Tue.Jan 16, 2024

article thumbnail

White House Says Agencies On Track to Meet January AI Goals

Data Breach Today

Official Says Administration Taking ‘Aggressive Set of Actions’ to Meet Deadlines Federal agencies are making significant headway in achieving a series of critical cybersecurity milestones included in a sweeping executive order on artificial intelligence the president signed in October 2023, according to White House Special Advisor on AI Ben Buchanan.

article thumbnail

Google fixed the first actively exploited Chrome zero-day of 2024

Security Affairs

Google has addressed the first Chrome zero-day vulnerability of the year that is actively being exploited in the wild. Google has released security updates to address the first Chrome zero-day vulnerability of the year that is actively being exploited in the wild. The high-serverity vulnerability, tracked as CVE-2024-0519 , is an out of bounds memory access in the Chrome JavaScript engine.

Security 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NC Health System Agrees to Pay $6.6M in Web Tracking Case

Data Breach Today

Novant Health Is Among Latest Organizations Opting to Settle Patient Privacy Claims A North Carolina healthcare system has agreed to pay $6.6 million to settle a consolidated class action lawsuit involving its use of tracking tools in its websites and patient portals. The suit alleges the website trackers sent sensitive patient information to third parties without their consent.

Privacy 298
article thumbnail

VMware fixed a critical flaw in Aria Automation. Patch it now!

Security Affairs

VMware warns customers of a critical vulnerability impacting its Aria Automation multi-cloud infrastructure automation platform. VMware Aria Automation (formerly vRealize Automation ) is a modern cloud automation platform that simplifies and streamlines the deployment, management, and governance of cloud infrastructure and applications. It provides a unified platform for automating tasks across multiple cloud environments, including VMware Cloud on AWS, VMware Cloud on Azure, and VMware Cloud Fo

IT 121
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Crypto-Seeking Drainer Scam-as-a-Service Operations Thrive

Data Breach Today

$295 Million in Digital Assets Lost Last Year to Wallet Drainers, Researchers Warn Cryptocurrency phishing scams designed to send crypto owners to fake versions of legitimate sites, recently disseminated via hijacked high-profile social media accounts, highlight the ongoing use of drainer scam-as-a-service offerings, which researchers say last year led to $295 million in losses.

Phishing 296

More Trending

article thumbnail

UK Privacy Watchdog Probes GenAI Privacy Concerns

Data Breach Today

ICO Call for Evidence to Focus on Legal Basis for Scrapped Training Data The British data regulator is set to analyze the privacy implications of processing scrapped data used for training generative artificial intelligence algorithms. The Information Commissioners' Office is soliciting comments from AI developers, legal experts, and other industry stakeholders.

Privacy 293
article thumbnail

Beyond data silos: Bridging the context gap with process-aware cataloging

Collibra

People. Process. Tooling. This is the trifecta; the ‘secret sauce’ that critically defines and underpins any successful digital transformation project, at any scale. This isn’t to say you must have all three in equal parts to be successful. Rather you have to have an understanding of how all three fit into the new world that you’re building for your organization to thrive, grow and adapt.

Metadata 105
article thumbnail

Money Launderers, Fraudsters Flocking to Tether: UN Report

Data Breach Today

Cryptocurrency Has 'Supercharged' Organized Crime in Southeast Asia Digital money is energizing Southeast Asian organized crime as a method for money laundering and as a way of reaping new revenue, warn experts who say the Tether plays a heavy role in the rapidly evolving state of law-breaking in Myanmar, Thailand and elsewhere.

284
284
article thumbnail

Join us at the forefront of AI for business: Think 2024

IBM Big Data Hub

You want to use AI to accelerate productivity and innovation for your business. You need to move beyond experimentation to scale. You have to move fast. Join us in Boston for Think 2024, a unique and engaging experience that will guide you on your AI for business journey, no matter where you are on the road. From building AI readiness with a thoughtful hybrid cloud approach, to scaling AI across core business functions and industry needs, to embedding AI into the heart of your enterprise strateg

Cloud 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mimecast Appoints Marc van Zadelhoff as New CEO

Data Breach Today

Leadership Transition Comes After 21 Years Under Peter Bauer as CEO Mimecast, the cloud security firm specializing in email and cyber resilience, appointed a new CEO after co-founder Peter Bauer served in the chief executive role since its inception in 2003. The leadership transition comes less than two years after the company went private.

Cloud 265
article thumbnail

A Flaw in Millions of Apple, AMD, and Qualcomm GPUs Could Expose AI Data

WIRED Threat Level

Patching every device affected by the LeftoverLocals vulnerability—which includes some iPhones, iPads, and Macs—may prove difficult.

Security 119
article thumbnail

Beyond Hacktivism: Akamai CTO on Shifting Threat Landscape

Data Breach Today

Robert Blumofe on DDoS Attacks, API Security, Zero Trust and FIDO2-MFA Robert Blumofe, executive vice president and CTO at Akamai, expects social engineering, phishing, extortion and AI-driven attacks to dominate the threat landscape. He advised enterprises to use FIDO2-based MFA, zero trust, microsegmentation and API security to reduce risks.

