Fri.Feb 02, 2024

article thumbnail

More Ransomware Victims Are Declining to Pay Extortionists

Data Breach Today

While Average Falls Below 30%, We're Still Far From Seeing Criminal Profits Dry Up The number of victims who opt to pay a ransom appears to have declined to a record low. During the last three months of 2023, an average of 29% of organizations hit by ransomware paid a ransom - a notable shift from what ransomware watchers saw in recent years.

article thumbnail

Telling a Story with Keynotes at AIIM Conference 2024

AIIM

Storytelling has been a trending tactic for event planners for the past couple years. And with good reason. Stories enrich experiences and make education and messaging more memorable. Here's how we are incorporating storytelling at the AIIM Conference 2024 in San Antonio, Texas, April 3-5 and some tips for how you can incorporate storytelling tactics when planning your own meetings and events.

Education 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Face a Midnight Deadline for Resetting Ivanti Gateways

Data Breach Today

CISA Says Agencies Must Disconnect and Reset Ivanti VPN Devices by Midnight Friday U.S. federal agencies have until midnight Friday to disconnect Ivanti VPN devices and perform a factory reset before reconnecting them to the network. Fifteen agencies use the gateways, which were hit by likely Chinese hackers in an espionage campaign and are riddled with zero-day vulnerabilities.

268
268
article thumbnail

Iranian hackers breached Albania’s Institute of Statistics (INSTAT)

Security Affairs

Albania’s Institute of Statistics (INSTAT) announced that it was targeted by a sophisticated cyberattack that affected some of its systems. A sophisticated cyberattack on Wednesday hit Albania’s Institute of Statistics (INSTAT). The institute confirmed that the attack affected some of its systems. Albania’s Institute of Statistics (INSTAT) promptly activated emergency protocols to respond to the incident.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cyber Fail: When Ransomware Gangs Get Careless

Data Breach Today

Also: Rampant App Vulnerabilities, Cloud Misconfiguration and Why CISOs Matter Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we examine what happens when ransomware groups get careless, application developers' laissez-faire attitude toward vulnerabilities, and the security woes of a beleaguered crypto exchange.

More Trending

article thumbnail

FritzFrog Botnet Exploits Log4Shell

Data Breach Today

Botnet Looks for Vulnerable Internal Network Machines Delivering more proof that the Log4Shell vulnerability is endemic, Akamai researchers detected botnet malware updated to use the flaw as an infection vector. Log4Shell burst into public awareness in late 2021 when security researchers identified a flaw in the ubiquitous Apache Log4J 2 Java library.

Libraries 264
article thumbnail

Cloudflare breached on Thanksgiving Day, but the attack was promptly contained

Security Affairs

Cloudflare revealed that a nation-state actor breached its internal Atlassian server, gaining access to the internal wiki and its bug database (Atlassian Jira). The incident took place on Thanksgiving Day, November 23, 2023, and Cloudflare immediately began an investigation with the help of CrowdStrike. The company pointed out that no customer data or systems were impacted by this security breach.

Access 114
article thumbnail

ISMG Editors: Why Are Microsoft's Systems So Vulnerable?

Data Breach Today

Also: AI in Cloud Security, Integrating Zero Trust Principles into API Deployment In the latest weekly update, ISMG editors discussed the potential role of AI in cloud security, how the recent cyberattack on Microsoft by Russian state hackers highlighted the vulnerabilities associated with legacy systems, and how to secure APIs in the age of zero trust.

Cloud 260
article thumbnail

David Kahn

Schneier on Security

David Kahn has died. His groundbreaking book, The Codebreakers was the first serious book I read about codebreaking, and one of the primary reasons I entered this field. He will be missed.

106
106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Detecting First-Party Fraud: Strategies and Challenges

Data Breach Today

Credit Union Lender Discusses Expanding Role of Credit Repair Companies in Fraud Detecting first-party fraud poses unique challenges. Data plays a critical role in spotting fraud by pointing out patterns such as high charge-off balances that hint at premeditated fraud, said Matt Beardsley, senior manager of consumer lending at PenFed Credit Union.

255
255
article thumbnail

PurpleFox malware infected at least 2,000 computers in Ukraine

Security Affairs

The Computer Emergency Response Team in Ukraine (CERT-UA) reported that a PurpleFox malware campaign had already infected at least 2,000 computers in the country. The Computer Emergency Response Team in Ukraine (CERT-UA) is warning about a malware campaign that has infected at least 2,000 computers in the country with the PurpleFox malware (aka ‘ DirtyMoe ‘). “The Government Computer Emergency Response Team of Ukraine CERT-UA, guided by Clause 1 of Article 9 of the Law of Ukrai

Mining 104
article thumbnail

UK Lawmakers Push Ahead With Revised Snoopers' Charter

Data Breach Today

The Investigatory Powers Bill Will Allow Police to Collect More Data Proposed legislation called the "snoopers' charter," which would allow British intelligence agencies to collect data on a large scale, cleared further parliamentary scrutiny this week despite mounting criticism from privacy advocates, watchdog groups and technology companies.

