Tue.Nov 21, 2023

article thumbnail

Amid Citrix Bleed Exploits, NetScaler Warns: Kill Sessions

Data Breach Today

LockBit and Nation-State Groups Using Session Tokens to Access Patched Devices With experts warning that NetScaler ADC and Gateway devices are being exploited by nation-state and cybercrime groups, the manufacturer has again urged all users to "patch immediately as well as terminate active sessions, which attackers can otherwise use to access devices even post-patch.

article thumbnail

AI in the Real World

AIIM

Recently, I was lucky enough to be part of a networking group that got to see a real world demo of Chat GPT in a highly practical use case. The use case was focused on internal search within an organization and utilized the strengths of Chat GPT as a Large Language Model (LLM). The organization demonstrating the use case explained they used a conversational use interface (UI) that focused on user experience and making it easier for the user to find the information they were looking for without h

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leading Nuclear Energy Testing Lab Suffers Major Data Breach

Data Breach Today

Hacktivists Leak Sensitive Employee Information From Idaho National Laboratory The hacktivist group SiegedSec has taken responsibility for a massive data breach targeting Idaho National Laboratory, a leading nuclear energy testing lab. Concerns are now growing over what data was stolen from the laboratory - and who might have access to it.

article thumbnail

Exploit for Critical Windows Defender Bypass Goes Public

Dark Reading

Threat actors were actively exploiting CVE-2023-36025 in Windows SmartScreen as a zero-day vulnerability before Microsoft patched it in November.

IT 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Instability on OpenAI's Board Led to Sam Altman's Firing

Data Breach Today

A Small Board Composed of Many Insiders Created the Conditions for a Shock Firing Having a small board of directors composed largely of current employees left OpenAI with insufficient governance and oversight, creating the conditions for Sam Altman's firing. Technology or financial firms considering an investment in OpenAI should have demanded a more stable and competent board.

More Trending

article thumbnail

CISA Releases Health Sector Vulnerability Mitigation Guide

Data Breach Today

Agency Maps its Advice to Other Health Industry Cyber Best Practice Resources A new guide from the Cybersecurity and Infrastructure Security Agency aims to help healthcare and public health sector entities get a much tighter grip on managing serious risks posed by the most troublesome types of vulnerabilities threatening the beleaguered industry.

article thumbnail

Experts warn of a surge in NetSupport RAT attacks against education and government sectors

Security Affairs

Experts warn of a surge in NetSupport RAT attacks against education, government, and business services sectors. The Carbon Black Managed Detection & Response team is warning of a surge in the number of new infections related to NetSupport RAT in the last few weeks. The most impacted sectors are education, government, and business services. NetSupport RAT is a remote control and desktop management software developed by NetSupport Ltd.

Education 123
article thumbnail

Binance Chief Resigns in Money Laundering Plea Deal

Data Breach Today

World's Largest Cryptocurrency Exchange Will Pay $4.3 Billion Binance Chief Executive Changpeng Zhao will plead guilty to violating anti-money laundering statutes in U.S. federal court in a settlement ending an investigation into illicit transactions at the world's largest cryptocurrency exchange. The company will pay $4.3 billion in fines and forfeiture.

268
268
article thumbnail

Compromised Bloomberg Crypto Channel Phishes for Thousands of Discord Users' Login Details

KnowBe4

Scammers are using a compromised X (formerly Twitter) account belonging to Bloomberg Crypto to send users to a phishing site designed to steal Discord credentials, BleepingComputer reports.

Phishing 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Binance Exits US in Deal Settling Money Laundering Charges

Data Breach Today

Cryptocurrency Platform Facilitated Sanctions Violations, Cyber Criminal Proceeds The world's largest cryptocurrency exchange will withdraw from the U.S. market after now-former chief executive officer Changpeng Zhao pleaded guilty to felony money laundering charges in a U.S. court and the company agreed to pay $4.3 billion into federal coffers.

Marketing 266
article thumbnail

73% of Organizations Affected by Ransomware Attacks Globally in 2023, According to Statista

KnowBe4

I recently wrote about how 1 in 34 organizations globally has experienced an attempted ransomware attack. But that statistic doesn’t provide enough context around the impact felt by the organizations that do business in one form or another with those that are attacked.

article thumbnail

FTC Votes to Enhance and Expand AI Investigation Processes

Data Breach Today

FTC Approves Use of Subpoena-Like Compulsory Measure For AI-Related Probes The Federal Trade Commission voted unanimously to approve the use of civil investigative demands for investigations related to the use of artificial intelligence, after a White House executive order on AI tasked the commission with policing competition and protecting consumers.

article thumbnail

Level up your Kafka applications with schemas

IBM Big Data Hub

Apache Kafka is a well-known open-source event store and stream processing platform and has grown to become the de facto standard for data streaming. In this article, developer Michael Burgess provides an insight into the concept of schemas and schema management as a way to add value to your event-driven applications on the fully managed Kafka service, IBM Event Streams on IBM Cloud ® What is a schema?