Phishing 176
article thumbnail

LinkedIn is Being Used for *Dating* – It’s a Recipe for Disaster

KnowBe4

A new article explains how business professionals are beginning to be not-so-professional and seeking to make personal connections. It’s only a matter of time before cybercriminals jump in.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

VulnRecap 1/16/24 – Major Firewall Issues Persist

eSecurity Planet

The past week and the long weekend have had plenty of vulnerabilities to keep your IT and security teams busy. Both SonicWall and Juniper Networks have seen vulnerabilities that allow remote code execution and denial-of service attacks. Keep an eye out for security announcements from your firewall vendors; it’s possible additional similar vulnerabilities will come to light.

IoT 91
article thumbnail

Malicious APKs Drain Bank Accounts

KnowBe4

A phishing campaign is targeting Chinese users in an attempt to distribute malicious apps, according to researchers at Palo Alto Networks’s Unit 42.

article thumbnail

Experts warn of mass exploitation of Ivanti Connect Secure VPN flaws

Security Affairs

Experts warn that recently disclosed Ivanti Connect Secure VPN and Policy Secure vulnerabilities are massively exploited in the wild. Last week, software firm Ivanti reported that threat actors are exploiting two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Connect Secure (ICS) and Policy Secure to remotely execute arbitrary commands on targeted gateways.

article thumbnail

DORA: 1 year to go! Key recommendations for Financial Services to improve cybersecurity and resilience in multi-clouds

Thales Cloud Protection & Licensing

DORA: 1 year to go! Key recommendations for Financial Services to improve cybersecurity and resilience in multi-clouds madhav Wed, 01/17/2024 - 05:46 The Digital Operational Resilience Act (DORA) will apply to the EU financial sector from 17 January 2025. This new regulation ( EU 2022/2554 ) requires financial entities, and their critical Information and Communication Technology (ICT) suppliers, to implement contractual, organisational and technical measures to improve the level of digital opera

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CILIP welcomes publication of Sanderson Review of Public Libraries

CILIP

CILIP welcomes publication of Sanderson Review of Public Libraries CILIP has welcomed the publication of the findings of Baroness Sanderson of Welton’s Independent Review of Public Libraries, announced today at an event at the House of Lords attended by our CEO, Nick Poole. The Independent Review was commissioned at the request of Lord Parkinson of Whitley Bay as part of his remit as Minister for Culture, Communications and Creative Industries within the Department for Culture, Media and Sport (

article thumbnail

The Sad Truth of the FTC's Location Data Privacy Settlement

WIRED Threat Level

The FTC forced a data broker to stop selling “sensitive location data.” But most companies can avoid such scrutiny by doing the bare minimum, exposing the lack of protections Americans truly have.

article thumbnail

Cryptocurrency Drainer Distributed Through Phishing

KnowBe4

Mandiant has published a report on “CLINKSINK,” a cryptocurrency Drainer-as-a-Service (DaaS) that’s targeting users of the Solana currency.

article thumbnail

How to build a successful product development strategy

IBM Big Data Hub

To remain competitive in today’s relentlessly paced and ever-expanding marketplace, companies must think carefully about what products they’re developing and how they’re developing them, continuously iterating their processes to maintain a competitive edge. A finely tuned product development strategy is a holistic, cross-collaborative endeavor with the capacity to help any organization weather unforeseen events or market changes.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Story of the Mirai Botnet

Schneier on Security

Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet.

article thumbnail

Reaching new markets in Europe and beyond

OpenText Information Management

How information management specialists at One Fox slashed time to market for innovative products with OpenText Cloud Platform Services At One Fox, we’ve driven some remarkable transformations for our clients. By applying our expertise in business process management, collaboration, and information management (IM), we empower organizations to streamline and automate their workflows—so they can focus … The post Reaching new markets in Europe and beyond appeared first on OpenText Blogs.

article thumbnail

Thailand – The Regulation with respect to Cross-border Transfer of Personal Data

Data Protection Report

On 25 December 2023, the Personal Data Protection Committee ( PDPC ) published two notifications detailing regulations for cross-border transfers of personal data under Sections 28 and 29 ( Notifications ) of the Personal Data Protection Act B.E. 2562 (2019) ( PDPA ). These Notifications are the Adequacy Country Notification and the Appropriate Safeguard Notificationrespectively.

article thumbnail

Innovation with a Canadian accent

OpenText Information Management

As the new year begins, it’s a great time to look ahead. If your 2024 plans include finding new ways to drive your organization forward, we hope you’ll look no further than your friendly neighborhood software giant to deliver Canadian-born innovation and a partnership that goes the distance. But before looking forward, let’s take a … The post Innovation with a Canadian accent appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Hanzo at Legalweek 2024: Connect, Explore, and Innovate with Us!

Hanzo Learning Center

We are thrilled to announce Hanzo's dynamic presence at this year's Legalweek from January 30th to February 1st, 2024. As a pivotal event in the legal sector, Legalweek brings together the brightest minds and the latest innovations, and we can't wait to engage with the legal community throughout this exciting week.

57
article thumbnail

CyberheistNews Vol 14 #03 Red Flags for Phishing: Verizon Outlines Latest Scams to Watch Out For

KnowBe4

Red Flags for Phishing: Verizon Outlines Latest Scams to Watch Out For

article thumbnail

Secure Printing Starts With Strong User Authentication

HID Global

Adopt secure print management practices to protect your data & reduce waste. Utilize RFID readers or biometrics for user authentication on every print job.