Mon.Jul 17, 2023

article thumbnail

Hacker Stole Signing Key, Hit US Government's Microsoft 365

Data Breach Today

Monitor Logs to Spot Zero-Day Attack, US Cybersecurity Officials Advise Suspected Chinese hackers gained access to senior U.S. officials' emails by exploiting a zero-day vulnerability in Microsoft's cloud environment. While Microsoft said customers couldn't have prevented the attack, the U.S. government says logging was key to spotting it.

article thumbnail

Teaching with technology is more than web access

Jamf

Unifying the devices in your classroom lets you take advantage of more than what the internet has to offer. Leveraging the capabilties and accessibility of Apple devices gives students, teachers and parents the tools they need to foster a creative education environment — read this blog to learn more.

Access 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Surveillance Society and Digital Freedom

Data Breach Today

We live in a surveillance society, but even though citizens are concerned about the lack of privacy, they don't know what to do about it, said David Sinclair, founder of 4Freedom Mobile, a mobile service provider that helps subscribers secure their phones and stop tracking, hacking and data theft.

Privacy 130
article thumbnail

Adobe warns customers of a critical ColdFusion RCE exploited in attacks

Security Affairs

Adobe is warning customers of a critical ColdFusion pre-authentication RCE bug, tracked as CVE-2023-29300, which is actively exploited. Adobe warns customers of a critical ColdFusion pre-authentication remote code execution vulnerability, tracked as CVE-2023-29300 (CVSS score 9.8), that is actively exploited in attacks in the wild. “Adobe is aware that CVE-2023-29300 has been exploited in the wild in very limited attacks targeting Adobe ColdFusion,” reads a statement sent by the comp

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Fostering a More Inclusive Culture to Close the Skills Gap

Data Breach Today

Ed Parsons of (ISC)² on Meeting Underrepresented Groups 'Where They Are' In the drive to build a more diverse workforce, security organizations are progressing in many ways, such as ensuring that required skills in job descriptions are more inclusive, said Ed Parsons of (ISC)². But he added that job recruiters need to "meet underrepresented groups where they are.

Security 130

More Trending

article thumbnail

WormGPT: How GPT's Evil Twin Could Be Used in BEC Attacks

Data Breach Today

Black Hat AI Tool Helps Hackers Create Convincing Phishing Emails, Researchers Warn Cybercriminals may be using a generative AI tool called WormGPT to create convincing phishing emails to support business email compromise attacks. A new survey shows that 1 in 5 people fall for the fake, AI-generated emails, according to cybersecurity researchers.

Phishing 130
article thumbnail

5 Major Takeaways From Microsoft's July Patch Tuesday

Dark Reading

July's updates contained 100+ patches and security policy notes, leaving vulnerability management teams stressed and scrambling to prioritize. We're here to help find some zen.

article thumbnail

BreachForums' Admin Pleads Guilty, Faces 40 Years in Prison

Data Breach Today

Conor 'Pompompurin' Fitzpatrick, 20, Charged with Hacking, Amassed $700K in a Year The administrator of the now-defunct BreachForums has pleaded guilty to two counts of hacking and one count of child pornographic possession. Conor Fitzpatrick, 20, operating under the moniker Pompompurin, made nearly $700,000 running the criminal online forum for just under a year.

130
130
article thumbnail

Tracking Down a Suspect through Cell Phone Records

Schneier on Security

Interesting forensics in connection with a serial killer arrest: Investigators went through phone records collected from both midtown Manhattan and the Massapequa Park area of Long Island—two areas connected to a “burner phone” they had tied to the killings. (In court, prosecutors later said the burner phone was identified via an email account used to “solicit and arrange for sexual activity.” The victims had all been Craigslist escorts, according to officials.

Access 84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Elevating Cloud Transformation with Zero Trust Networks: Reinventing Data Security

Data Breach Today

Naveen Palavalli, Vice President Product Strategy, Netskope on the rise of Zero Trust Networks Naveen Palavalli, Vice President Product Strategy, Netskope discusses the impact that the rise of Zero Trust Networks has had upon Cloud Transformation and Access

Cloud 130
article thumbnail

WormGPT, an "ethics-free" Cyber Crime text generator

KnowBe4

CyberWire wrote: "Researchers at SlashNext describe a generative AI cybercrime tool called “WormGPT,” which is being advertised on underground forums as “a blackhat alternative to GPT models, designed specifically for malicious activities.” The tool can generate output that legitimate AI models try to prevent, such as malware code or phishing templates.

article thumbnail

Microsoft 'Logging Tax' Hinders Incident Response, Experts Warn

Dark Reading

A recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish it.

Access 73
article thumbnail

The Eternal Sunshine of the Criminal Mind

Thales Cloud Protection & Licensing

The Eternal Sunshine of the Criminal Mind madhav Tue, 07/18/2023 - 04:29 Everyone who works in cybersecurity or IT knows the frustration of dealing with relentlessly creative threat actors. Every day it seems, breaking industry news reveals another story about how a criminal gang or hacker penetrated a website, database, or device by reverse engineering its defences, discovering a weakness, or by using a feature or tool in a way other than for what it was intended.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

AWS Cloud Credential Stealing Campaign Spreads to Azure, Google Cloud

Dark Reading

The TeamTNT threat actor appears to be setting the stage for broader cloud worm attacks, researchers say.

