Wed.Aug 16, 2023

article thumbnail

More UK Police Suffer Freedom of Information Data Breach

Data Breach Today

Constabularies of Norfolk and Suffolk Alert Follows FOIA Breach in Northern Ireland England's Norfolk and Suffolk constabularies report that they accidentally exposed information on victims and witnesses in response to freedom of information requests just one week after police in Northern Ireland accidentally exposed information on all police officers and staff via an FOI request.

FOIA 246
article thumbnail

5 steps to strengthen critical information protection

OpenText Information Management

In our discussions with customers and countless surveys, cybersecurity and sensitive data protection are always top-ranking issues. IT now has available some of the most advanced cybersecurity innovations in its arsenal than ever before, with excellent authentication and real-time threat detection. While these tools are critical to secure IT infrastructure, many organizations still struggle with … The post 5 steps to strengthen critical information protection appeared first on OpenText Blo

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Advocate Aurora to Settle Web Tracker Claims for $12.25M

Data Breach Today

Attorneys to Get $4.3M and Class Reps to Get $3,500 Each Under Proposed Settlement Advocate Aurora Health has agreed to pay $12.25 million to settle consolidated class action claims that the Illinois-based hospital chain invaded patient privacy by using tracking codes on its websites and patient portal, according to a preliminary settlement plan in Wisconsin federal court.

Privacy 245
article thumbnail

The Most Feared Teacher in the History of Beverly Hills High

Information Governance Perspectives

The following excerpt is from an inspiring new memoir, The Bastard of Beverly Hills, from JIA Publishing Group, available on Amazon , Barnes & Noble and wherever fine books are sold. Mr. Hale was menacing—a carbon copy of boxer Muhammad Ali, with beefy forearms, scarred knuckles, and a perfectly cut Afro. Even his chubby cheeks looked mean. He sat the entire lecture, staring at us like plebs.

IT 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Federal Judge Inclined To Grant Claims in Meta Pixel Case

Data Breach Today

Tentative Order Issued in Consolidated Case Against Meta in Privacy Dispute A federal judge issued a tentative order allowing plaintiffs to continue suing social media giant Meta for allegedly intercepting sensitive health data through its web tracking Pixel tool embedded into patient portals and scheduling apps. Meta attorneys had sought to have the lawsuit dismissed.

Privacy 245

More Trending

article thumbnail

Cisco Secure Access: SSE That Enables the Business

Data Breach Today

Cloud-Delivered Security Service Edge Solution Gives Efficient Hybrid Work Security Cisco Secure Access is a security service edge solution that delivers zero trust access to efficiently solve today's challenge of safely connecting anything to anywhere and reimagines the experience to make it better for users, easier for IT and safer for everyone.

Access 245
article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. Starting from May 2023, researchers from Cofense discovered a large-scale phishing campaign using QR codes in attacks aimed at stealing the Microsoft credentials of users from multiple industries One of the organizations targeted by hackers is a notable energy company in the US. “Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes tar

article thumbnail

German Police Warn of Increased Foreign Cybercrime Threat

Data Breach Today

BKA Says Cybercrime From Overseas Actors Surged by 8% in 2022 Ransomware and other cyberthreats stemming from overseas actors surged last year in Germany, causing losses worth billions of euros, the country's federal police said. While domestic cybercrime decreased by 6.5% in comparison to 2021, they said, crimes committed by foreign actors increased by 8%.

article thumbnail

Approximately 2000 Citrix NetScaler servers were backdoored in a massive campaign

Security Affairs

A threat actor has compromised roughly 2,000 Citrix NetScaler servers exploiting a remote code execution tracked as CVE-2023-3519. In July Citrix warned customers of a critical vulnerability, tracked as CVE-2023-3519 (CVSS score: 9.8), in NetScaler Application Delivery Controller (ADC) and Gateway that is being actively exploited in the wild The vulnerability CVE-2023-3519 (CVSS score: 9.8) is a code injection that could result in unauthenticated remote code execution.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Patched Citrix NetScaler Devices Still Contain Backdoors

Data Breach Today

Online Scans Show More Than 1,200 Patched NetScaler Devices Are Backdoored Hackers moved faster than system administrators to exploit a zero-day vulnerability in Citrix NetScaler appliances by dropping web shells that remain active even after a patch, warn Dutch security researchers. Dutch firm Fox-IT says researchers "could not discern a pattern in the targeting.

article thumbnail

CISA adds flaw in Citrix ShareFile to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added critical vulnerability CVE-2023-24489 in Citrix ShareFile to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added critical flaw CVE-2023-24489 (CVSS score 9.8) affecting Citrix ShareFile to its Known Exploited Vulnerabilities Catalog. Citrix ShareFile is a secure file sharing and storage platform designed for businesses and professionals to collaborate on documents, exchange files, and manage content in a secure and efficient

IT 86
article thumbnail

How AI Can Help Mitigate BEC Scams

Data Breach Today

AI Is a Powerful Ally, Equipping Firms With Enhanced Detection and Training Apart from some of the threats surrounding AI, this emerging technology can help defenders formulate effective policies and controls to prevent and mitigate BEC scams. With the evolving threat landscape, harnessing AI becomes crucial in defending, said Johan Dreyer, CTO at Mimecast.

