Fri.Jan 26, 2024

article thumbnail

Microsoft Says Test Account Gave Hackers Keys to the Kingdom

Data Breach Today

Postmortem: Multiple Customers Also Targeted by Russian Nation-State Attackers A nation-state hacking group run by Russian intelligence gained access to a Microsoft "legacy, non-production test tenant account" and used it to authorize malicious Office 365 OAuth applications, access Outlook, and steal Microsoft and customers' emails and attachments, Microsoft said.

Access 337
article thumbnail

Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks

WIRED Threat Level

A California teenager who allegedly used the handle Torswats to carry out a nationwide swatting campaign is being extradited to Florida to face felony charges, WIRED has learned.

Security 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Aiming to Improve SBOM Implementation With New Guidance

Data Breach Today

US Cyber Agency Issues Step-by-Step Guide to Build Software Bills of Materials The U.S. Cybersecurity and Infrastructure Security Agency is aiming to improve the implementation of software bills of materials across the public and private sectors as experts warn that a failure to build and use the critical inventory lists could result in "catastrophic security breaches.

article thumbnail

Watch out, experts warn of a critical flaw in Jenkins

Security Affairs

Jenkins maintainers addressed several security vulnerabilities, including a critical remote code execution (RCE) flaw. Jenkins is the most popular open source automation server, it is maintained by CloudBees and the Jenkins community. The automation server supports developers build, test and deploy their applications, it has hundreds of thousands of active installations worldwide with more than 1 million users.

Libraries 131
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Civil Society Sounds Alarms on UN Cybercrime Treaty

Data Breach Today

Final Round of Negotiations Set to Begin on Monday A draft international cybercrime treaty set to enter a final round of negotiations at the United Nations Monday drew condemnation from civil society groups that said it will criminalize security research and promote indiscriminate police surveillance.

Security 265

More Trending

article thumbnail

Therapy Provider Notifying 4 Million Patients of PJ&A Hack

Data Breach Today

Concentra Health Services Joins List of Those Affected in Transcriber's Data Breach A Texas-based physical and occupational therapy provider is notifying nearly 4 million patients that they have joined the soaring tally of victims of a data theft incident at a Nevada medical transcription vendor last year. The supply chain hack appears to have affected at least 14 million people.

article thumbnail

The Pentagon Tried to Hide That It Bought Americans' Data Without a Warrant

WIRED Threat Level

US spy agencies purchased Americans' phone location data and internet metadata without a warrant but only admitted it after a US senator blocked the appointment of a new NSA director.

Metadata 108
article thumbnail

ISMG Editors: Emerging AI Tech for Cloud Security in 2024

Data Breach Today

Payments Expert Troy Leach Joins the Panel to Cover AI, Zero Trust and IoT Security In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joins three editors at ISMG to discuss important cybersecurity issues, including how generative AI is enhancing multi-cloud security, AI's influence on authentication processes, and the state of zero trust and IoT security.

Cloud 260
article thumbnail

A TrickBot malware developer sentenced to 64 months in prison

Security Affairs

The Russian national malware developer Vladimir Dunaev was sentenced to more than 5 years in prison for his role in the TrickBot operation. The Russian national Vladimir Dunaev (40) has been sentenced in the US to 64 months in prison for his role in the development and distribution of the TrickBot malware. Vladimir Dunaev was extradited to the U.S. in October 2021.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Networks unchained: the shift toward intent-based autonomous operations

IBM Big Data Hub

Telecommunications industry, a cornerstone of global connectivity, has been going through a technological renaissance for some time, driven by innovations such as 5G, IoT, cloud computing and AI. As a result, networks have become increasingly hard to manage. There is a need for automation to handle routine tasks, monitor network health and respond to issues in real-time.

IoT 103
article thumbnail

Chatbots and Human Conversation

Schneier on Security

For most of history, communicating with a computer has not been like communicating with a person. In their earliest years, computers required carefully constructed instructions, delivered through punch cards; then came a command-line interface, followed by menus and options and text boxes. If you wanted results, you needed to learn the computer’s language.

article thumbnail

Houston, We Have a 2024 China Problem

KnowBe4

Russia is not the only global problem that democracy has to deal with. The Chinese regime ran large influence campaigns, attempting mass social engineering in the U.S. 2022 midterm elections, according to a declassified intelligence report and multiple private-sector investigations. We can expect the same in 2024.

