Tue.Jul 25, 2023

article thumbnail

Thales to Buy Imperva From PE Firm Thoma Bravo for $3.6B

Data Breach Today

Thales-Imperva Deal Will Create a $2.66B Cyber Behemoth With Strength in Apps, Data Thales has agreed to purchase Imperva for $3.6 billion to enter the application and API security market and expand its footprint in data security. The deal will add a robust web application firewall along with capabilities in API protection and data discovery and classification to Thales' portfolio.

Marketing 245
article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service called SocksEscort , which rents hacked residential and small business devices to cybercriminals looking to hide their true location online.

Analytics 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Breach Cost Control: Practice and Preparedness Pay Off

Data Breach Today

Healthcare Sector Spends Most on Cleanup, IBM's Annual Breach Study Finds A new IBM study of data breaches found that if an organization's internal team first detects a breach and the organization has well-practiced incident response plans, that organization will be able to more quickly detect and respond, which will lead to lower breach cleanup costs.

article thumbnail

VMware addressed an information disclosure flaw in VMware Tanzu Application Service for VMs and Isolation Segment

Security Affairs

VMware fixed an information disclosure flaw in VMware Tanzu Application Service for VMs and Isolation Segment that exposed CF API admin credentials in audit logs. VMware has addressed an information disclosure vulnerability, tracked as CVE-2023-20891 (CVSSv3 score 6.5), in VMware Tanzu Application Service for VMs (TAS for VMs) and Isolation Segment that exposed logged credentials via system audit logs.

Access 97
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Importance of IP Protection: Q&A with HID’s General Counsel

HID Global

At HID, we take pride in the intellectual and innovative contributions resulting from the hard work of our employees, whether it be through our R&D teams or other employees throughout the organization.

IT 96

More Trending

article thumbnail

Phony Browser Updates Deliver NetSupport Trojan Using Social Engineering Tactics

KnowBe4

A new social engineering campaign tracked as “FakeSG” is distributing the NetSupport remote access Trojan (RAT) via phony browser updates, according to researchers at Malwarebytes. The campaign is similar but distinct from the widespread “SocGholish” campaign, which also uses fake browser updates to deliver NetSupport.

Access 88
article thumbnail

Patch Now: Up to 900K MikroTik Routers Vulnerable to Total Takeover

Dark Reading

Researchers have delivered working exploits for RouterOS, which when combined with default admin passwords can be a recipe for cyber disaster.

article thumbnail

The Secret's Out: Researchers Reveal Backdoor in Emergency Radio Encryption

KnowBe4

For over 25 years, a technology utilized for vital data and voice radio communications globally has remained under wraps, preventing in-depth testing for potential vulnerabilities. However, a small group of researchers in the Netherlands has now shed light on it, uncovering significant flaws, including a deliberate backdoor.

article thumbnail

Actively Exploited Apple Zero-Day Affects iPhone Kernel

Dark Reading

Apple has issued an emergency fix for the latest exploited zero-day bug found affecting its software in 2023 — a list that also includes the Operation Triangulation spyware flaws.

IT 83
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New York Using AI to Detect Subway Fare Evasion

Schneier on Security

The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an “AI system” to detect people who don’t pay the subway fare. Joana Flores, an MTA spokesperson, said the AI system doesn’t flag fare evaders to New York police, but she declined to comment on whether that policy could change.

article thumbnail

'FraudGPT' Malicious Chatbot Now for Sale on Dark Web

Dark Reading

The subscription-based, generative AI-driven offering joins a growing trend toward "generative AI jailbreaking" to create ChatGPT copycat tools for cyberattacks.

Sales 80
article thumbnail

ChatGPT Has a Plugin Problem

WIRED Threat Level

Third-party plugins boost ChatGPT’s capabilities. But security researchers say they add an extra layer of risk.

Risk 82
article thumbnail

10 Free Purple Team Security Tools to Check Out

Dark Reading

Check out the curated list of cool tools and platforms for both offensive security experts and defenders which will be released or demoed at Black Hat USA 2023.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cybersecurity labeling for smart devices aims to help people choose those less vulnerable to hacking via Click2Houston

IG Guru

Check out the article here. The post Cybersecurity labeling for smart devices aims to help people choose those less vulnerable to hacking via Click2Houston first appeared on IG GURU.

article thumbnail

Beyond ChatGPT: Organizations Must Protect Themselves Against the Power of AI

Dark Reading

Artificial intelligence-powered threats are already affecting businesses, schools, hospitals, and individuals, and it will only get worse as AI advances.

article thumbnail

IBM named a leader in ESG reporting and data management software by independent research firm

IBM Big Data Hub

Independent research firm Verdantix recently identified IBM as a leader in their report, “ Green Quadrant: ESG Reporting and Data Management Software ” (July 17, 2023), which evaluated and provided a detailed assessment of solution providers and their product offerings. The rigorous analysis conducted by Verdantix included a comprehensive 115-point questionnaire, two-hour live demonstrations by suppliers and interviews with existing ESG software customers.

article thumbnail

Decoy Dog Gets an Upgrade With New Persistence Features

Dark Reading

At least three actors are using the new, improved version, prompting researchers to conclude it was likely developed by a nation-state.

