Mon.Oct 16, 2023

article thumbnail

EU Will Stand Up Office to Enforce AI Act, Says EU Lawmaker

Data Breach Today

Dragos Tudorache Says the Agency Will Be a "Powerful Enforcer" of AI Act The EU will set up a dedicated office to oversee the implementation of the AI Act, especially by big-tech companies such as OpenAI. Dragoş Tudorache, a Romanian politician and the co-rapporteur of the AI Act, said negotiators have agreed in principle on creation of an "EU AI Office.

283
283
article thumbnail

Critical, Unpatched Cisco Zero-Day Bug Is Under Active Exploit

Dark Reading

No patch or workaround is currently available for the maximum severity flaw, which allows attackers to gain complete administrator privilege on affected devices remotely and without authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kansas Supreme Court Probes Potential Ransomware Attack

Data Breach Today

Electronic Filing and Payments Offline as Courts Revert to Paper Records and Faxes The Kansas Supreme Court said it's probing a "security incident" that has disrupted access to IT systems also used by the state's Court of Appeals and every District Court but one, leaving them unable to accept electronic filing of documents or process some cases.

article thumbnail

Cisco warns of active exploitation of IOS XE zero-day

Security Affairs

Cisco warned customers of a critical zero-day vulnerability in its IOS XE Software that is actively exploited in attacks. Cisco warned customers of a zero-day vulnerability, tracked as CVE-2023-20198 (CVSS score 10), in its IOS XE Software that is actively exploited in attacks. The IT giant found the vulnerability during the resolution of multiple Technical Assistance Center (TAC) support cases.

Access 134
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Victim Count Doubles in Heart Institute Data Theft Hack

Data Breach Today

Tennessee Practice So Far Faces 5 Proposed Class Action Lawsuits The number of people affected by a Tennessee cardiac care clinic hack has more than doubled to 411,000 since the healthcare group first reported the incident to regulators in July. Cybercriminal group Karakurt claimed responsibility for the attack, which has so far triggered five class action suits.

282
282

More Trending

article thumbnail

Women Political Leaders Targeted With RomCom RAT Variant

Data Breach Today

Researchers Attribute Campaign to Threat Actor Tracked as Void Rabisu A financially motivated hacking group turned cyberespionage operation targeted attendees of high-profile European conferences, including the Women Political Leaders Summit in Brussels. Threat actor Void Rabisu - also known as Tropical Scorpius and UNC2596 - has been honing its backdoor.

IT 273
article thumbnail

Microsoft Defender thwarted Akira ransomware attack on an industrial engineering firm

Security Affairs

Microsoft thwarted a large-scale hacking campaign carried out by Akira ransomware operators targeting an unknown industrial organization. Microsoft announced that its Microsoft Defender for Endpoint helped to block a large-scale hacking campaign carried out by Akira ransomware operators (tracked by Microsoft as Storm-1567) The attack took place in early June 2023 and aimed at an industrial engineering organization.

article thumbnail

Collibra Announces Data Quality with Pushdown for Google BigQuery (in Beta)

Collibra

Google BigQuery is one of the most used cloud data warehouses in the world by companies in need of high performance and scalability in support of Analytics and AI initiatives. Google has always been an innovator in all aspects of their business and Collibra wants to extend the value you’re receiving from your investment. We’re excited to announce that Collibra Data Quality with Pushdown for Google BigQuery is now available in beta.

article thumbnail

Signal denies claims of an alleged zero-day flaw in its platform

Security Affairs

Encrypted messaging app Signal denied claims of an alleged zero-day flaw in its platform after a responsible investigation. The popular encrypted messaging app Signal denied claims of an alleged zero-day vulnerability in its platform. The company launched an investigation into the claims after they have seen the vague viral reports alleging a zero-day vulnerability. “PSA: we have seen the vague viral reports alleging a Signal 0-day vulnerability.

IT 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Malicious 'Airstrike Alert' App Targets Israelis

Dark Reading

A spoofed version of the popular RedAlert app collects sensitive user data on Israeli citizens, including contacts, call logs, SMS account details, and more.

105
105
article thumbnail

Subscribe to CyberheistNews, Now Available on LinkedIn!

KnowBe4

We're so excited to announce that CyberheistNews is now available on LinkedIn! Stay informed about the latest in cybercrime, social engineering and more.

95
article thumbnail

How Data Changes the Cyber-Insurance Market Outlook

Dark Reading

By using data to drive policy underwriting, cyber-insurance companies can offer coverage without a price tag that drives customers away.