94
article thumbnail

Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her Eggs

Schneier on Security

Amazing footage of a black-eyed squid ( Gonatus onyx ) carrying thousands of eggs. They tend to hang out about 6,200 feet below sea level. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Your KnowBe4 Fresh Content Updates from January 2024

KnowBe4

Check out the 37 new pieces of training content added in January, alongside the always fresh content update highlights, events and new features.

article thumbnail

Collibra is proud to be part of the Snowflake Horizon Partner Ecosystem

Collibra

Snowflake recently announced the launch of Snowflake Horizon, their built-in governance solution that unifies compliance, security, privacy, interoperability and access capabilities in the Snowflake Data Cloud. Collibra is proud to be included in the Snowflake Horizon Partner Ecosystem to help organizations with hybrid and multi-cloud environments simplify and scale their data governance strategy across their disparate data sources.

article thumbnail

From ancient sands to AI innovations: OpenText at the Formula E Diriyah E-Prix

OpenText Information Management

Rounds 2 and 3 of the 2024 ABB FIA Formula E Championship are taking place around the historic town walls of Diriyah, Saudia Arabia—a UNESCO World Heritage site—at night under the lights on January 26 and 27. During these night races, the track is lit with the latest low-consumption LED technology lights. And the energy … The post From ancient sands to AI innovations: OpenText at the Formula E Diriyah E-Prix appeared first on OpenText Blogs.

article thumbnail

IBM and business partner bring intelligent equipment maintenance to automotive company with IBM Maximo

IBM Big Data Hub

IBM® recently announced that it has worked with its business partner, Beijing Shuto Technology Co., Ltd. (hereafter as Shuto Technology) to help a joint venture Original Equipment Manufacturer (OEM) in China to obtain information in an accurate and cost-effective way for on-site technicians. This makes the client’s equipment repair work more efficient and improves the reliability of its equipment.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Generative AI Interest Skyrockets Over 3,500%, Signaling New Era of Technology

Information Matters

Interest in generative artificial intelligence (AI) tools like GPT has increased a staggering 3,600% over the past year, according to the 2024 Technology Trends report released today by O’Reilly Media. Read more The post Generative AI Interest Skyrockets Over 3,500%, Signaling New Era of Technology appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

What is vegetation management? 

IBM Big Data Hub

When North America suffered its largest blackout , it cost upwards of USD 6 billion and left 50 million people without power for up to two days. What caused the blackout? Overgrown trees that came into contact with a power line. Beyond causing blackouts, overgrown vegetation can also cause soil erosion and water quality problems, disrupting both our economy and the environment.

article thumbnail

International Data Privacy Day: Unpacking recent significant ECJ decisions

Data Protection Report

A flurry of significant European Court of Justice judgments relating to data protection were published in the final few months of 2023.

article thumbnail

Decoding the future: unravelling the intricacies of Hybrid Cloud Mesh versus service mesh 

IBM Big Data Hub

Hybrid Cloud Mesh, which is generally available now, is revolutionizing application connectivity across hybrid multicloud environments. Let’s draw a comparison between Hybrid Cloud Mesh and a typical service mesh to better understand the nuances of these essential components in the realm of modern enterprise connectivity. This comparison deserves merit because both the solutions are focused on application-centric connectivity albeit in a different manner.

Cloud 65
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

10 Biometric Trends to Watch in 2024

HID Global

Explore the top 10 biometric trends to watch out for in 2024 as this technology continues to advance and reliable identity assurance remains a top priority.

52
article thumbnail

Webinar (Virtual): IG and Artifical Intelligence on February 15, 2024 at 12pm Eastern via ARMA Michigan

IG Guru

Check out the link here to register. The post Webinar (Virtual): IG and Artifical Intelligence on February 15, 2024 at 12pm Eastern via ARMA Michigan first appeared on IG GURU.

article thumbnail

The EU AI Act: What obligations will apply to your business?

Data Protection Report

Political agreement was achieved at the beginning of December in relation to the EU’s AI Act (AIA) – the first major step in the regulation of artificial intelligence. Although the final texts are not yet available, the key elements are clear, with the “risk-based” approach at the heart of the AIA. Working from the last available texts, we will provide insights into which activities will likely be caught as prohibited, high-risk and transparent – the essential first step for understanding the le

article thumbnail

Data Privacy Week Resources via FPC.gov

IG Guru

Check out the link here. The post Data Privacy Week Resources via FPC.gov first appeared on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Who is Alleged Medibank Hacker Aleksandr Ermakov?

Krebs on Security

Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33-year-old Aleksandr Ermakov allegedly stole and leaked the Medibank data while working with one of Russia’s most destructive ransomware groups, but little more is shared about the accused.

article thumbnail

The different types of renewable energy 

IBM Big Data Hub

Renewable energy , also known as clean energy, is produced from natural resources that are generated and replenished faster than they are consumed—such as the sun, water and wind. Most renewable energy sources produce zero carbon emissions and minimal air pollutants. Fossil fuels (oil, coal and natural gas) on the other hand, are finite resources and release harmful greenhouse gas emissions (GHGs), including carbon dioxide (CO2) and methane, when burned.

article thumbnail

Russian Midnight Blizzard APT is targeting orgs worldwide, Microsoft warns

Security Affairs

Microsoft revealed that Russia-linked APT Midnight Blizzard has been targeting organizations worldwide in a cyberespionage campaign. Microsoft announced that the Russia-linked APT Midnight Blizzard that hit the company in late November 2023 has been targeting organizations worldwide as part of a large-scale cyberespionage campaign. The IT giant also confirmed that is currently notifying impacted organizations.

Cloud 98