Mon.Jul 10, 2023

article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure. Related: Using ‘Big Data’ to improve health and well-being But there’s yet another towering technology mountain to climb: we must also overcome the limitations of Moore’s Law. After 30 years, we’ve reached the end of Moore’s Law , which states that the number of transistors on a silicon-based semiconductor chip doubles approximately eve

article thumbnail

Ukrainian Agencies, NATO Targeted With RATs Ahead of Summit

Data Breach Today

Attackers Using RomCom, PicassoLoader and njRAT Malware to Steal Credentials The threat actor behind the remote access Trojan called RomCom RAT and other pro-Russian groups are targeting Ukrainian agencies and allies ahead of the NATO Summit this week in Vilnius, Lithuania, using weaponized Microsoft documents and typosquatting techniques to deliver the malware.

Access 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

Aachen, Germany, July 10, 2023 – Utimaco , a leading global provider of IT security solutions that is celebrating its 40th year pioneering trusted cybersecurity and compliance solutions and services to customers across the globe, has released a new whitepaper, ‘ Circles of Trust 2023: Exploring Consumer Trust in the Digital Society ’, that takes a deep look at how consumers view trust in an increasingly digital world.

IoT 160
article thumbnail

TPG to Buy Forcepoint's Government Security Unit for $2.45B

Data Breach Today

Deal Comes 30 Months After PE Arm Francisco Bought All of Forcepoint for Just $1.1B Francisco Partners plans to split Forcepoint's government and commercial security practices, selling the former to TPG for $2.45 billion. The deal represents an impressive return on investment for Francisco Partners, which bought all of Forcepoint from Raytheon in January 2021 for just $1.1 billion.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign

Dark Reading

An attack involves a multi-stage infection chain with custom malware hosted on Amazon EC2 that ultimately steals critical system and browser data; so far, targets have been located in Latin America.

113
113

More Trending

article thumbnail

BREAKING: EU Commission Adopts EU-U.S. Data Privacy Framework Adequacy Decision

Hunton Privacy

On July 10, 2023, the European Commission formally adopted a new adequacy decision on the EU-U.S. Data Privacy Framework (the “Adequacy Decision”). The adoption of this Adequacy Decision follows years of intense negotiations between the EU and the U.S., after the invalidation of the EU-U.S. Privacy Shield by the Court of Justice of the European Union (“CJEU”) in the Schrems II case.

article thumbnail

HCA Says Up to 11M Patients Affected by Email Data Hack

Data Breach Today

Hospital Chain Notifies SEC, Says Incident Not Likely to Affect Financials Information on up to 11 million patients of hospital chain HCA Healthcare is up for sale on a dark web forum. HCA Healthcare on Monday confirmed an incident involving data theft from an external location used to automate the formatting of email messages but said it is still investigating.

Sales 111
article thumbnail

Deepfake Quantum AI Investment Scam Pops Up on Facebook

Dark Reading

A consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims.

109
109
article thumbnail

RomCom RAT attackers target groups supporting NATO membership of Ukraine

Security Affairs

Threat actors are targeting NATO and groups supporting Ukraine in a spear-phishing campaign distributing the RomCom RAT. On July 4, the BlackBerry Threat Research and Intelligence team uncovered a spear phishing campaign aimed at an organization supporting Ukraine abroad. The researchers discovered two lure documents submitted from an IP address in Hungary, both targeting upcoming NATO Summit guests who are providing support to Ukraine.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Job Recruitment Scams Rising Due to Social Engineering

KnowBe4

Job scams are a rising form of socially engineered cybercrime. And while it’s easy to imagine the trouble they cause individuals who innocently fall for them (lost opportunities, identity theft, financial loss, and so on) this form of fraud also affects businesses.

79
article thumbnail

The Quiet Rise of Real-Time Crime Centers

WIRED Threat Level

Cities across the US have established RTCCs that police say protect the rights of innocent people, but critics warn of creeping surveillance.

Privacy 90
article thumbnail

Amazon Prime Day Draws Out Cyber Scammers

Dark Reading

Cybercriminals lining up to score off Amazon Prime Day shoppers, who spent more than $22B in US online sales alone last year, according to estimates.

Sales 90
article thumbnail

Australia’s National Anti-Scam Centre: Prevention Is Better Than the Cure

KnowBe4

Australia officially launched their National Anti-Scam Centre this week. With more than AUD $3.1 billion lost each year , Australians need support.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Zero Trust Keeps Digital Attacks From Entering the Real World

Dark Reading

Amid IT/OT convergence, organizations must adopt an "assume breach" mindset to stop bad actors and limit their impact.

