Mon.Dec 11, 2023

article thumbnail

Ransomware Group Offline: Have Police Seized Alphv/BlackCat?

Data Breach Today

Prolific Ransomware Operation Tied to Big Hits Claims 'Everything Will Work Soon' Cybercrime underground chatter suggests ransomware group BlackCat - aka Alphv - is being disrupted by law enforcement. Experts warn that disruptions too often remain short-lived, as operators reboot under different names and affiliates go independent or work with a bevy of rival services.

article thumbnail

Apache fixed Critical RCE flaw CVE-2023-50164 in Struts 2

Security Affairs

The Apache Software Foundation addressed a critical remote code execution vulnerability in the Apache Struts 2 open-source framework. The Apache Software Foundation released security updates to address a critical file upload vulnerability in the Struts 2 open-source framework. Successful exploitation of the flaw, tracked as CVE-2023-50164 , could lead to remote code execution.

Security 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kentucky Hospital Chain Notifying 2.5 Million of Data Theft

Data Breach Today

Alphv/BlackCat Claimed Responsibility for May Attack A Kentucky-based hospital chain is notifying millions of individuals that their information was potentially exfiltrated in a May attack. Russian-speaking ransomware-as-a-service group Alphv/BlackCat - which is currently reportedly undergoing its own disruptions - took credit for the data theft.

article thumbnail

Toyota Financial Services discloses a data breach

Security Affairs

Toyota Financial Services (TFS) disclosed a data breach, threat actors had access to sensitive personal and financial data. Toyota Financial Services (TFS) is warning customers it has suffered a data breach that exposed sensitive personal and financial data. “Due to an attack on the systems, unauthorized persons gained access to personal data.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Spain Arrests Alleged Kelvin Security Money Laundering Head

Data Breach Today

Venezuelan National Detained on Mediterranean Coast on Sunday Spanish national police on Sunday arrested an alleged key money laundering figure of the profit-seeking Kelvin Security hacking operation. They detained a Venezuelan national who reportedly entered the country as a tourist. Police said the man is the head of the group's money laundering operation.

Security 292

More Trending

article thumbnail

BlackBerry Cancels IPO, Separates Cybersec and IoT Units

Data Breach Today

Subsidiary IPO Canceled in Announcement, Naming John Giamatteo as CEO BlackBerry reversed plans for an equity carve-out of its internet of things business in a Monday announcement of plans to instead make its cybersecurity and IoT units independently operated entities. The Canadian firm also selected company insider John Giamatteo as its new CEO.

IoT 287
article thumbnail

Analytics and AI predictions for 2024: Exploring the future

OpenText Information Management

The world of data analytics and artificial intelligence (AI) continues to evolve at an unprecedented rate. Over the next four years, analytics, AI, and machine learning developments promise to revolutionize how we interact with technology, unlocking a range of new possibilities. Analytics and AI trend #1: The integration of generative AI and business intelligence Traditional … The post Analytics and AI predictions for 2024: Exploring the future appeared first on OpenText Blogs.

Analytics 113
article thumbnail

Open-Source Oversight: Security Gaps in IoT and OT Devices

Data Breach Today

Dashevskyi and La Spina of Forescout Technologies on IoT and OT Security Practices Previous studies on IoT and OT devices have primarily focused on internal components, neglecting open-source components that are crucial for internet and network connectivity, according to Stanislav Dashevskyi and Francesco La Spina, security researchers at Forescout Technologies.

IoT 283
article thumbnail

WSJ: "A Hidden Risk in the Municipal Bond Market: Hackers"

KnowBe4

December 7, 2023 - The Wall Street Journal has an interesting perspective on K-12 Public schools suffering ransomware attacks. The number doubles between 2021 and 2022 to almost 2,000 a year.

Marketing 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Europe Prepares for AI Act Enforcement

Data Breach Today

Ban on Prohibited AI Applications to Be Implemented First The European Union will enforce its imminent regulation on artificial intelligence in phases, and bans on the use of prohibited AI are expected to kick in within six months of the regulation's adoption, a European Commission official said on Monday.

article thumbnail

CISA adds Qlik Sense flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Below is the list of the issues added to the catalog: CVE-2023-41265 (CVSS score 9.6)- Qlik Sense HTTP Tunneling Vulnerability: Qlik Sense contains an HTTP tunneling vulnerability that allows an atta

IT 110
article thumbnail

OnDemand | Securing the Core: Cutting-Edge Techniques for SaaS & Web Application Safety

Data Breach Today

This comprehensive session will provide an in-depth exploration of cutting-edge strategies and technologies essential for securing SaaS and web applications and

Security 283
article thumbnail

Facebook Enables Messenger End-to-End Encryption by Default

Schneier on Security

It’s happened. Details here , and tech details here (for messages in transit) and here (for messages in storage) Rollout to everyone will take months, but it’s a good day for both privacy and security. Slashdot thread.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK Sanctions 9 Asians for Crypto Scams, Human Trafficking

Data Breach Today

Sanctioned Individuals Operated Investment Scams in Myanmar, Cambodia and Laos The U.K. government has sanctioned 14 individuals and groups that illegally employed human trafficking victims in online crypto and investment scams. Sanctioned individuals include a Chinese national previously targeted by the U.S. Treasury for running a gambling and trafficking business in Laos.

article thumbnail

Deepfakes: The New Face of Fraud

KnowBe4

Security analysts at identity vendor Sumsub are seeing a massive rise in the use of deepfake fraud in their Identity Fraud Report 2023. And one country may be to blame.

article thumbnail

Congress Clashes Over the Future of America’s Section 702 Spy Program

WIRED Threat Level

Competing bills moving through the House of Representatives both reauthorize Section 702 surveillance—but they pave very different paths forward for Americans’ privacy and civil liberties.