Cloud 89
article thumbnail

Hello. Goodbye… Goodbye. Hello

ARMA International

Why matter mobility management should now be a key competence for law firms Law firms need to get better at matter mobility for two reasons: it’s happening with increased frequency, plus poor matter mobility management can have significant negative impacts on the firm, as Chris Giles explains. Why is there more matter mobility now? Several factors are driving the increase.

article thumbnail

UAE and South African Hospitals Fail on DMARC Implementation

Dark Reading

Only a quarter of hospitals have implemented the strongest level of DMARC, with a third running any version of the email validation protocol.

74
article thumbnail

CILIP Conference 2023 – Humanity, Leadership and AI

CILIP

CILIP Conference 2023 - Key Takeaways Imogen Loucas is presented her CILIP125 Medal for outstanding librarianship by Sue Williamson, CILIP vice-president. An action-packed conference that brought leadership to the "top-of-mind" took place in the 125th year of CILIP's Royal Chartership. CILIP conference 2023 saw a reimagining for CILIP's conference format with a dual speech stream that looked at the current issues gripping the libraries and information sectors through the lens of leadership, and

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Startup Spotlight: Binarly Hardens Firmware Security

Dark Reading

The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses AI/ML to find firmware vulnerabilities.

article thumbnail

California AG Bonta Announces New Enforcement Sweep Aimed at Employers

Hunton Privacy

On July 14, 2023, California Attorney General Rob Bonta (“California AG”) announced a new enforcement sweep aimed at ensuring that companies comply with the California Consumer Privacy Act of 2018 (“CCPA”) with respect to the personal information of employees and job applicants. The exemption for HR-related data under the CCPA expired on January 1, 2023, when the amendments to the CCPA made by the California Privacy Rights Act of 2020 became operative.

Privacy 52
article thumbnail

What C-Suite Leaders Need to Know About XDR

Dark Reading

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here's what you need to know about the technology platform.

article thumbnail

Transforming customer service: How generative AI is changing the game

IBM Big Data Hub

Whether placing an order, requesting a product exchange or asking about a billing concern, today’s customer demands an exceptional experience that includes quick, thorough answers to their inquiries. They also expect service to be delivered 24/7 across multiple channels. While traditional AI approaches provide customers with quick service, they have their limitations.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How AI-Augmented Threat Intelligence Solves Security Shortfalls

Dark Reading

Researchers explore how overburdened cyber analysts can improve their threat intelligence jobs by using ChatGPT-like large language models (LLMs).

article thumbnail

Virtual ICRM Exam Prep Workshop for CRA and CRM on Friday, September 29th

IG Guru

ICRM EXAM PREPARATION WORKSHOP FOR CRA AND CRM Offered by the Zoological Registrars Association Friday, September 29, 2023 8am – 5pm ET/7am – 4 pm CT VIRTUAL HOW TO REGISTER FOR WORKSHOP Registration: Go to: ZooRegistrars.org/conference/register Non-ZRA Member? Click on “Create a site account here.” (You’re creating a ZRA Account to register for Workshop.

article thumbnail

If George Washington Had a TikTok, What Would His Password Be?

Dark Reading

Artificial intelligence can be tricked into making password-based authentication even weaker.

article thumbnail

e-DAT Practice Group Partner to Attend Upcoming ABA Program and Master’s Conference in Europe on E-Discovery and Data Privacy

eDiscovery Law

Daniel Miller, a partner of the K&L Gates e-Discovery Analysis & Technology (“e-DAT”) Group and the firm’s Pittsburgh office, will attend this week’s ABA Cross-Border Institute in Paris. Daniel will also participate on a panel discussion at next week’s Master’s Conference in London.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Insider Risk Management Starts With SaaS Security

Dark Reading

SaaS security posture management helps mitigate common threats posed by malicious or negligent insiders.

Risk 48
article thumbnail

Documenting Support for Human Rights on Both Sides of the California-Mexico Border with Archive-It

Archive-It

by Diane Maher, Head of Archives, Special Collections, and Digital Initiatives at the Copley Library, University of San Diego The creation of our two human rights web archive collections , Human Rights at the California-Mexico Border and the San Diego Refugee Collection began serendipitously in 2018 when our Processing Archivist noticed Archive-It’s “Pitch a Collection” contest.

article thumbnail

Exploring the AI and data capabilities of watsonx

IBM Big Data Hub

Successful implementation of artificial intelligence (AI) is contingent on an AI strategy that takes into account the following considerations: Open: It’s based on the best open technologies available Trusted : It’s responsible and governed Targeted: It’s designed for the enterprise and targeted for business domains Empowering : It’s designed for value creators, not just users Designed with these elements in mind, watsonx is a new AI and data platform that empowers enterp