Thu.Jan 25, 2024

article thumbnail

ITRC Report: Breaches Up 78% in 2023, Breaking 2021 Record

Data Breach Today

Identity Theft Resource Center's James E. Lee Calls for Uniform Breach Reporting Supply chain attacks and zero-day exploits surged in 2023, helping to set yet another record for data breaches tracked by the Identity Theft Resource Center. James E. Lee, COO of the group, explained why the number of compromises grew so dramatically - from 1,801 incidents in 2022 to 3,205 in 2023.

article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.

IT 245
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Hacker Sentenced to Over 5 Years in US Prison

Data Breach Today

Vladimir Dunaev Acknowledged Acting 'Recklessly' in Working for Cybercriminal Group A U.S. federal judge sentenced a Russian national to five years and four months in prison for his role in developing TrickBot malware. Vladimir Dunaev, 40, pleaded guilty in December. Dunaev helped develop the malware "while hiding behind his computer," U.S. Attorney Rebecca Lutzko said.

292
292
article thumbnail

Cisco warns of a critical bug in Unified Communications products, patch it now!

Security Affairs

Cisco addressed a critical flaw in its Unified Communications and Contact Center Solutions products that could lead to remote code execution. Cisco released security patches to address a critical vulnerability, tracked as CVE-2024-20253 (CVSS score of 9.9), impacting multiple Unified Communications and Contact Center Solutions products. An unauthenticated, remote attacker can exploit the flaw to execute arbitrary code on an affected device.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Weasel Words Rule Too Many Data Breach Notifications

Data Breach Today

'The Security of Our Customers' Data Is Our Top Priority' - Really? Does a day ever go by without a fresh set of data breach notifications? Some organizations' breach notifications at least signal respect for the recipient. But others play it shadier, by resorting to marketing spin, minimizing the blame, and in some cases, even indulging in corporate cheerleading.

More Trending

article thumbnail

Breach Roundup: EquiLend Faces Cyberattack, Systems Offline

Data Breach Today

Also: Ivanti Exploitation Continues; Apple Fixes First Zero-Day of 2024 This week, U.S. short seller lender EquiLend Holdings was hacked, the Ivanti exploitation continued, Apple addressed the first zero-day of 2024, Ukraine said hackers had hit a Russian research center, Kasseika ransomware evolved, North Korean hackers were active, and Trello experienced a data leak.

article thumbnail

The Number of Ransomware Attack Victims Surge in 2023 to over 4000

KnowBe4

The surge in Ransomware -as-a-Service affiliates is likely the reason behind the dramatic increase in the number of victimized organizations, with all indicators suggesting that this trend will persist into 2024.

article thumbnail

US FTC Launches Investigation Into Tech Giants' AI Influence

Data Breach Today

Chair Lina Khan Says Probe Will Look for Potential 'Undue Influence' The Federal Trade Commission is investigating whether five artificial intelligence technology giants are exerting undue influence or gaining privileged access "in ways that undermine fair competition" across the generative AI sector, said Chairwoman Lina Khan.

article thumbnail

Balancing AI: Do good and avoid harm

IBM Big Data Hub

Growing up, my father always said, “do good.” As a child, I thought it was cringeworthy grammar and I would correct him, insisting it should be “do well.” Even my children tease me when they hear his “do good” advice and I’ll admit I let him have a pass on the grammar front. In the case of responsible artificial intelligence (AI), organizations should prioritize the ability to avoid harm as a central focus.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Resilience: The New Priority for Your Security Model

Data Breach Today

Security leaders focus on protection and detection, but the new priority is resilience. A resilience strategy should "get the real 'ground truth' of what has happened" in the attack, said Brian Dye, CEO of Corelight, in this episode of "Cybersecurity Insights.

Security 266
article thumbnail

How Belgian MP turned sleuth to solve London Ulez fine mystery

The Guardian Data Protection

Politician tells of trips to city to secure key evidence on thousands of potential data breaches by TfL collection agents My surprising journey began two years ago when friends and acquaintances who had visited London received hefty fines, some amounting to thousands of euros, for allegedly contravening London’s emissions zone regulations. The letters accompanying the penalties accused them of entering the city’s low emissions zone (Lez) without paying the daily charge.

article thumbnail

OnDemand Panel | Mitigating Risks in Pharmacy Environments: Effective Tactics Unveiled

Data Breach Today

Strengthening OT Security with HCLTech and Microsoft In an age reliant on operational technology, ensuring robust security for diverse industries is crucial. Join us as we discuss operational challenges, highlighting specific threats faced by businesses today. Explore how the powerful alliance between HCLTech and Microsoft empowers organizations to safeguard critical assets and enhance resilience against evolving threats.

Risk 266
article thumbnail

Quantum Computing Skeptics

Schneier on Security

Interesting article. I am also skeptical that we are going to see useful quantum computers anytime soon. Since at least 2019, I have been saying that this is hard. And that we don’t know if it’s “land a person on the surface of the moon” hard, or “land a person on the surface of the sun” hard. They’re both hard, but very different.

IT 93
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Feds Warn Healthcare Sector of ScreenConnect Threats

Data Breach Today

HHS: Compromise at Large Pharma Software and Services Firm Puts Entities at Risk Federal authorities are warning of attacks on healthcare sector firms that use ConnectWise's remote access tool ScreenConnect. Hackers compromised a locally hosted version of the tool used by a large national pharmacy supply chain and managed services provider in 2023.