IT 82
article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q2 2023

IT Governance

Welcome to our second quarterly review of cyber attacks and data breaches for 2023. In this article, we take a closer look at the information gathered in our monthly list of security breaches , and delve into the infosec landscape over the past three months. You’ll find an overview of the most common types of cyber attack, plus year-on-year comparisons, details on the most breached sectors and a running total of incidents for the year.

article thumbnail

NIST Launches Generative AI Working Group

Dark Reading

The public working group will develop guidance around the special risks of AI technologies that generate content.

Risk 93
article thumbnail

Experts released PoC exploit for Ubiquiti EdgeRouter flaw

Security Affairs

A Proof-of-Concept (PoC) exploit for the CVE-2023-31998 vulnerability in the Ubiquiti EdgeRouter has been publicly released. The CVE-2023-31998 flaw (CVSS v3 5.9) is a heap overflow issue impacting Ubiquiti EdgeRouters and Aircubes, an attacker can exploit it to potentially execute arbitrary code and interrupt UPnP service to a vulnerable device. The flaw resides in the miniupnpd service and can be exploited by a LAN attacker.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Analysts: Cybersecurity Funding Set for Rebound

Dark Reading

Analysts seem bullish about funding and M&A activity for the second half of the year, though transaction volumes and values dipped again in Q2.

article thumbnail

A flaw in Revolut US payments resulted in the theft of $20 Million

Security Affairs

A zero-day vulnerability in the Revolut payment systems allowed threat actors to steal more than $20 million in early 2022. In early 2022, threat actors exploited a zero-day flaw in Revolut payment systems to steal more than $20 million, reported the Financial Times quoting multiple unnamed sources. The issue resulted from differences between American and European payment systems.

Access 92
article thumbnail

Honeywell to Acquire SCADAfence, Strengthening its Cybersecurity Software Portfolio

Dark Reading

SCADAfence will integrate into the Honeywell Forge Cybersecurity+ suite providing expanded asset discovery, threat detection, and compliance management capabilities.

article thumbnail

Cybercriminals Evolve Antidetect Tooling for Mobile OS-Based Fraud

Security Affairs

Resecurity identified the emergence of adversarial mobile Android-based Antidetect Tooling for Mobile OS-Based Fraud. Resecurity has identified the emergence of adversarial mobile Android-based tools (called “mobile anti-detects”), like Enclave and McFly, as a new frontier in fraud tradecraft evolution. These tools are used by criminals involved in online-banking theft to impersonate compromised account holders and bypass anti-fraud controls by leveraging mobile client.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Phishing Benchmarks Unlocked: Is Your Organization Ahead of the Curve in 2023

KnowBe4

Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.

article thumbnail

10 Features an API Security Service Needs to Offer

Dark Reading

Securing APIs is specialized work. Here's what organizations should look for when selecting an outside partner.

article thumbnail

What will a turning point in academic publishing look like?

CILIP

What will a turning point in academic publishing look like? WHEN 43 editors resigned from two Elsevier journals in April they not only transferred smoothly to a new title at a new publisher, they also successfully highlighted growing concerns about the profits of the largest commercial publishers from open access publishing. The recently-resigned Editor in Chief of NeuroImage , Stephen Smith, is now EiC of recently-launched ‘ Imaging Neuroscience at MIT Press.

article thumbnail

Industry analyst round up – July 2023 edition

OpenText Information Management

At OpenText, our technology investments and customer-centric approach are, we believe, what makes our solutions so valuable. As leading innovators of modern information management, it’s always encouraging and exciting to be acknowledged by our customers and market experts. This includes the industry analyst community. So, we are casting a regular eye on the reports issued … The post Industry analyst round up – July 2023 edition appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What is vibration analysis and how can it help optimize predictive maintenance?

IBM Big Data Hub

Vibration analysis (or vibration monitoring) is a powerful diagnostic tool for identifying, monitoring and preventing mechanical failures in rotating and reciprocating machinery. It’s an essential component of predictive maintenance programs, allowing technicians to detect developing problems in equipment before they lead to costly unplanned downtime or catastrophic failures.

article thumbnail

OCR June 2023 OCR Cybersecurity Newsletter

IG Guru

U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights __ June 30, 2023 June 2023 OCR Cybersecurity Newsletter HIPAA and Cybersecurity Authentication Strong authentication processes are often analogized to a locked door in the cyber world. Weak or non-existent authentication processes leave your digital door open to intrusion by malicious actors and increase the […] The post OCR June 2023 OCR Cybersecurity Newsletter first appeared on IG GURU.

article thumbnail

How to improve employee experience (and your bottom line)

IBM Big Data Hub

In a nutshell, employee experience refers to the totality of interactions employees have with their organization. It starts the moment a potential hire spots a company’s listing for an open position and ends with an employee’s retirement or departure. It includes every aspect of an employee’s professional life—from workplace culture, company mission, title, daily responsibilities and co-workers to workspaces, systems, company policies and interactions with human resources