Wed.Jan 17, 2024

article thumbnail

NetScaler, Atlassian, VMWare Disclose Critical Flaws

Data Breach Today

Citrix NetScaler ADC and Gateway Bugs Exploited in the Wild IT infrastructure mainstays including Netscaler, Atlassain and VMWare on Tuesday released fixes for vulnerabilities including some allowing malicious takeover of appliances. NetScaler warned customers Tuesday of two zero day vulnerabilities that researchers say are being exploited in the wild.

IT 304
article thumbnail

News alert: Incogni study reveals overwhelming majority of spam calls originate locally

The Last Watchdog

Los Angeles, Calif., Jan. 17, 2024 – Spam calls continue to be a major nuisance in the US, and advice on how to avoid them abound. Incogni’s latest research challenges prevalent assumptions about spam calls, revealing that traditional advice on avoiding specific area codes is largely ineffective. The study, based on the latest data from the Federal Trade Commission (FTC), demonstrates that, contrary to popular belief, a staggering 59.81% of all unwanted calls originate from local num

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenAI Combats Election Misinformation Amid Growing Concerns

Data Breach Today

ChatGPT Maker Wants to Deter Use of AI in Online Election Misinformation Campaigns OpenAI announced a series of steps it was taking to prevent the use of its models in online influence operations throughout the 2024 election season, amid growing concerns that the election could face significant security concerns from the use of AI in online influence operations.

Security 300
article thumbnail

How a 27-Year-Old Codebreaker Busted the Myth of Bitcoin’s Anonymity

WIRED Threat Level

Once, drug dealers and money launderers saw cryptocurrency as perfectly untraceable. Then a grad student named Sarah Meiklejohn proved them all wrong—and set the stage for a decade-long crackdown.

Privacy 142
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Chrome Patches First Zero-Day of 2024 Exploited in the Wild

Data Breach Today

Google Fixes Out-of-Bounds Memory Access Flaw, Microsoft Edge Browser Also Affected Google released an urgent fix for the first zero-day vulnerability of the year in its Chrome web browser, warning the bug is under active exploitation. Google blamed an out-of-bounds memory access flaw in its V8 JavaScript rendering engine. It also affects Microsoft Edge browser.

Access 292

More Trending

article thumbnail

How a Novel Legal Maneuver Got a Hospital's Stolen Data Back

Data Breach Today

The ubiquity and anonymity of cryptocurrencies are fueling economic, legal and ethical challenges that put healthcare entities in the crosshairs of cybercriminals, said David Hoffman, general counsel of Claxton-Hepburn Medical Center, which recently filed a lawsuit against ransomware gang LockBit.

article thumbnail

Code Written with AI Assistants Is Less Secure

Schneier on Security

Interesting research: “ Do Users Write More Insecure Code with AI Assistants? “: Abstract: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. Overall, we find that participants who had access to an AI assistant based on OpenAI’s codex-davinci-002 model wrote significantly less secure code than those without access.

Security 115
article thumbnail

Chinese Drones Pose Threat to US Infrastructure, CISA Warns

Data Breach Today

CISA, FBI Urge Critical Infrastructure Owners to Bolster UAS Security Measures The U.S. Cybersecurity and Infrastructure Security Agency is warning critical infrastructure owners and operators about the dangers associated with the increasing reliance on Chinese unmanned aircraft systems, warning their use in CI sectors "risks exposing sensitive information to PRC authorities.

article thumbnail

Citrix warns admins to immediately patch NetScaler for actively exploited zero-days

Security Affairs

Citrix fixed two actively exploited zero-day vulnerabilities impacting Netscaler ADC and Gateway appliances. Citrix warns customers to install security updates to address two actively exploited zero-day vulnerabilities, tracked as CVE-2023-6548 and CVE-2023-6549, impacting Netscaler ADC and Gateway appliances. “Exploits of these CVEs on unmitigated appliances have been observed.

Cloud 114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Did Uber's Delivery Service Drizly Die Due to Data Breach?

Data Breach Today

Closing Time for Alcohol Delivery Service Follows Fed Crackdown for Poor Security It's last call for Drizly, the alcohol delivery service Uber bought for $1.1 billion in 2021. Whether or not Drizly's past cybersecurity missteps - leading to two-decade consent agreement with regulators - played any part in its being retired by Uber remains unclear.

article thumbnail

Github rotated credentials after the discovery of a vulnerability

Security Affairs

GitHub rotated some credentials after the discovery of a flaw that allowed access to the environment variables of a production container. After GitHub became aware of a vulnerability through its bug bounty program, the Microsoft-owned company rotated some credentials. The vulnerability, tracked as CVE-2024-0200 (CVSS score 7.2), allowed access to the environment variables of a production container and the company confirmed that all affected credentials have been rotated. “On December 26,

article thumbnail

US Judge Again Says Meta Pixel Privacy Case Dismissal Unlikely

Data Breach Today

Case Against Meta Likely Moving Forward After Court Heard Dismissal Arguments A federal judge said he is inclined to let proceed a putative class action lawsuit against Meta over its gathering of data from medical center patient portals through a web activity tracking tool. U.S. District for the District of Northern California Judge William Orrick on heard arguments.

