Tue.Apr 11, 2023

article thumbnail

Suspected Apple iOS Zero-Day Used to Spread 'Reign' Spyware

Data Breach Today

The Spyware Can Record Audio, Take Pictures, Track Locations and Steal Passwords A low-profile Israeli advanced spyware firm used a suspected zero-day to surveil the lives of journalists, political opposition figures and a nongovernmental organization worker across multiple continents, say researchers from the Citizen Lab and Microsoft.

Passwords 299
article thumbnail

Microsoft (& Apple) Patch Tuesday, April 2023 Edition

Krebs on Security

Microsoft today released software updates to plug 100 security holes in its Windows operating systems and other software, including a zero-day vulnerability that is already being used in active attacks. Not to be outdone, Apple has released a set of important updates addressing two zero-day vulnerabilities that are being used to attack iPhones , iPads and Macs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercrime: Ransomware Hits and Initial Access Listings Grow

Data Breach Today

But If Hydra Takedown Is a Guide, Fresh Disruptions May Take Big Bite Out of Market The cybercrime economy appears to remain alive and well: Compared to last year, researchers report seeing an increase in the number of known ransomware victims as well as initial access listings, which facilitate such attacks. The impact the takedowns of BreachForums and Genesis remains to be seen.

Access 270
article thumbnail

The Secret Value of AIIM: A True Story

AIIM

When Tony invited me to write a guest blog for AIIM, I planned to write a techie piece on the latest document AI news. I was even tempted to ask ChatGPT to write one in the style of Monty Python. You’ll be pleased to know that moment of temporary insanity quickly passed. Instead of techie talk, I would like to tell you a story about the secret value of AIIM and why I think it’s vital that we all pitch in and help Tori Miller Liu and the team to move AIIM forward.

ECM 144
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Proposed Health IT Certification Rules Target AI, Privacy

Data Breach Today

HHS Rules Aimed at Beefing Up Health IT Systems, Patient Data Privacy, Security Federal regulators have issued new rules aimed at securing certified healthcare software, helping patients decide which records to keep private, and protecting data used by AI and predictive tools. The 556-page proposed rule seeks to promote innovation and data sharing while tightening security.

Privacy 144

More Trending

article thumbnail

Feds Call For Certifying, Assessing Veracity of AI Systems

Data Breach Today

Biden Administration Wants to Ensure AI Tech Works as Intended Without Undue Bias The Biden administration plans to develop a roadmap for certifying and assessing that artificial intelligence systems work as intended without causing harm. The Commerce Department has asked for public input on the top policies to support the development of AI audits, assessments and certifications.

article thumbnail

Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads

Dark Reading

The campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.

124
124
article thumbnail

Latitude Financial Refuses to Pay Ransom

Data Breach Today

Ongoing Cyberattack Still Causing Service Disruptions Australian non-bank lender Latitude Financial said it will not pay a ransom demand from extorters behind the data theft of 14 million customer. Australian Home Minister Australian Clare O’Neil called Latitude’s decision "consistent with Australian government advice.

article thumbnail

Car Thieves Hacking the CAN Bus

Schneier on Security

Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic key is nearby. News articles.

110
110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Top 5 Reasons to Use MDR in Public Sector

Data Breach Today

Rob Lalumondier of Sophos on Questions to Ask When Selecting MDR Provider Gartner says by 2025, 50% of companies will be using MDR. What's the compelling business case, and how does it translate to meet the needs of public sector entities? Rob Lalumondier of Sophos shares five reasons to use MDR, as well as key questions to ask when selecting a provider.

IT 144
article thumbnail

How Password Managers Can Get Hacked

Dark Reading

Password managers aren't foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company's defenses.

Passwords 103
article thumbnail

The Mysterious Origin of Albert Ingalls from Little House on the Prairie

Information Governance Perspectives

My wife and I sometimes debate the term “untimely death.” She thinks death is, by nature, untimely, but I believe it’s especially awful when it happens to young people. My brother Albert was one of them, taken from our family at seventeen while crossing the street on a cold, windy night in 1975. I write about his passing and its devastating impact on our family and friends for the first time in my new memoir, The Bastard of Beverly Hills.

IT 98
article thumbnail

The Upside of ESG: Why Strong Sustainability Programs Matter to Modern Enterprises

Hanzo Learning Center

ESG and sustainability are two concepts that have gained significant prominence recently. The World Bank Group’s International Finance Corporation defines ESG as a set of factors that companies and investors consider regarding environmental, social, and governance issues. On the other hand, sustainability refers to organizations' actions to achieve their environmental, social, and corporate governance goals.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Yum! Brands, the owner of KFC, Taco Bell and Pizza Hut, discloses data breach

Security Affairs

Yum! Brands, the company that owns the KFC, Pizza Hut, and Taco Bell brands, disclosed a data breach after the January ransomware attack. On January 13, 2023, Yum! Brands suffered a cyberattack that forced the company to take its systems offline closing roughly 300 restaurants in the UK for one day. Now the company, which owns the KFC, Pizza Hut, and Taco Bell brands, disclosed a data breach and revealed that ransomware actors have stolen personally identifiable information (PII) of an unspecifi

article thumbnail

Microsoft Patches 97 CVEs, Including Zero-Day & Wormable Bugs

Dark Reading

The April 2023 Patch Tuesday security update also included a reissue of a fix for a 10-year-old bug that a threat actor recently exploited in the supply chain attack on 3CX.