IT 76
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Optimizing energy production with the latest smart grid technologies

IBM Big Data Hub

New technologies are shaping the way we produce, distribute and consume energy. Smart grid technology—an integral part of energy’s digital transformation—promises to modernize the traditional electrical system with an infusion of digital intelligence that helps energy providers transition to clean energy and reduce carbon emissions.

article thumbnail

50% of Zero Trust Programs Risk Failure According to PlainID Survey

Dark Reading

CISOs consider zero trust a hot security ticket, but organizations run the risk of leaving gaps in their security infrastructure.

Risk 70
article thumbnail

First Report from the California Children’s Data Protection Working Group Delayed

Hunton Privacy

On July 10, 2023, California Governor Newsom signed into law A.B. 127 , which places the working group for the California Age-Appropriate Design Code Act (the “Act”) under the California Office of the Attorney General. The Act creates a working group, formally named the California Children’s Data Protection Working Group, to produce a report on recommendations for best practices concerning children’s access to online services.

Access 52
article thumbnail

ChatGPT, Other Generative AI Apps Prone to Compromise, Manipulation

Dark Reading

Researchers find artificial intelligence applications that use large language models could be compromised by attackers using natural language to dupe users.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What’s New in OpenText Vertica 23.3

OpenText Information Management

This release contains several months’ work and a lot of changes. The first change you’ll notice is the versioning system. The last Vertica release was 12.0.4, so you might have expected this to be version 13. However, OpenText releases are timed to one per quarter every year, and they’re numbered according to the year and … The post What’s New in OpenText Vertica 23.3 appeared first on OpenText Blogs.

article thumbnail

Cybercrime as a Public Health Crisis

Dark Reading

The impact of fraud on a victim's health and well-being can be more painful than the financial loss.

76
article thumbnail

China finalises its Generative AI Regulation

Data Protection Report

The Provisional Administrative Measures of Generative Artificial Intelligence Services ( Generative AI Measures ), were published by the Cyberspace Administration of China ( CAC ), together with six other authorities, on 13 July 2023 and will take effect from 15 August 2023. The Generative AI Measures, along with the likely enactment of the Artificial Intelligence Law in the 2023 legislative year, will have a significant impact on the development, provision and use of AI services in China.

article thumbnail

7 steps to data intelligence

Collibra

At Collibra, our mission is to change how organizations use data, so our customers can change the world. We help organizations do more with trusted data — and we know from experience that a data catalog is a huge step on the road to data intelligence. That’s why we are still so excited about Data Catalogs For Dummies, Collibra Special Edition. Embarking on your journey to data intelligence?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Will you need to be a librarian to find the new Twitter in Google?

CILIP

Will you need to be a librarian to find the new Twitter in google? Dr Beth Montague-Hellen, CILIP LGBTQ+ Network founder and chair, writes how Elon Musk should have thought about searchability when choosing a new brand for Twitter Twitter’s billionaire CEO owner doesn’t take many things so seriously, so its no surprise he didn’t take searchability into account when he decided to rebrand the social media platform as the letter ‘X’.

article thumbnail

Achieve Digital Success with OpenText Cloud Editions (CE) 23.3

OpenText Information Management

The importance of information for businesses cannot be overstated. Information serves as the lifeblood that fuels decision-making, innovation, and overall success. But as it becomes more complex, organizations must find new innovative ways to intelligently scale operations as we move into a new, AI-led era in which the need to become faster, leaner, and stronger … The post Achieve Digital Success with OpenText Cloud Editions (CE) 23.3 appeared first on OpenText Blogs.

Cloud 52
article thumbnail

Celebrating the CILIP 125

CILIP

Connecting town and gown through the library CILIP came together for its annual conference and this year’s event marked a special celebration – not just the 125th anniversary of CILIP’s Royal Charter, but also the announcement of the CILP 125 List. Rob Green looks at how the CILIP 125 List is signalling a bright future for the profession. CILIP was awarded its Royal Charter in by Queen Victoria in 1898.