Privacy 251
article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

A former software engineer with the U.S. CIA has been sentenced to 40 years in prison for leaking classified documents. Former CIA employee Joshua Adam Schulte has been sentenced to 40 years in prison for passing classified documents to WikiLeaks and for possessing child pornographic material. “Damian Williams, the United States Attorney for the Southern District of New York; Matthew G.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

4 questions to consider when you’re selecting an external DNS provider

IBM Big Data Hub

There are many reasons to move to a managed DNS platform, but they all revolve around a central theme. Once you reach a critical mass of traffic and start getting concerned about the performance and reliability of what you’re delivering, it’s time to consider a managed DNS solution. There are several well-known options out there, and to a newcomer they can appear relatively similar at first.

Cloud 94
article thumbnail

Operation Synergia led to the arrest of 31 individuals

Security Affairs

An international law enforcement operation, named Synergia, led to the arrest of 31 individuals involved in ransomware, banking malware, and phishing attacks. Operation Synergia was led by Interpol and ran from September to November 2023 involving law enforcement agencies from 50 countries. The international law enforcement operation was launched to curb the escalation and professionalisation of transnational cybercrime.

Phishing 101
article thumbnail

Is premium DNS worth it?

IBM Big Data Hub

There’s a moment in the life of most enterprises where the connection between Domain Name System (DNS) and revenue comes into greater focus. It’s the moment when businesses discover that delivering high-quality applications, services and content requires more attention to the quality of DNS connections. For most businesses, this is also the moment when they discover that the free DNS services offered by domain registrars or DIY systems they’ve been using are no longer fit for p

IT 94
article thumbnail

Vendor Email Compromise Attacks Against Financial Services Surge 137% Last Year

KnowBe4

Analysis of 2023 attacks shows how the financial services industry had a very bad year, with increases in both vendor email compromise (VEC) and business email compromise (BEC) attacks, targeting millions of dollars using very specific methods.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IBM Databand: Self-learning for anomaly detection

IBM Big Data Hub

Almost a year ago, IBM encountered a data validation issue during one of our time-sensitive mergers and acquisitions data flows. We faced several challenges as we worked to resolve the issue, including troubleshooting, identifying the problem, fixing the data flow, making changes to downstream data pipelines and performing an ad hoc run of an automated workflow.

article thumbnail

Luck, self-reflection, and learning on the path to success as a Health Librarian

CILIP

Luck, self-reflection, and learning on the path to success as a Health Librarian Emily Johnson Deputy Knowledge Manager at University Hospitals Birmingham NHS Foundation Trust. In 2023 she was lauded as a member of the CILIP 125. Emily’s career has not taken the straight path, but she has found her place as Deputy Knowledge Manager at University Hospitals Birmingham NHS Foundation Trust, where she uses a formidable range of skills and experience and leads a rewarding professional life.

article thumbnail

Expert Insight: Vanessa Horton on Anti-Forensics

IT Governance

How attackers try to remain undetected and/or mask their actions Vanessa Horton holds a degree in computer forensics, as well as a number of cyber security and forensics qualifications. She has worked for the police as a digital forensics officer, where she was involved in complex crime cases, and was awarded a Diamond Award and an Excellence in Service Delivery Award.

article thumbnail

NYDFS issues significant guidance on insurers using AI or external data

Data Protection Report

On January 17, 2024 the New York Department of Financial Services (“NYDFS”) published a Proposed Insurance Circular Letter (“Proposed Circular”) regarding the use of artificial intelligence systems (“AIS”) and external consumer data and information sources (“ECDIS”) in insurance underwriting and pricing. This Proposed Circular does not create or change any legislation, but once finalized, will reflect how NYDFS interprets existing laws and regulations as they relate to AIS and ECDIS and to clari

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Friday Squid Blogging: Illex Squid in Argentina Waters

Schneier on Security

Argentina is reporting that there is a good population of illex squid in its waters ready for fishing, and is working to ensure that Chinese fishing boats don’t take it all. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

How the Recording Academy uses IBM watsonx to enhance the fan experience at the GRAMMYs®

IBM Big Data Hub

Through the GRAMMYs®, the Recording Academy® seeks to recognize excellence in the recording arts and sciences and ensure that music remains an indelible part of our culture. When the world’s top recording stars cross the red carpet at the 66th Annual GRAMMY Awards, IBM will be there once again. This year, the business challenge facing the GRAMMYs paralleled those of other iconic cultural sports and entertainment events: in today’s highly fragmented media landscape, creating

article thumbnail

The Mac turns 40 — and keeps on moving via The Verge

IG Guru

Check out the article here. The post The Mac turns 40 — and keeps on moving via The Verge first appeared on IG GURU.

83
article thumbnail

How Email Archiving Can Simplify Your Work Life

Docuware

Emails are more than a communication vehicle. They also contain critical business information. But emails tend to be informal and that tricks us into thinking that they don’t need to be archived and searchable. We also forget that some emails need to be retained for compliance.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Examples of sustainability: How new efforts are shaping the environmental future

IBM Big Data Hub

As the world grapples with the realities of climate change , sustainability has evolved from a buzzword to a global imperative. Countries, communities and corporations are seeking ways to slow the pace of change and reduce the impact of human and business activities on the environment. Today, sustainability efforts are being shaped by new urgency and new technology.

article thumbnail

A Self-Enforcing Protocol to Solve Gerrymandering

Schneier on Security

In 2009, I wrote : There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them. This works, but it requires another person. Another way is for one person to divide the piece, and the other person to complain (to the police, a judge, or his parents) if he doesn’t think it’s fair. This also works, but still requires another person—­at least to resolve disputes.

Paper 121