Wed.Jun 28, 2023

article thumbnail

50 US Agencies Using Unsecured Devices, Violating Policy

Data Breach Today

Researchers Say Routers, Access Points, Firewalls, VPNs Could Expose Federal Data Security researchers at Censys found hundreds of federally owned devices at 50 different agencies exposed to the internet, accessible through IPv4 addresses and loaded with potentially vulnerable MOVEit and Barracuda Networks' ESG software. The vulnerabilities violate new CISA policy, the firm said.

Access 289
article thumbnail

Come With Me on a Spin Through the Hellscape of AI-Generated News Sites

John Battelle's Searchblog

Welcome to the hellscape of “Made for Advertising” sites This past Monday NewsGuard , a journalism rating platform that also analyzes and identifies AI-driven misinformation, announced it had identified hundreds of junk news sites powered by generative AI. The focus of NewsGuard’s release was how major brands were funding these spam sites through the indifference of programmatic advertising, but what I found interesting was how low that number was – 250 or so sites.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vendor Pays $75,000 HIPAA Fine in Data Exfiltration Breach

Data Breach Today

Patient Information Left Unsecured on Network Server, HHS Says A firm that provides coding and billing services to healthcare entities has agreed to pay federal regulators a $75,000 fine and implement a corrective action plan in the wake of an exfiltration incident that compromised patient data contained in an unsecured network server.

167
167
article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Penetration tests are vital components of vulnerability management programs. In these tests, white hat hackers try to find and exploit vulnerabilities in your systems to help you stay one step ahead of cyberattackers. Because these tests can use illegal hacker techniques, pentest services will sign a contract detailing their roles, goals, and responsibilities.

Cloud 105
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Venn Raises $29M to Safeguard Data on Employee-Owned Laptops

Data Breach Today

Startup Helps Clients Control, Govern Corporate Data Without Remote Virtual Desktop Venn Software landed Series A funding to help businesses ensure the security and compliance of data on laptops they don't necessarily manage or own. The $29 million will enable firms to control and govern corporate data on worker-owned devices without forcing users to launch remote virtual desktops.

More Trending

article thumbnail

Worker Inappropriately Accessed Patient Records for 15 Years

Data Breach Today

Cleveland Safety-Net Healthcare Organization Says Employee 'Disciplined' for Breach A Cleveland-based healthcare system is notifying a not-yet-disclosed number of individuals about an incident involving unauthorized medical records access by an employee that continued for 15 years. The safety-net organization says the worker has been disciplined.

Access 144
article thumbnail

Critical SQL Injection flaws in Gentoo Soko can lead to Remote Code Execution

Security Affairs

SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two SQL injection vulnerabilities in Gentoo Soko, collectively tracked as CVE-2023-28424 (CVSS score: 9.1) [ 1 ],[ 2 ], that can be exploited by a remote attacker to execute arbitrary code on vulnerable systems. “The two package search handlers, Search and SearchFeed, implemented in pkg/app/handler/packages/search.go, are affected by a SQL injection

article thumbnail

Ukraine's Critical Infrastructure Hit 3,000 Times Since 2022

Data Breach Today

Hackers Evolve Tactics to Focus on Espionage, Not Destruction, State Agency Says Cyberattackers have hit Ukraine's critical infrastructure over 3,000 times since the beginning of the Russian invasion in 2022, according to Ukraine's national incident response team, which warned that such attacks may continue for years even after the fighting on the ground is over.

130
130
article thumbnail

Using Electromagnetic Fault Injection Attacks to take over drones

Security Affairs

Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them. While the use of drones continues to grow, researchers from IOActive analyzed how to develop fault injection attacks against hardened Unmanned Aerial Vehicles (UAVs). The experts focused on achieving code execution on a commercially available drone, supporting significant security features (i.e. the use of signed and encrypted firmware, Trusted Executio

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cisco XDR: Making Defenders' Lives Better

Data Breach Today

Cisco connected the world; who better to defend it? This is the mindset Carlos Diaz brings to the new Cisco XDR release, which he says is designed to make cybersecurity defenders' lives easier. The message that defenders should draw from this XDR solution, he says, is "Cisco knows me.

article thumbnail

Massive Impersonation Phishing Campaign Imitates over 100 Brands and Thousands of Domains

KnowBe4

A year-long phishing campaign has been uncovered that impersonates 100+ popular clothing, footwear, and apparel brands using at least 10 fake domains impersonating each brand.

article thumbnail

Astrix Security Raises $25M to Protect Nonhuman Identities

Data Breach Today

Cash Will Allow Astrix to Bring Threat Detection, Secure Access to Third-Party Apps A finalist at this year's RSA Innovation Sandbox contest landed Series A funding to detect threats and secure access for nonhuman identities. The $25 million will enable Astrix Security to expand from managing access for nonhuman identities to understanding threats to services and applications.

