Thu.Mar 21, 2024

article thumbnail

Water Sector Lacks Support to Meet White House Cyber Demands

Data Breach Today

Experts Say Water Sector Lacks Technical Resources to Comply With Federal Requests The White House convened state environmental, health and homeland security agencies Thursday as experts told ISMG water utilities across the country - particularly those in small, under-resourced communities - lack the funding and technical skills to implement federal cybersecurity recommendations.

article thumbnail

Pwn2Own Vancouver 2024 Day 1 – team Synacktiv hacked a Tesla

Security Affairs

Participants earned $732,500 on the first day of the Pwn2Own Vancouver 2024 hacking competition, a team demonstrated a Tesla hack. Participants earned $732,000 on the first day of the Pwn2Own Vancouver 2024 hacking competition for demonstrating 19 unique zero-days, announced Trend Micro’s Zero Day Initiative (ZDI). The experts successfully demonstrated exploits against a Tesla car, Linux and Windows operating systems, and more.

Security 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Flipper Pushes Back on Proposed Canada Ban

Data Breach Today

Also: UnitedHealth Group, Nemesis Market, Phishing Tricks and AceCryptor This week, Flipper Devices petitioned Canada, UnitedHealth Group dealt with its attack, Nemesis Market was seized, phishers fooled ML, AceCryptor returned to Europe, Brazil and Ukraine made arrests, another Ivanti flaw, London rebuked for possible data exposure, and Fujitsu reported malware attack.

Phishing 291
article thumbnail

Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds

WIRED Threat Level

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

IT 143
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptohack Roundup: Ray Eviscerates Bankman-Fried

Data Breach Today

Also: CryptoFX Ponzi Scheme, North Korean Hackers Gonna Hack This week, FTX emergency CEO John Ray filleted previous CEO Sam Bankman-Fried, the SEC charged 17 members in a $300 million Ponzi scheme, Hong Kong warned against Bybit, reports said North Korea made half of its revenue from cyberattacks, and police rescued hundreds from a pig-butchering scam center.

IT 285

More Trending

article thumbnail

Revenue Cycle Firm Settles GitHub PHI Breach Lawsuit for $7M

Data Breach Today

Class Action Settlement Also Calls for MedData to Enhance Its Security Program Revenue cycle management firm MedData has agreed to a $7 million settlement in a class action lawsuit filed after an employee inadvertently uploaded and exposed the health and personal information of about 136,000 individuals on the public-facing part of GitHub for more than a year.

Security 283
article thumbnail

Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild

Security Affairs

Researchers released a PoC exploit for a critical flaw in Fortinet’s FortiClient Enterprise Management Server (EMS) software, which is actively exploited. Security researchers at Horizon3 have released a proof-of-concept (PoC) exploit for a critical vulnerability, tracked as CVE-2023-48788 (CVSS score 9.3), in Fortinet’s FortiClient Enterprise Management Server (EMS) software.

IT 112
article thumbnail

Denial-of-Service Attack Could Put Servers in Perpetual Loop

Data Breach Today

Researchers Spot Vulnerability in Application-Layer Communication Protocol A new type of denial-of-service threat can disrupt an estimated 300,000 internet hosts that are at risk of exploitation. Researchers at the CISPA Helmholtz Center for Information Security say attackers are using IP spoofing to entangle two servers in a perpetual communication loop.

article thumbnail

The Mainframe Turns 60: A Milestone in Computing History  

OpenText Information Management

60 years can really fly by! On April 7, 2024, the Mainframe will turn 60. At this milestone, we should all reflect on what the mainframe has done to the computing industry. What would the world look like without it? What is the current state of the mainframe? And what is its future? This post will touch on these points and give us all a chance to celebrate the mainframe at 60 years.

Cloud 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI Is Making Payment Fraud Better, Faster and Easier

Data Breach Today

AI Is Also Making Traditional Scams More Convincing, Warns Visa Artificial intelligence technologies such as generative AI are not helping fraudsters create new types of scams. They are doing just fine relying on the traditional scams, but the advent of AI is helping them scale up attacks and snare more victims, according to researchers at Visa.

article thumbnail

EU Formally Adopts World’s First AI Law

Data Matters

On March 13, 2024, the European Parliament formally adopted the EU Artificial Intelligence Act (“ AI Act ”) with a large majority of 523-46 votes in favor of the legislation. The AI Act is the world’s first horizontal and standalone law governing AI, and a landmark piece of legislation for the EU. The post EU Formally Adopts World’s First AI Law appeared first on Data Matters Privacy Blog.

article thumbnail

UN Adopts US-Led International AI Safety Resolution

Data Breach Today

The Non-Binding Resolution Calls for 'Safe, Secure, and Trustworthy AI Systems' The United Nations on Thursday unanimously adopted a U.S.-brokered first-ever international resolution promoting the safe use of artificial intelligence. The adoption of the resolution comes at a time when governments are vying to exert influence and lead global governance in the nascent technology.

article thumbnail

Ransomware Group “RA World” Changes Its’ Name and Begins Targeting Countries Around the Globe

KnowBe4

The threat group "RA World" (formerly RA Group) has shifted from country-specific ransomware attacks to include specific industries via a new - not previously seen - method of extortion.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Synopsys Greenlights Sale of $525M Application Security Unit

Data Breach Today

Software Integrity Business Could Fetch More Than $3B, Attract Private Equity Firms Synopsys' board of directors signed off Wednesday on selling the company's $525 million application security testing business to focus exclusively on design automation and IP. The systems design behemoth began exploring strategic alternatives for its software integrity group in November.