Insurance 105
article thumbnail

Public Cloud Security Explained: Everything You Need to Know

eSecurity Planet

Public cloud security refers to protections put in place to secure data and resources in cloud environments shared by multiple users or organizations. Security responsibilities in public cloud environments are typically shared by the cloud services provider and customer under the shared responsibility model , with the cloud provider responsible for securing the cloud infrastructure and the customer responsible for access management, application connections and security, and the storage, transfer

Cloud 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

'RomCom' Cyber Campaign Targets Women Political Leaders

Dark Reading

A threat group known as "Void Rabisu" used a spoofed Women Political Leaders Summit website to target attendees to the actual conference with espionage malware.

85
article thumbnail

Six keys to achieving advanced container monitoring

IBM Big Data Hub

Organizations have increasingly turned to containerization to create more scalable, efficient and agile infrastructure. Containerization involves packaging software code with the libraries and dependencies required to run the code. This creates self-contained code that can be run on any infrastructure, such as desktop, on-premises IT or cloud-native.

article thumbnail

Name That Toon: Modern Monarchy

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

95
article thumbnail

How to use foundation models and trusted governance to manage AI workflow risk

IBM Big Data Hub

Artificial intelligence (AI) adoption is still in its early stages. As more businesses use AI systems and the technology continues to mature and change, improper use could expose a company to significant financial, operational, regulatory and reputational risks. Using AI for certain business tasks or without guardrails in place may also not align with an organization’s core values.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 Ways Hospitals Can Help Improve Their IoT Security

Dark Reading

HIPAA compliance does not equal security, as continuing attacks on healthcare organizations show. Medical devices need to be secured.

IoT 87
article thumbnail

Shedding light on AI bias with real world examples

IBM Big Data Hub

As companies increase their use of artificial intelligence (AI), people are questioning the extent to which human biases have made their way into AI systems. Examples of AI bias in the real world show us that when discriminatory data and algorithms are baked into AI models, the models deploy biases at scale and amplify the resulting negative effects.

article thumbnail

Security Must Empower AI Developers Now

Dark Reading

Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.

article thumbnail

IBM Named a Leader in the 2023 Gartner Magic Quadrant for API Management

IBM Big Data Hub

APIs serve as essential connectors between the growing number of data sources and applications in companies of all sizes and in all industries. This means that businesses are relying on and creating more APIs than ever before to get the data they need to power their applications and experiences, and scale their operations. However, it’s difficult to manage APIs manually, which is why organizations are turning to API management solutions like IBM API Connect® to bring consistency and s

Cloud 73
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Zero Trust Is the Cloud Security Imperative

Dark Reading

The security principle of zero trust is the cornerstone of robust cloud security.

Cloud 98
article thumbnail

Challenges and risks associated with lack of real-time monitoring in SAP

IBM Big Data Hub

Real-time monitoring in SAP BTP lets users harness the power of proactive detection and transform their operations, eliminating problems related to sluggish performance, downtime and troubleshooting errors. Real-time monitoring provides for a much-improved user experience, supporting swift action against performance degradation and prompt resolution of issues.

Risk 72
article thumbnail

3 Essential Steps to Strengthen SaaS Security

Dark Reading

SaaS security is broad, possibly confusing, but undeniably crucial. Make sure you have the basics in place: discovery, risk assessment, and user access management.

article thumbnail

10 Reasons to Prescribe Facial Recognition in Healthcare for Patient Identification

HID Global

Explore 10 ways AI-powered facial recognition in healthcare facilities enhances patient identification & safety, prevents fraud, and streamlines operations.

59
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Feds hit Penn State University with false claims lawsuit over cyber compliance via SC Media

IG Guru

Check out the article here. The post Feds hit Penn State University with false claims lawsuit over cyber compliance via SC Media first appeared on IG GURU.

article thumbnail

The True Cost of IT Vacancies for Your Cybersecurity

Adapture

The average organization loses hundreds of dollars a day with each skilled role that goes unfilled. When that role is in cybersecurity, letting it go unfilled can be even more expensive. You aren’t paying the cost of IT vacancies in money, you’re paying in the risk your organization faces, in the increased pressure put on your team and in the extra time it takes your team to accomplish routine tasks and respond to threats.

article thumbnail

Mitigating social engineering attacks

Jamf

Social engineering is a common (and costly) attack that plagues organizations today. This blog discusses techniques to add to your defense-in-depth strategy to help defend against these nefarious threats.

52