Privacy 272
article thumbnail

Elevating retail operations with Jamf strategic partnerships

Jamf

Jamf partners up with our allies in the retail space to enhance the customer retail experience. Read this blog to learn more about how Jamf and our partners can make a difference.

Retail 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Pro-Russia group hit Swiss govt sites after Zelensky visit in Davos

Security Affairs

Switzerland believes that the attack claimed by pro-Russian group NoName that hit the government websites is retaliation for Zelensky’s presence at Davos. Switzerland believes that the cyberattack carried out by pro-Russia group NoName disrupted access to some government websites, following Ukrainian President Volodymyr Zelensky’s visit to Davos. “We took a look at Switzerland, where the World Economic Forum Davos is currently taking place.

article thumbnail

How one IBMer is creating a more sustainable future for the island where he grew up

IBM Big Data Hub

IBM believes in the power of technology and innovation to drive climate solutions, especially for the communities and organizations most impacted by climate change and environmental challenges. At the center of this work is also a commitment to volunteerism, allowing inspired IBMers to combine their talent and skills with passion and purpose. Through the IBM Sustainability Accelerator , a pro-bono social impact program, IBM volunteers donate their time, energy and expertise to help create lastin

article thumbnail

FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation

Security Affairs

U.S. CISA and the FBI warned of AndroxGh0st malware used to create a botnet for victim identification and exploitation in target networks. US CISA and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory (CSA) to warn of AndroxGh0st malware. The malware is spreading to create a botnet for victim identification and exploitation in target networks.

article thumbnail

UK ICO Launches Consultation Series on Generative AI

Hunton Privacy

On January 15, 2024, the UK Information Commissioner’s Office (“ICO”) announced that it has launched a consultation series on generative AI. The series will examine how aspects of UK data protection law should apply to the development and use of the technology, with the first chapter of the series focusing on when it is lawful to train generative AI models on personal data scraped from the web.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Streamline ERP migration with integration experts – Estimate ROI with our new calculator!

OpenText Information Management

So, you’re facing the daunting task of modernizing or replacing your company’s enterprise resource planning (ERP) system. Do you worry about the price tag of an ERP migration and justifying management costs? Or do your main concerns revolve around migration risks and complexity? Laying the foundation for a successful ERP migration Like many companies, you’ve … The post Streamline ERP migration with integration experts – Estimate ROI with our new calculator!

Risk 67
article thumbnail

IT spending set to grow 6.8% in 2024, Gartner predicts

Information Matters

Global information technology (IT) spending is forecast to total $5tn in 2024, an increase of 6.8 per cent from 2023, according to new projections by technology research firm Gartner. The Read more The post IT spending set to grow 6.8% in 2024, Gartner predicts appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52
article thumbnail

The evolving role of general counsel: Securing a seat at the table

OpenText Information Management

Technological, social, and economic events have changed the legal and regulatory landscape. There was a time when in-house legal departments and the general counsel had more clear-cut roles that were well understood by everyone, lawyers, and non-lawyers alike. However, it is not that simple anymore. The new role of the general counsel We have … The post The evolving role of general counsel: Securing a seat at the table appeared first on OpenText Blogs.

article thumbnail

Cyberattackers Target Nuclear Waste Company via LinkedIn via DarkReading

IG Guru

Check out the article here. The post Cyberattackers Target Nuclear Waste Company via LinkedIn via DarkReading first appeared on IG GURU.

Risk 86
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Spotlight on Security Specifiers: Get to Know the HID A&E Team Dedicated to the Security Consultant Community

HID Global

A Critical Resource for the Security Industry

article thumbnail

E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop

Krebs on Security

The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of a cybercrime lifestyle. With memorable hits such as “Internet Swiping” and “Million Dollar Criminal” earning millions of views, Punchmade has leveraged his considerable following to peddle tutorials on how to commit financial crimes online.

Sales 248
article thumbnail

Inside the Massive Naz.API Credential Stuffing List

Troy Hunt

It feels like not a week goes by without someone sending me yet another credential stuffing list. It's usually something to the effect of "hey, have you seen the Spotify breach", to which I politely reply with a link to my old No, Spotify Wasn't Hacked blog post (it's just the output of a small set of credentials successfully tested against their service), and we all move on.

Passwords 142
article thumbnail

Cryptography use cases: From secure communication to data security 

IBM Big Data Hub

When it comes to data security , the ancient art of cryptography has become a critical cornerstone of today’s digital age. From top-secret government intelligence to everyday personal messages, cryptography makes it possible to obscure our most sensitive information from unwanted onlookers. Whether shopping online or saving valuable trade secrets to disk, we can thank cryptography for any semblance of privacy we may have.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Chatbot examples: A beginner’s guide 

IBM Big Data Hub

A chatbot is a program or script designed to interact and respond to humans in real-time conversation. Different organizations and individuals employ chatbots for a variety of different uses and business functions. Broadly, chatbots provide pre-written responses and information to handle basic requests or to get enough information from customers to connect them to a live agent for better and more specific service.

Sales 65