242
242
article thumbnail

UK Electoral Commission Hacked

Schneier on Security

The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack and the discovery. It doesn’t know who was behind the hack. We worked with external security experts and the National Cyber Security Centre to investigate and secure our systems. If the hack was by a major government, the odds are really low that it has resecured its systems—unless it burned the network to the ground and rebuilt it from scratch (which see

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

AI in XDR: When Does It Make Sense?

Data Breach Today

Cisco's AJ Shipley on When Generative AI Is Useful and When It's Dangerous ChatGPT set the world on fire six months ago, and since then a slew of companies have released features or products built on or around generative AI - some of them completely legitimate and some of them little more than snake oil. Does AI makes sense everywhere for everything?

IT 234
article thumbnail

Ransomware Attacks Surge as Generative AI Becomes a Commodity Tool in the Threat Actor’s Arsenal

KnowBe4

According to a new report, cybercriminals are making full use of AI to create more convincing phishing emails, generating malware, and more to increase the chances of ransomware attack success.

article thumbnail

RiskLens, Axio Lead Cyber Risk Quantification Forrester Wave

Data Breach Today

ThreatConnect Earns High Marks as CRQ Helps CISOs Prove Return on Cyber Investment Recently acquired RiskLens edged out startup Axio and incumbent ThreatConnect for the top spot in Forrester's first-ever cyber risk quantification rankings. Cyber risk quantification focused on theoretical methodology for about 10 years but shifted to practical applications over the past five years.

Risk 228
article thumbnail

Social Media Platforms Become Half of all Phishing Attack Targets

KnowBe4

Social platforms are the current favorite target of cybercriminals, displacing financial institutions, providing cybercriminals with credentials to be used as launch points for further phishing campaigns.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Generative AI Will Improve Incident Response

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alex Waintraub, DFIR expert evangelist at CYGNVS, discusses how generative AI will play a role in the future of incident response - and in all aspects of cybersecurity - and emphasizes its dangers as well as its benefits.

article thumbnail

Not Another Voter Registration Scam (But It Looks Like One)

KnowBe4

The UK government’s voter registration website is causing confusion again, according to Ax Sharma at BleepingComputer. The site, hosted at a “.com” address, often makes users wonder if they’re being scammed.

IT 79
article thumbnail

PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks

Dark Reading

Microsoft is aware of the issue, but so far its attempts to address it don't appear to have worked, the vendor says.

IT 91
article thumbnail

Cybercriminals May Already Have Hacked Your LinkedIn Account

KnowBe4

New reports show many LinkedIn users have reported several complaints about accounts being taken over by bad actors.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Iran and the Rise of Cyber-Enabled Influence Operations

Dark Reading

Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.

76
article thumbnail

Ransomware's Paradox: Why Falling Monetization Rates Are Accompanied by Soaring Ransom Payments - A Must-Read Analysis.

KnowBe4

Grab a cup of coffee, and let's talk about something that's been making waves in the cybersecurity world: ransomware. You've probably heard about the alarming rise in ransom payments, but did you know that ransom monetization rates have actually fallen to a record low? It's a complex and evolving landscape, and we're here to break down the recent very interesting Coveware report for you.

article thumbnail

Citrix ADC, Gateways Still Backdoored, Even After Being Patched

Dark Reading

Even after updating Citrix networking appliances to address the critical vulnerability, enterprise defenders have to check each one to ensure they have not already been compromised.

70
article thumbnail

Enterprise Secrets Management Explained: Best Practices, Challenges, and Tool Selection

Thales Cloud Protection & Licensing

Enterprise Secrets Management Explained: Best Practices, Challenges, and Tool Selection madhav Thu, 08/17/2023 - 06:28 Whether hosted in the cloud or on-premises, modern applications and integrations have accelerated the need for digital secrets. These secrets control data access when transferred between applications—sending information from a webpage, making a secure request to an API, accessing a cloud database, or countless other cases that modern enterprises encounter while pursuing digital

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Insurance Data Breach Victims File Class-Action Suit Against Law Firm

Dark Reading

This time, it's the law firm that got breached, then sued for what victims claim was inadequate protection and compensation for theft of personal data.

article thumbnail

6 considerations to take when approximating cloud spend

IBM Big Data Hub

Cloud computing can add a collective $3 trillion to organizations that harness it correctly, according to McKinsey. It is poised to transform businesses and industries, revolutionize how employees and other stakeholders collaborate, and drive digital transformation initiatives. Many organizations have spent the past few years investing heavily in the cloud.

Cloud 67
article thumbnail

QR Code Phishing Campaign Targets Top US Energy Company

Dark Reading

Attackers sent more than 1,000 emails with 2FA, MFA, and other security-related lures aimed at stealing Microsoft credentials.