Wed.Nov 08, 2023

article thumbnail

Medical Transcription Hack Affects 1.2 Million Chicagoans

Data Breach Today

Cook County Health Says It Is Among the Vendor's 'Many' Clients Affected by Hack A major healthcare provider in Chicago that targets underserved populations is notifying 1.2 million patients that their information was compromised in a data theft incident at a medical transcription vendor. The county said it is among "many" entities affected.

IT 298
article thumbnail

Five Canadian Hospitals impacted by a ransomware attack on TransForm provider

Security Affairs

Five Canadian hospitals were victims of a ransomware attack, threat actors claim to have stolen data from them and leaked them. Five Canadian hospitals revealed they were victims of ransomware attacks after threat actors leaked alleged stolen data. The impacted hospitals are Bluewater Health , Chatham-Kent Health Alliance , Erie Shores HealthCare , Hôtel-Dieu Grace Healthcare , and Windsor Regional Hospital.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DOJ to Launch Emerging Tech Board, Ensure Ethical Use of AI

Data Breach Today

Board to Set Ethical Framework for DOJ Use of Facial Recognition, Other AI Tools Deputy Attorney General Lisa Monaco announced Wednesday that the Justice Department will appoint a new board to advise top officials on the "ethical, lawful use of AI" following a White House executive order that sets new standards for the use of the emerging technology across federal agencies.

284
284
article thumbnail

Royal Mail jeopardizes users with open redirect flaw

Security Affairs

Royal Mail has left an open redirect vulnerability on one of its sites, exposing its customers to phishing attacks and malware infections. The centuries-old Royal Mail is the largest courier company in the UK, boasting twice the market share of Amazon. The centuries-old Royal Mail is the largest courier company in the UK, boasting twice the market share of Amazon.

Phishing 119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

EU Cyber Resilience Act May Cause Bottlenecks, Companies Say

Data Breach Today

Digital Europe Says Third-Party Assessments Could Ensnare Supply Chains Heads of major European tech companies are calling on trading bloc lawmakers to revise a proposed cybersecurity law, which they argue will create bottlenecks that disrupt the supply chain. "We risk creating a COVID-style blockage in European supply chains," the company heads say.

More Trending

article thumbnail

NY AG Hits Radiology Group With $450K Fine in SonicWall Hack

Data Breach Today

Attackers Exploited Unpatched Flaw, Affecting Nearly 93,000 New Yorkers New York state regulators have smacked one of the nation's largest physician-owned radiology groups with a $450,000 settlement in the aftermath of a 2021 data exfiltration incident that compromised sensitive information of nearly 200,000 patients, including about 93,000 New Yorkers.

279
279
article thumbnail

North Korea-linked APT BlueNoroff used new macOS malware ObjCShellz

Security Affairs

The North Korea-linked APT BlueNoroff used a new strain of macOS malware strain dubbed ObjCShellz, Jamf Threat Labs reported. Researchers from Jamf Threat Labs discovered a new macOS malware strain dubbed ObjCShellz and attributed it to North Korea-linked APT BlueNoroff. The experts noticed that the ObjCShellz malware shares similarities with the RustBucket malware campaign associated with the BlueNoroff APT group.

article thumbnail

How Microsoft, Rockwell Deploy AI for Faster, Cleaner Design

Data Breach Today

Microsoft Boosts Productivity, Accelerates Learning, Drives Collaboration With AI Microsoft spent the past year testing how generative AI can boost productivity, accelerate learning curves and drive collaboration for itself, its partners and its customers. Microsoft infuses generative AI into every product it builds and now uses generative AI to build generative AI capabilities.

IT 272
article thumbnail

Sumo Logic discloses security breach and recommends customers rotate credentials

Security Affairs

Security firm Sumo Logic disclosed a security breach after discovering the compromise of its AWS account compromised last week. Sumo Logic is a cybersecurity company that specializes in cloud-based log management and analytics. The company disclosed a security breach after discovering that its AWS account was compromised last week. The company discovered the security breach on Friday, November 3, 2023. “On Friday, November 3rd, 2023, Sumo Logic discovered evidence of a potential security i

Security 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FDA FSMA: Providing value beyond compliance

IBM Big Data Hub

The supply chain plays a pivotal role in delivering goods and services to both businesses and consumers, serving as the connective thread between industries, nations, communities and all components of the value chain. Our dependence on supply chains is most pronounced in ensuring food supply. However, over the decades, the supply chain has grown longer and increasingly intricate, which means consumers may find themselves more distant from the origin of the products they consume.

article thumbnail

Ransomware Mastermind Uncovered After Oversharing on Dark Web

Dark Reading

Meet "farnetwork," one of the most prolific RaaS operators around, who spilled too many details during an affiliate "job interview.

article thumbnail

NYDFS releases major update to Part 500 cybersecurity requirements for financial services companies

Data Protection Report

On November 1, 2023, the New York Department of Financial Services (“NYDFS”) released the finalized amendments of Part 500 of its cybersecurity regulations. These revisions represent the most significant modifications since the enactment of the rules in March 2017. Noticeably, covered entities are now subject to new requirements imposing heightened responsibilities on Chief Information Security Officers (“CISOs”) and more specific and prescriptive requirements in relation to governance, risk ass

article thumbnail

New Phishing Campaign Abusing.top Domains

KnowBe4

A phishing campaign is exploiting a large number of.top domains, according to researchers from WhoisXML API. In an article for CircleID, the researchers analyzed a phishing operation first uncovered by security researcher Dancho Danchev.

