Mon.Dec 04, 2023

article thumbnail

Steve Katz, World's First CISO, Dies in Hospice Care

Data Breach Today

Former Banking CISO Remembered as Pioneering Leader, Generous Mentor and Colleague Steve Katz, the world's first CISO, died Saturday night while under hospice care in Long Island, New York. He left a strong legacy - not just as a pioneer and trailblazer in cybersecurity leadership but also as a beloved colleague and mentor who generously shared his time and wisdom.

article thumbnail

Inside America's School Internet Censorship Machine

WIRED Threat Level

A WIRED investigation into internet censorship in US schools found widespread use of filters to censor health, identity, and other crucial information. Students say it makes the web entirely unusable.

IT 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LogoFAIL Bootup Flaw Puts Hundreds of Devices at Risk

Data Breach Today

UEFI Feature Flashing Corporate Logo Can Enable Malware Deployment Hackers could use a firmware specification designed to flash a corporate logo during computer boot up to deliver a malicious payload that circumvents the industry standard for only loading trusted operating systems. The flaw stems from graphic image parsers embedded into system firmware.

Risk 267
article thumbnail

LockBit on a Roll – ICBC Ransomware Attack Strikes at the Heart of the Global Financial Order

Security Affairs

The LockBit ransomware attack on the Industrial & Commercial Bank of China demonstrates the weakness of global financial system to cyberattacks. The ransomware breach that crippled U.S. Treasury trading operations at an American subsidiary of Industrial & Commercial Bank of China Ltd. on November 8 has laid bare the vulnerability of the global financial system to cyberattacks.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Previewing Black Hat Europe 2023 in London: 16 Hot Sessions

Data Breach Today

Routers in Peril, Battling Burnout, Teaching ChatGPT to Attack and More Winter in London features Hyde Park's Winter Wonderland, Christmas lights galore, and the return of the Black Hat Europe cybersecurity conference, featuring briefings on everything from quantum cryptography and router pwning to dissecting iOS zero-days and training generative AI to attack.

More Trending

article thumbnail

Russian GRU Hackers Target Polish Outlook Inboxes

Data Breach Today

Military Intelligence Exploits Microsoft Flaw Patched In March Russian military intelligence hackers active in Poland are exploiting a patched flaw in Microsoft Outlook, say cyber defenders from Redmond and Warsaw. Microsoft in a Monday post identifies the hackers as Forest Blizzard, also known as APT28 and Fancy Bear.

Military 249
article thumbnail

New P2PInfect bot targets routers and IoT devices

Security Affairs

Cybersecurity researchers discovered a new variant of the P2PInfect botnet that targets routers and IoT devices. Researchers at Cado Security Labs discovered a new variant of the P2Pinfect botnet that targets routers, IoT devices, and other embedded devices. This variant has been compiled for the Microprocessor without Interlocked Pipelined Stages (MIPS) architecture.

IoT 107
article thumbnail

Phishing Kits Undergo an Evolution in Feature Set, Demand, and Branding

KnowBe4

Now being commonly referred to as “Scama” – short for Scamming Method – these kits are being sold promoting highly advanced feature sets, turning the novice scammer into a pro.

article thumbnail

US Lawmakers Want to Use a Powerful Spy Tool on Immigrants and Their Families

WIRED Threat Level

Legislation set to be introduced in Congress this week would extend Section 702 surveillance of people applying for green cards, asylum, and some visas—subjecting loved ones to similar intrusions.

Privacy 93
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sexual Harassment Prevention Training from…KnowBe4?

KnowBe4

When you think of KnowBe4, you probably think of phishing training, good password hygiene modules, security awareness, or maybe even data protection compliance such as GDPR.

article thumbnail

How financial institutions can deliver value from investment in digital operational resilience

IBM Big Data Hub

The Digital Operational Resilience Act (DORA) is a landmark piece of legislation in the European Union (EU) that is designed to help fortify the operational resilience of the financial sector, making it fit for purpose in the digital age. DORA has several objectives, including to comprehensively address information and communications technology (ICT) risk management in the financial services sector and harmonize the ICT risk management regulations that already exist in individual EU member state

article thumbnail

Combatting Rogue URL Tricks: Quickly Identify and Investigate the Latest Phishing Attacks

KnowBe4

Everyone knows you shouldn’t click phishy links. But are your end users prepared to quickly identify the trickiest tactics bad actors use before it’s too late? Probably not.

article thumbnail

3 myths hindering your business from adopting generative AI 

IBM Big Data Hub

Generative AI holds enormous potential for driving business growth. It offers ease of integration and scalability for analytics and AI workloads using your company’s data, and offers guardrails for ensuring governance, security and compliance. So, why do millions of small enterprises believe that impactful AI is only accessible to big companies with deep pockets?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Guarding Against the Rise of QR Code Phishing Attacks: How to Protect Yourself and Your Organization

KnowBe4

In the ever-evolving landscape of cyber threats, scammers and hackers are relentless in exploiting every avenue of communication. From emails to texts, calls to QR codes, malicious actors are finding new ways to compromise your privacy and security.

article thumbnail

A look into IBM’s AI ethics governance framework

IBM Big Data Hub

“Organizations are responsible for ensuring that AI projects they develop, deploy or use do not have negative ethical consequences,” as per Gartner. Yet while 79% of executives say AI ethics is important to their enterprise-wide AI approach , less than 25% have operationalized ethics governance principles. In a new case study featuring IBM, Gartner talks about how to establish a governance framework to streamline the process of detecting and managing technology ethics concerns in AI

article thumbnail

Preparing for the EU AI Act

Data Matters

Join Sidley and OneTrust DataGuidance for a webinar on the EU AI Act. This discussion with industry panellists will cover initial reactions to the (anticipated) political agreement on the EU AI Act following key negotiations by the European legislative bodies on December 6, 2023. The post Preparing for the EU AI Act appeared first on Data Matters Privacy Blog.