Sales 253
article thumbnail

CISA Recommends Continuous Cybersecurity Training

KnowBe4

In an age when 70% - 90% of successful data breaches involve social engineering (which gets past all other defenses), sufficient training is needed to best reduce human-side cybersecurity risk. Everyone should be trained in how to recognize social engineering attempts, how to mitigate (i.e., delete, ignore, etc.) them, and how to appropriately report them if in a business scenario.

article thumbnail

Proof of Concept: Opening Up the AI 'Black Box'

Data Breach Today

Panelists Make Case for Explainability, Trust in Areas Such as Healthcare, Banking In the latest "Proof of Concept," panelists Sam Curry of Zscaler and Heather West of Venable LLP discuss the crucial role of explainability and transparency in artificial intelligence, especially in areas such as healthcare and finance, where AI decisions can significantly affect people's lives.

article thumbnail

Social Engineering The #1 Root Cause Behind Most Cyber Crimes In FBI Report

KnowBe4

The following paragraphs were cited directly from my recent article highlighting social engineering. " Social engineering and phishing are involved in 70% to 90% of all successful cybersecurity attacks. No other initial root hacking cause comes close.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Apple Sued for Prioritizing Market Dominance Over Security

Data Breach Today

Lawsuit Says Apple Stifles Innovation, Degrades Security, Suppresses Protections The U.S. Department of Justice in a lawsuit filed Thursday is accusing Apple of discarding user security and privacy protections as part of a broader effort to maintain dominance in the national smartphone market. A spokesperson for the tech giant told ISMG the lawsuit threatens the entire company.

Marketing 251
article thumbnail

Apple's iMessage Encryption Puts Its Security Practices in the DOJ's Crosshairs

WIRED Threat Level

Privacy and security are an Apple selling point. But the DOJ's new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users.

article thumbnail

UK Official: AI in Defense Sector Is Not About Killer Robots

Data Breach Today

It Will Do Low-Level Tasks to Free Up Pros to Make Decisions, Say Researchers The current use of artificial intelligence in the U.K. defense sector is not about creating killer robots. It is focused on optimizing resources and increasing the efficiency of military operations, experts speaking at the Alan Turing Institute's AI UK conference told attendees.

article thumbnail

[Heads-Up] Phishing Campaign Delivers VCURMS RAT

KnowBe4

Researchers at Fortinet are tracking a phishing campaign that’s distributing a new version of the VCURMS remote access Trojan (RAT).

Phishing 105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Unleashing the potential: 7 ways to optimize Infrastructure for AI workloads 

IBM Big Data Hub

Artificial intelligence (AI) is revolutionizing industries by enabling advanced analytics, automation and personalized experiences. Enterprises have reported a 30% productivity gain in application modernization after implementing Gen AI. However, the success of AI initiatives heavily depends on the underlying infrastructure’s ability to support demanding workloads efficiently.

article thumbnail

Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild

Security Affairs

Researchers released a PoC exploit for a critical flaw in Fortinet’s FortiClient Enterprise Management Server (EMS) software, which is actively exploited. Security researchers at Horizon3 have released a proof-of-concept (PoC) exploit for a critical vulnerability, tracked as CVE-2023-48788 (CVSS score 9.3), in Fortinet’s FortiClient Enterprise Management Server (EMS) software.

IT 56
article thumbnail

Prerequisites for an ROI-led data and AI strategy

CGI

As organizations pursue next-generation data and artificial intelligence (AI) technologies to improve business outcomes, what’s getting in their way?

article thumbnail

HHS updates online tracker guidance

Data Protection Report

On March 18, 2024, the U.S. Department of Health and Human Services (HHS) issued an updated, 17-page Bulletin titled “Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates (the “Bulletin”). Our readers may recall that HHS had originally issued the Bulletin in December of 2002, which we summarized here. HHS’ changes are generally clarifications and additional examples.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Archive-It Partner News, March 2024

Archive-It

Community News Community Webs welcomes new members The Internet Archive’s community history archiving program, Community Webs , is pleased to welcome new members. Amistad Research Center Black Lunch Table The Go-Go Museum Historic Takoma, Inc. Miami-Dade Public Library System University of Alaska Fairbanks Rasmuson Library Oral History Program – Project Jukebox Public libraries, local and community archives, and other cultural heritage organizations are encouraged to apply to receive fre

article thumbnail

Types of 5G: Which one is right for your organization?

IBM Big Data Hub

5G technology isn’t a one-size-fits-all solution that can enable digital transformation at the touch of a button. There are three kinds of 5G, each with its own specific use cases and capabilities, that business leaders need to understand. 5G wireless is broken down into three types—low, mid and high band—named for the spectrum of radio frequencies they support.

article thumbnail

New Loop DoS attack may target 300,000 vulnerable hosts

Security Affairs

Boffins devised a new application-layer loop DoS attack based on the UDP protocol that impacts major vendors, including Broadcom, Microsoft and MikroTik. Researchers from the CISPA Helmholtz Center for Information Security (Germany) devised a new denial-of-service (DoS) attack, called loop DoS attack, that hundreds of thousands of internet-facing systems from major vendors.