Phishing 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CISOs Beware: SEC's SolarWinds Action Shows They're Scapegoating Us

Dark Reading

In a rapidly evolving cybersecurity landscape, CISOs must take proactive measures to safeguard their careers and mitigate risks associated with their roles.

article thumbnail

This Is the Ops Manual for the Most Tech-Savvy Animal Liberation Group in the US

WIRED Threat Level

For the first time, guerrilla animal rights group Direct Action Everywhere reveals a guide to its investigative tactics and toolkit, from spy cams to night vision and drones.

IT 104
article thumbnail

Evasive Jupyter Infostealer Campaign Showcases Dangerous Variant

Dark Reading

The attacks are another manifestation of the concerning rise in information stealers for harvesting data and enabling persistent access to enterprise networks.

Access 105
article thumbnail

Decoupling for Security

Schneier on Security

This is an excerpt from a longer paper. You can read the whole thing (complete with sidebars and illustrations) here. Our message is simple: it is possible to get the best of both worlds. We can and should get the benefits of the cloud while taking security back into our own hands. Here we outline a strategy for doing that. What Is Decoupling? In the last few years, a slew of ideas old and new have converged to reveal a path out of this morass, but they haven’t been widely recognized, comb

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Enhancing Data Sovereignty: VMware Sovereign Cloud and Thales Join Forces

Thales Cloud Protection & Licensing

Enhancing Data Sovereignty: VMware Sovereign Cloud and Thales Join Forces madhav Wed, 11/08/2023 - 09:55 By Guy Bartram, Director Product Marketing, VMware In a globalized world where data flows seamlessly across physical borders and is increasingly stored on public clouds, yet is still subject to local country laws, the ability to offer digital sovereignty solutions has become increasingly important for Cloud Service Providers.

Cloud 87
article thumbnail

Building on a year of focus to help IBM Power clients grow with hybrid cloud and AI

IBM Big Data Hub

At the beginning of the year, we laid out a new strategy for IBM Power under the leadership of Ken King, who will be retiring by the end of 2023 after forty years with IBM. It is with immense gratitude that I thank Ken for his leadership not only across IBM Power, but for his service to IBM in various roles spanning IP, strategy and software during his distinguished IBM career.

Cloud 98
article thumbnail

MGM and Caesars Attacks Highlight Social Engineering Risks

Dark Reading

Relying on passwords to secure user accounts is a gamble that never pays off.

Risk 112
article thumbnail

NYDFS Updates Its Cybersecurity Regulation to Protect Against Growing Cyber Threats

Hunton Privacy

On November 1, 2023, New York Governor Hochul announced that the New York State Department of Financial Services (“NYDFS”) amended its Cybersecurity Regulation applicable to covered financial institutions. Our previous blog post covered key proposed changes to the Cyber Regulation. The NYDFS, which regulates financial institutions including insurance companies, mortgage brokers and banks, adopted the original Cybersecurity Regulation in 2017.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why You Need to Accelerate Your Modernization Journey to the Cloud

OpenText Information Management

During OpenText™ World 2023, attendees were guided on how to unlock value in their application modernization journey. Drawing on OpenText’s experience in helping thousands of customers move their mainframe to the cloud, OpenText experts Neil Fowler, SVP, Application Modernization, and Stuart McGill, VP, Sales, shared insights into successfully migrating legacy applications to the cloud to … The post Why You Need to Accelerate Your Modernization Journey to the Cloud appeared first on OpenTe

Cloud 67
article thumbnail

Police Use of Face Recognition Is Sweeping the UK

WIRED Threat Level

Face recognition technology has been controversial for years. Cops in the UK are drastically increasing the amount they use it.

IT 84
article thumbnail

Adapture Celebrates Third Annual Volunteer Day with the Furniture Bank of Metro Atlanta

Adapture

Adapture Volunteers and Partners come together to give back ATLANTA, November 8, 2023—Around forty-five volunteers represented Adapture at the Furniture Bank of Metro Atlanta on Tuesday, October 24, 2023. The group was comprised of both Adapture employees and partners who live and work in the Atlanta area. Over the course of the afternoon, the team worked together to build kitchen and coffee tables—items that are not often donated.

article thumbnail

Data underpins a future services-based automotive market

CGI

Automotive manufacturers no longer simply manufacture vehicles. As mobility trends and technologies advance—think of connected cars, autonomous driving and car sharing—automotive manufacturers are rethinking their business models to deliver greater customer value. At the core of this change is transforming from offering only products to providing services—known as servification.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Facebook and Instagram will offer paid subscriptions via Cybernews

IG Guru

Check out the article here. The post Facebook and Instagram will offer paid subscriptions via Cybernews first appeared on IG GURU.

Privacy 75
article thumbnail

Digital Health and Artificial Intelligence: New Developments From President Biden’s Executive Order

Data Matters

The Biden administration’s executive order issued on October 30, 2023, includes a number of initiatives relating to the development and use of artificial intelligence (AI), including in healthcare. As AI becomes a pivotal point of innovation for the healthcare industry, digital health healthcare technology developers, private equity sponsors, and other key industry stakeholders should track the regulatory frameworks certain to be developed following this executive order to better inform strate

article thumbnail

AI assistants optimize automation with API-based agents

IBM Big Data Hub

Generative AI-powered assistants are transforming businesses through intelligent conversational interfaces. Capable of understanding and generating human-like responses and content, these assistants are revolutionizing the way humans and machines collaborate. Large Language Models (LLMs) are at the heart of this new disruption. LLMs are trained on vast amounts of data and can be used across endless applications.

IT 122