Hub

Applications are critical to the business. IT knows it, and the business knows it. Yet today, IT organizations lack visibility into the specific business processes those applications deliver and the context of how those processes are connected and impacted by the underlying container, cloud and infrastructure platforms they manage. Our customers have told us that it is imperative for SRE teams to have the tools they need to detect, identify and act on business operations incidents before they im

Cloud 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

RomCom Spies Target NATO Summit Ahead of Zelensky’s Arrival

Dark Reading

As NATO mulls Ukrainian membership, the threat group is targeting supporters of Ukraine with a backdoor and exploitation of the Microsoft remote code execution (RCE) flaw known as Follina.

64
article thumbnail

The benefits of AI in healthcare

IBM Big Data Hub

Artificial intelligence is used in healthcare for everything from answering patient questions to assisting with surgeries and developing new pharmaceuticals, benefitting both patients and healthcare systems. How does artificial intelligence benefit healthcare? According to Statista , the artificial intelligence (AI) healthcare market, valued at $11 billion in 2021, is projected to be worth $187 billion in 2030.

article thumbnail

Apple's Rapid Zero-Day Patch Causes Safari Issues, Users Say

Dark Reading

Apple's emergency fix for a code-execution bug being actively exploited in the wild is reportedly buggy itself, and some indications point to the Cupertino giant halting patch rollouts.

63
article thumbnail

Privacy of Printing Services

Schneier on Security

The Washington Post has an article about popular printing services, and whether or not they read your documents and mine the data when you use them for printing: Ideally, printing services should avoid storing the content of your files, or at least delete daily. Print services should also communicate clearly upfront what information they’re collecting and why.

Privacy 54
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

'ScarletEel' Hackers Worm Into AWS Cloud

Dark Reading

A toolset upgrade is making ScarletEel more slippery than ever while it continues to manipulate the cloud to perform cryptojacking, DDoS, and more.

Cloud 68
article thumbnail

The Economy of Things: the next value lever for telcos

IBM Big Data Hub

Over the years, the Internet of Things (IoT) has evolved into something much greater: the Economy of Things (EoT). The number of connected things surpassed the number of connected humans for the first time in 2022. The number of IoT connected devices are growing in practically every industry, and is even predicted to reach 29 billion worldwide by 2030.

IoT 53
article thumbnail

11M HCA Healthcare Patients Impacted by Data Breach

Dark Reading

The hackers posted up for sale stolen HCA Healthcare data on Dark Web forum.