Privacy 94
article thumbnail

2024 IT Spending Surge: Surprising Insights from Piper Sandler's CIO Survey

KnowBe4

Industry analysts Piper Sandler do a yearly 'Industry Note' where they survey CIOs about their next year budget expectations. For 2024 there is a noticeable improvement regarding enterprise IT spending.

IT 93
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification madhav Tue, 12/12/2023 - 05:21 Given the pace of data growth and the complexity of hybrid IT environments, the discovery and classification of sensitive data is no simple task. In a recent study , IDC predicted the global datasphere will more than double in size from 2022 to 2026, and that 80% of that data will be unstructured.

article thumbnail

European Lawmakers Reach a Political Agreement on the AI Act

Hunton Privacy

On December 8, 2023, the European Parliament and the Council reached a political agreement on the EU’s Regulation laying down harmonized rules on Artificial Intelligence (the “AI Act”). The AI Act will introduce a risk-based legal framework for AI. Specifically, the AI Act will state that: (1) certain AI systems are prohibited as they present unacceptable risks ( e.g. , AI used for social scoring based on social behavior or personal characteristics, untargeted scraping of facial images from the

article thumbnail

Ukraine Is Crowdfunding Its Reconstruction

WIRED Threat Level

With its war against Russia raging on, Ukraine has begun raising funds to rebuild homes and structures one by one using its own crowdfunding platform.

IT 96
article thumbnail

CISA and ENISA signed a Working Arrangement to enhance cooperation

Security Affairs

ENISA has signed a Working Arrangement with the US CISA to enhance capacity-building, best practices exchange and awareness. The European Union Agency for Cybersecurity (ENISA) has signed a Working Arrangement with the Cybersecurity and Infrastructure Security Agency (CISA) to enhance cooperation on capacity-building, best practices exchange, and situational awareness.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Top 5 predictions for manufacturing in 2024

OpenText Information Management

In recent years, the manufacturing sector has experienced notable disruptions – including supply chain instability, product demand fluctuations, transportation issues, and workforce shortages. However, amidst these challenges, a crucial lesson emerged that highlighted how harnessing information effectively can yield a distinct competitive edge and enhance overall profitability.

article thumbnail

Webinar: Virtual Coffee with Consulting: Identifying and Breaking Down Privacy Requirements for Your Program on January 30, 2023 at 11am EST via Zasio

IG Guru

Register here. The post Webinar: Virtual Coffee with Consulting: Identifying and Breaking Down Privacy Requirements for Your Program on January 30, 2023 at 11am EST via Zasio first appeared on IG GURU.

Privacy 81
article thumbnail

Advertising Is Coming To Threads. What Happens Next?

John Battelle's Searchblog

With thanks to Scott Monty I stopped using Twitter over a year ago, as soon as Elon Musk took control of the place. I don’t miss it – it was already a pretty toxic place, and my tenure at The Recount , a political media company, ensured I had to engage with most of Twitter’s worst attributes. But when Meta launched Threads , its Twitter clone, I figured I’d give the new service a try.

article thumbnail

Finding the treasure in governement information management

CILIP

Finding the treasure in Government information managaement David Smith From helping shape government guidance on WhatsApp information management to maintaining collections of sunken treasure maps, -David Smith, Deputy Director, Knowledge and Information Management, at Department for Levelling Up, Housing and Communities, and head of the Government KIM Profession, discusses the challenges facing KIM in the Civil Service.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Burlington Food Pantry Gets Boost from Daymark Employee Donations

Daymark

It’s a priority for Daymark and its employees to give back to the local community. The food pantry in Burlington, Massachusetts, espouses “People Helping People,” and that’s exactly what Daymark employees did last month to assist in making sure the families in Burlington have enough food and essential supplies as winter arrives. The employee-driven Daymark food drive resulted in multiple carloads of food being donated to those with the greatest needs.

IT 40
article thumbnail

The advantages and disadvantages of hybrid cloud

IBM Big Data Hub

With the rapid advancements in cloud computing, data management and artificial intelligence (AI) , hybrid cloud plays an integral role in next-generation IT infrastructure. Enterprise-level businesses rely on hybrid cloud solutions to run critical workloads from anywhere by combining and unifying on-premises, private cloud and public cloud environments.

Cloud 110
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Welcome to this week’s round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight More than 59 million patients’ medical and personal data exposed via DICOM servers Security weaknesses in DICOM (Digital Imaging and Communications in Medicine), the international standard for me