Security 130
article thumbnail

NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness

Dark Reading

The popular package manager for software developers has been vulnerable to this attack vector for a while, and negligent in fixing the problem, according to a former employee.

96
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

European Cyber Agency Remains Underfunded

Data Breach Today

ENISA Chief Says Lack of Appropriate Funding Continues to Be a Challenge The European cyber agency continues to remain underfunded despite the surge in ransomware and other cyberthreats, the organization's chief said in a recent hearing. The ENISA chief called on the European Commission to hold regulatory consultations to address the existing policy gaps.

article thumbnail

6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy

Dark Reading

Generative AI chatbots like ChatGPT are the buzziest of the buzzy right now, but the cyber community is starting to mature when it comes to assessing where it should fit into our lives.

article thumbnail

Apple Criticizes UK Government's Client-Side Scanning Push

Data Breach Today

Online Safety Bill Also Criticized by Leading Cybersecurity Experts and Academics Technology giant Apple has joined the chorus of voices calling on the British government to rethink its proposed Online Safety Bill legislation intended to increase public safety by monitoring people's private communications via client-side scanning.

article thumbnail

Experts warn of a spike in May and June of 8Base ransomware attacks

Security Affairs

Researchers warn of a massive spike in May and June 2023 of the activity associated with the ransomware group named 8Base. VMware Carbon Black researchers observed an intensification of the activity associated with a stealthy ransomware group named 8Base. The experts observed a massive spike in activity associated with this threat actor between May and June 2023.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

LetMeSpy Phone-Tracking App Hacked, Revealing User Data

Dark Reading

With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.

IT 97
article thumbnail

What is slow productivity?

IBM Big Data Hub

Slow productivity can be defined as working at a slower pace on fewer tasks at a time to increase workplace productivity and satisfaction. The trend toward slow productivity is for businesses and employees to rethink what productivity looks like and create an environment where quality of work is emphasized over quantity of work. In his book Rest: Why You Get More Done When You Work Less , Silicon Valley consultant Alex Soojung-Kim Pang describes taking a working sabbatical where he got an enormo

article thumbnail

Generative AI Projects Pose Major Cybersecurity Risk to Enterprises

Dark Reading

Developers' enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.

Risk 89
article thumbnail

Stalkerware Vendor Hacked

Schneier on Security

The stalkerware company LetMeSpy has been hacked : TechCrunch reviewed the leaked data, which included years of victims’ call logs and text messages dating back to 2013. The database we reviewed contained current records on at least 13,000 compromised devices, though some of the devices shared little to no data with LetMeSpy. (LetMeSpy claims to delete data after two months of account inactivity.) […] The database also contained over 13,400 location data points for several thousand v

IT 75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Saudi Arabia's Cyber Capabilities Ranked Second Globally

Dark Reading

Saudi Arabia is one of the world's leaders in cybersecurity development and preparedness, according to the latest rankings.

article thumbnail

How to Digitize Documents

Record Nations

Homes and businesses are turning to digitization for better preservation and organization of their documents. Digital documents are easy to track, find, update, and share. Whether you have small or large volumes of files, you can digitize those documents quickly, and have them ready to use in no time. . Documents of all kinds can. How to Digitize Documents The post How to Digitize Documents appeared first on Record Nations.

75
article thumbnail

3 Strategies for Bringing Rigor to Software Security

Dark Reading

With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt.

article thumbnail

National Cyber Security Centre Notes UK Law Firms are Main Target for Cybercriminals

KnowBe4

In the most recent Cyber Threat report from the National Cyber Security Centre (NCSC), it is clear that UK law firms are a gold mine for cybercriminals.

Mining 75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Open Source LLM Projects Likely Insecure, Risky to Use

Dark Reading

New LLM-based projects typically become successful in a short period of time, but the security posture of these generative AI projects are very low, making them extremely unsafe to use.

article thumbnail

How Your Real Flight Reservation Can Be Used to Scam You

WIRED Threat Level

Scammers use a booking technicality, traveler confusion, and promises of dirt-cheap tickets to offer hot deals that are anything but.

article thumbnail

Astrix Security Raises $25M in Series A Funding

Dark Reading

The investment will allow enterprises to further secure non-human identities and safely leverage the soaring adoption of third-party apps and Generative AI services.