Security 101
article thumbnail

A “By-Design” flaw in Microsoft Azure can allow storage accounts takeover

Security Affairs

A flaw in Microsoft Azure could be exploited by attackers to gain access to storage accounts, perform lateral movements, and even execute remote code. Researchers from the security firm Orca demonstrated how to abuse Microsoft Azure Shared Key authorization to gain full access to storage accounts and potentially critical business assets. The issue can also be abused to move laterally in the environment and even execute remote code.

Access 97
article thumbnail

Don’t let bad data drag you down: A retailer’s guide

Collibra

Retail is a dynamic and competitive market. It needs to work around the fickleness of customers and rapidly evolving trends. In addition to the traditional brick-and mortar-stores, the retail business today includes online and mobile stores. Every process at every stage of these stores relies on data. And the role of data is getting bigger in supply chain management, omnichannel customer experiences, and target marketing strategies.

Retail 88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cybercrime group exploits Windows zero-day in ransomware attacks

Security Affairs

Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in ransomware attacks. Microsoft has addressed a zero-day vulnerability, tracked as CVE-2023-28252 , in the Windows Common Log File System (CLFS), which is actively exploited in ransomware attacks. Microsoft fixed the issue with the release of Patch Tuesday security updates for April 2023.

article thumbnail

This Identity Management Day, Go BIG or Go HOME!

Thales Cloud Protection & Licensing

This Identity Management Day, Go BIG or Go HOME! madhav Wed, 04/12/2023 - 06:11 Identity and Access Management (IAM) has evolved significantly over the past decade. It almost feels like we’re at an inflection point at the moment. There are a number of startups emerging in this space, which is a sign of a healthy pipeline of innovation in the industry.

B2C 87
article thumbnail

Apple released emergency updates to fix recently disclosed zero-day bugs on older devices

Security Affairs

Apple released updates to backport patches addressing two actively exploited zero-day vulnerabilities in older iPhones, iPads, and Macs. Apple has released emergency updates to backport security patches that address two actively exploited zero-day flaws also affecting older iPhones, iPads, and Macs. On April 7, 2023, Apple has released emergency security updates to address two actively exploited zero-day vulnerabilities, tracked as CVE-2023-28205 and CVE-2023-28206, impacting iPhones, Macs, and

article thumbnail

7 Things Your Ransomware Response Playbook Is Likely Missing

Dark Reading

Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How IBM invests in opportunities to reach maximum equitable impact

IBM Big Data Hub

At IBM, we strive each day to achieve our purpose; to be the catalyst that helps makes the world work better. We endeavor to be at the forefront of groundbreaking changes in the industries we serve and the global community at large. None of this would be possible without skilled and talented IBMers. Businesses should make equity in the workplace a priority.

article thumbnail

Samsung Engineers Feed Sensitive Data to ChatGPT, Sparking Workplace AI Warnings

Dark Reading

In three separate incidents, engineers at the Korean electronics giant reportedly shared sensitive corporate data with the AI-powered chatbot.

97
article thumbnail

Does HIPAA require penetration testing?

Outpost24

Does HIPAA require penetration testing? 14.Apr.2023 Florian Barre Tue, 04/11/2023 - 09:51 Penetration Testing Teaser The HIPAA Security Rule requires healthcare organizations to perform regular security risk assessments to protect e-PHI. Penetration testing can help organizations with this requirement.

Risk 75
article thumbnail

Where Are the Women? Making Cybersecurity More Inclusive

Dark Reading

Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CyberheistNews Vol 13 #15 [The New Face of Fraud] FTC Sheds Light on AI-Enhanced Family Emergency Scams

KnowBe4

CyberheistNews Vol 13 #15 | April 11th, 2023 [The New Face of Fraud] FTC Sheds Light on AI-Enhanced Family Emergency Scams The Federal Trade Commission is alerting consumers about a next-level, more sophisticated family emergency scam that uses AI which imitates the voice of a "family member in distress." They started out with: "You get a call. There's a panicked voice on the line.

article thumbnail

'Blatantly Obvious': Spyware Offered to Cyberattackers via PyPI Python Repository

Dark Reading

Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their wares.

98
article thumbnail

[Jaw-Dropper] FTX's Cybersecurity Was Hilariously Bad

KnowBe4

4/11/2023 - Gizmodo just dropped this eye-roll inducing news. The disgraced crypto exchange had no dedicated cybersecurity staff and "protected" users assets with minimal safeguards, according to new bankruptcy filings.