Cloud 107
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Patient privacy fears as US spy tech firm Palantir wins £330m NHS contract

The Guardian Data Protection

Awarding of contract to create new data platform prompts immediate concerns about security of medical records UK politics live – latest updates The NHS has caused controversy by handing the US spy technology company Palantir a £330m contract to create a new data platform, triggering fears about the privacy of patients’ medical details. The move immediately prompted concerns about the security and privacy of patient medical records and the suitability of Palantir to be given access to and oversig

Privacy 111
article thumbnail

AI Helps Uncover Russian State-Sponsored Disinformation in Hungary

Dark Reading

Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion.

100
100
article thumbnail

What’s new in Jamf Pro 11.1

Jamf

In this blog, learn more about how the new, exciting features included in this release continue helping Apple Admins with our best-in-breed , Apple-first and Apple-best MDM solution.

MDM 98
article thumbnail

DPRK Hackers Masquerade as Tech Recruiters, Job Seekers

Dark Reading

No one has turned the job market into an attack surface quite like North Korea, which plays both sides for financial gain and, possibly, espionage.

Marketing 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Email Security Flaw Found in the Wild

Schneier on Security

Google’s Threat Analysis Group announced a zero-day against the Zimbra Collaboration email server that has been used against governments around the world. TAG has observed four different groups exploiting the same bug to steal email data, user credentials, and authentication tokens. Most of this activity occurred after the initial fix became public on Github.

article thumbnail

Inside Job: Cyber Exec Admits to Hospital Hacks

Dark Reading

Healthcare cyber services executive Vikas Singla admits to hobbling hospital operations, then using the incidents to try and gin up extra business.

95
article thumbnail

Tor Project removed several relays associated with a suspicious cryptocurrency scheme

Security Affairs

The Tor Project removed several relays that were used as part of a cryptocurrency scheme and represented a threat to the users. The Tor Project announced the removal of multiple network relays that were involved in a cryptocurrency scheme. A Tor network relay is a server that operates within the Tor network and routes data through a series of relays with the end goal of anonymizing the original source of the traffic.

Risk 91
article thumbnail

Palantir’s Peter Thiel: NHS is a natural target for outspoken tech billionaire

The Guardian Data Protection

Silicon Valley outsider whose firm has won data contract has previously said health service should be ripped up to ‘start over’ UK politics live – latest updates Peter Thiel likes to say “the unpopular thing”, according to his biographer, so the NHS would be a natural target for the outspoken tech billionaire. The co-founder of Palantir , which has just secured a £330m NHS data contract , was in full libertarian mode when discussing the health service in January.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DOJ Charges Binance With Vast Money Laundering Scheme and Sanctions Violations

WIRED Threat Level

From Russia to Iran, the feds have charged Binance with allegedly conducting well over $1 billion in transactions with sanctioned countries and criminal actors.

article thumbnail

AutoZone Files MOVEit Data Breach Notice With State of Maine

Dark Reading

The company temporarily disabled the application and patched the vulnerability, though affected individuals should still remain vigilant.

article thumbnail

UK ICO Issues Statement on the Use of Cookies

Hunton Privacy

On November 21, 2023, the UK Information Commissioner’s Office (“ICO”) issued a statement explaining that it has recently written to companies operating some of the UK’s most visited websites regarding their compliance with data protection laws when using cookies. The ICO noted that certain websites are not providing users with fair choices as to whether or not they are tracked for personalized marketing purposes, and referred to its guidance on making it simple for users to “Reject All” adverti

article thumbnail

Maximize Cybersecurity Returns: 5 Key Steps to Enhancing ROI

Dark Reading

Cybersecurity isn't a one-time task. It's an ongoing effort that needs regular checks, updates, and teamwork.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Proxy Advisory Firm Issues Guidance on Cyber Oversight and Disclosure

Hunton Privacy

Glass Lewis & Co. recently published its updated Benchmark Policy Guidelines for 2024 (the “Policy”), which reflect investors’ continuing focus on corporate disclosure and board oversight of cyber risks. The Policy indicates that Glass Lewis may recommend “against” directors following a cybersecurity incident if it finds the board’s risk oversight or its post-incident response to be insufficient.

article thumbnail

The Role of the CISO in Digital Transformation

Dark Reading

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start.

article thumbnail

SoluSoft helps government agencies tackle fraud faster

OpenText Information Management

Fraud, in all its forms, is a pervasive problem, spanning industries and preying on vulnerabilities in federal and state government systems. Each year in the United States, fraud accounts for billions of dollars of wasted taxpayer money, damaging trust in institutions and potentially even depriving rightful recipients of their own benefits. Stopping fraudsters in their … The post SoluSoft helps government agencies tackle fraud faster appeared first on OpenText Blogs.