Risk 260
article thumbnail

Social Engineering Attacks Rising in the Trucking Industry

KnowBe4

Spear phishing and voice phishing (vishing) are on the rise in the trucking industry, according to a new report from the National Motor Freight Traffic Association (NMFTA).

article thumbnail

The importance of diversity in AI isn’t opinion, it’s math

IBM Big Data Hub

We all want to see our ideal human values reflected in our technologies. We expect technologies such as artificial intelligence (AI) to not lie to us, to not discriminate, and to be safe for us and our children to use. Yet many AI creators are currently facing backlash for the biases, inaccuracies and problematic data practices being exposed in their models.

article thumbnail

HP Enterprise Reveals It was hacked by the same Russians that broke into Microsoft

KnowBe4

In a new SEC disclosure, Hewlett Packard Enterprise (HPE) announced on Wednesday that it fell prey to the same Russian intelligence group, known as Midnight Blizzard or Cozy Bear, that recently breached Microsoft's email system. This disclosure comes just a week after Microsoft reported a similar intrusion, putting the spotlight back on this notorious hacking group.

IT 87
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

WIRED Threat Level

Newly disclosed breaches of Microsoft and Hewlett-Packard Enterprise highlight the persistent threat posed by Midnight Blizzard, a notorious Russian cyber-espionage group.

article thumbnail

MRO spare parts optimization

IBM Big Data Hub

Many managers in asset-intensive industries like energy, utilities or process manufacturing, perform a delicate high-wire act when managing inventory. Finding the right balance becomes crucial for helping ensure the success of maintenance, repair and operations (MRO) initiatives, specifically the spare parts that support them. What’s at stake?

article thumbnail

Browser-based Phishing Attacks Increase By 198% Over Six Months

KnowBe4

Researchers at Menlo Security observed a 198% increase in browser-based phishing attacks over the past six months.

article thumbnail

Customer experience examples that drive value

IBM Big Data Hub

Organizations that provide an excellent customer experience (CX) can improve sales revenues by 2 to 7 percent and profitability by 1 to 2 percent, according to McKinsey. It’s no surprise. Focusing on good CX can increase customer satisfaction and drive more meaningful customer interactions, ultimately increasing sales and customer retention. As such, more organizations are increasing their dedication to CX strategy and looking towards successful customer experience examples for inspiration

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Supercharge your business with Copilot for Microsoft 365

OpenText Information Management

Previously only available through Enterprise Agreements for a minimum of 300 users, Copilot for Microsoft 365 now brings an entirely new way of working for small to medium-sized businesses (SMBs). For OpenText™ Cybersecurity partners, Copilot for Microsoft 365 is an opportunity to supercharge their Microsoft Cloud Solution Provider (CSP) businesses by helping customers take full … The post Supercharge your business with Copilot for Microsoft 365 appeared first on OpenText Blogs.

Cloud 62
article thumbnail

Join the Inaugural ICRM Virtual Mixer to Leap into RIM Month

IG Guru

Members, Candidates, and Prospects, Join us for the Inaugural ICRM Virtual Mixer to Leap into RIM Month on Thursday, February 29, from 2:00 – 3:00 pm ET. Take advantage of Leap Day this year and get a jump on RIM Month. Join the ICRM for our first virtual mixer for all members, candidates, and prospects. We will focus on […] The post Join the Inaugural ICRM Virtual Mixer to Leap into RIM Month first appeared on IG GURU.

article thumbnail

Adapture Appointed Cloudflare Authorized Service Delivery Partner

Adapture

Atlanta-Based IT Consultancy achieves multi-discipline ASDP status for Application Services, Zero Trust Services and Migration Services ATLANTA, Jan. 25, 2023 – Adapture, a leader in networking, security and infrastructure consulting, has been appointed as a Cloudflare Authorized Service Delivery Partner (ASDP) for Application Services, Zero Trust Services and Migration Services.

Cloud 52
article thumbnail

Upcoming RMS Coffee Chat: From Chaos to Control: Building a Strong Records Management Program From Scratch 

The Schedule

Join us February 5th, 2024, at 3pm EST, for “From Chaos to Control: Building a Strong Records Management Program From Scratch.” Ryan Leimkuehler, University Archivist at Kansas State University, and Daria Labinsky, Records and Information Management Specialist for the U.S. Fish and Wildlife Service, will share what they have learned from helping to start records management programs and will discuss how their organizations approached it.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Banks to Ramp Up Spending on Generative AI Tenfold by 2030

Information Matters

A new report published by Juniper Research predicts that global spending by banks on generative artificial intelligence will increase exponentially over the next decade. Generative AI platforms, which can create Read more The post Banks to Ramp Up Spending on Generative AI Tenfold by 2030 appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Yearly Intel Trend Review: The 2023 RedSense report

Security Affairs

The 2023 RedSense report covers long-term observations we have made regarding intel trends and interconnectivity. These observations were made by analyzing numerous 2023 threat findings and discoveries, and include references to case studies that were reported on by RedSense throughout the year. Trend Analysis Ghost Group Operations: A notable increase in covert ‘ghost groups’ like Zeon/ Ryuk /Conti1, providing backend support to groups such as BlackCat , Akira , and LockBit 3.0.

article thumbnail

Info-Tech Research Group Offers Roadmap for Leveraging AI to Get Ahead of Data Growth

Information Matters

A new report from technology research firm Info-Tech Research Group lays out a blueprint for IT leaders to harness exponential advancements in AI to gain a competitive edge in managing Read more The post Info-Tech Research Group Offers Roadmap for Leveraging AI to Get Ahead of Data Growth appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52