Privacy 88
article thumbnail

How generative AI can transform the aviation industry 

IBM Big Data Hub

The aviation industry is under pressure to improve the sustainability of air travel while improving operational efficiency in an increasingly complex marketplace that is still recovering from the impact of the COVID-19 pandemic. In an industry where safety is paramount and new technologies require utmost scrutiny, generative AI promises to boost aviation businesses and their industry partners.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New York Department of Financial Services Reaches $1 Million Dollar Settlement With First American Title Insurance in Data Breach Investigation

Hunton Privacy

On November 28, 2023, the New York Department of Financial Services (“NYDFS”) announced that First American Title Insurance Company (“First American”), the second-largest title insurance company in the United States, would pay a $1 million penalty for violations of the NYDFS Cybersecurity Regulation in connection with a 2019 data breach. The NYDFS investigated the company’s response to the data breach and alleged that First American knew of a vulnerability in its technical systems that exposed c

article thumbnail

Top 5 criteria for developers when adopting generative AI

IBM Big Data Hub

The surge in adoption of generative AI is happening in organizations across every industry, and the generative AI market is projected to grow by 27.02% in the next 10 years according to Precedence Research. Advacements in machine learning algorithms, neural networks and the computational power of generative AI, combined with human expertise, intuition and creativity, can unlock new possibilities and achieve levels of innovation that were previously unimaginable.

article thumbnail

How to Effectively Draft Data Processing Agreements to Protect Information Shared with Service Providers – Part 1

Data Protection Report

Modern businesses collect and process personal information about their customers and employees for the benefit of their business – these benefits include identifying opportunities to enhance their products or services, streamlining operations, reducing costs or maximizing profits. Processing such data is often outsourced to a third-party data processing service provider.

article thumbnail

Examples of IBM assisting insurance companies in implementing generative AI-based solutions  

IBM Big Data Hub

IBM works with our insurance clients, and research conducted by the IBM Institute for Business Value (IBV) shows three key imperatives that guide insurer management decisions: Digital orchestration Improved core productivity (business and IT) The need for flexible infrastructure To meet the key imperatives and facilitate the transformation of their companies, insurers need to: Provide digital offerings to their customers Become more efficient Use data more intelligently Address cybersecurity con

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Fingerprint Biometrics Hold Promise to Address Retailers’ Common Challenges

HID Global

Fingerprint biometrics help retailers speed up payments and checkout times, reduce fraud and shrinkage costs, and eliminates a complicated system overhaul.

Retail 52
article thumbnail

Taping batteries saves lives via Bcyvcle.com

IG Guru

Never bin your batteries When used batteries get tossed in general waste or recycling bins they create a fire hazard and can end up in landfill where they can leak toxic materials into waterways and ecosystems. Check out more here. The post Taping batteries saves lives via Bcyvcle.com first appeared on IG GURU.

Risk 67
article thumbnail

The future of business planning with generative AI?

IBM Big Data Hub

In the rapidly-evolving business ecosystem, many companies face a combination of challenges, including inflation, supply chain disruptions and a complex labor market. These factors exert significant pressure on profitability. In this scenario, traditional planning methods may hinder a company’s ability to respond quickly and strategically to changing opportunities and challenges.   This is where autonomous planning shines.

article thumbnail

AI and Trust

Schneier on Security

I trusted a lot today. I trusted my phone to wake me on time. I trusted Uber to arrange a taxi for me, and the driver to get me to the airport safely. I trusted thousands of other drivers on the road not to ram my car on the way. At the airport, I trusted ticket agents and maintenance engineers and everyone else who keeps airlines operating. And the pilot of the plane I flew.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A guide to efficient Oracle implementation

IBM Big Data Hub

By implementing Oracle , one of the world’s leading enterprise resource planning (ERP) tools, organizations can transform their business processes and significantly increase operational efficiency. Companies large and small are increasingly digitizing and managing vast troves of data. ERP systems like Oracle’s streamline business processes and reduce costs, leveraging information to help organizations make better decisions in rapidly changing landscapes.

Cloud 77
article thumbnail

FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries

The Security Ledger

The hack of a Pennsylvania water treatment facility in November is part of a larger campaign by an Iranian APT group against users of Israel-made operational technology. The post FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries first appeared on The Security Ledger with Paul F. Roberts. Related Stories Cyberattacks on Industrial Control Systems Jumped in 2022 BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency Forget the IoT.

article thumbnail

US CISA: Secure Israeli-Made Technology From Iranian Hackers

Data Breach Today

'Cyber Av3ngers' Didn't Tamper With Water Safety, Says Cyber Agency The U.S. Cybersecurity and Infrastructure Security Agency encouraged all organizations that use equipment developed by an Israeli technology company called Unitronics to bolster their cyber posture amid the Israel-Hamas war after an Iranian hacking group attacked a Pennsylvania water municipality.

Security 267