Mon.Sep 18, 2023

article thumbnail

TransUnion Involved in Potential Hacking Incident

Data Breach Today

Hacker 'USDoD' Claims Attack, Says He Has Data of More Than 50,000 Consumers Credit reporting agency TransUnion may be the subject of a hacking incident leading to a data breach after a hacker apparently stole information of 58,505 customers across North and South America and Europe. TransUnion has not acknowledged the hack and refused to discuss the matter on the record.

article thumbnail

Who’s Behind the 8Base Ransomware Website?

Krebs on Security

The victim shaming website operated by the cybercriminals behind 8Base — currently one of the more active ransomware groups — was until earlier today leaking quite a bit of information that the crime group probably did not intend to be made public. The leaked data suggests that at least some of website’s code was written by a 36-year-old programmer residing in the capital city of Moldova.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian Law Firm Hack Affected 65 Government Agencies

Data Breach Today

Australian Federal Police, Department of Home Affairs Reportedly Among the Victims An April ransomware attack against one of Australia's largest law firms swept up the data of 65 Australian government agencies, the country's national cybersecurity coordinator said Monday. The Russian-speaking Alphv hacking group claimed responsibility earlier this year for hacking HWL Ebsworth.

article thumbnail

News alert: Omdia finds risk-based vulnerability management set to encompass the VM market

The Last Watchdog

LONDON, Sept. 18, 2023 – The first comparative research into the evolution of the vulnerability management market authored by Omdia has found risk-based vulnerability management (RVBM) is set to encompass the entire vulnerability management market by 2027. Omdia’s comprehensive market analysis is the first report that provides a strategic overview of RBVM and its broader evolution within cybersecurity that Omdia refers to as proactive security. “The emergence of RBVM has been driven by

Marketing 130
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

US DHS Announces New AI Guardrails

Data Breach Today

CIO Eric Hysen to Take on Additional Role as Agency's First Chief AI Officer DHS says it will eschew biased artificial intelligence decision-making and facial recognition systems as part of an ongoing federal effort to promote "trustworthy AI." "Artificial intelligence is a powerful tool we must harness effectively," said Secretary of Homeland Security Alejandro Mayorkas.

More Trending

article thumbnail

Sift, LexisNexis Top Digital Fraud Management Forrester Wave

Data Breach Today

Newcomer, Established Vendor Lead Efforts to Stop Fraudulent Payment Transactions Established provider LexisNexis Risk Solutions remains atop Forrester's digital fraud management rankings, while upstart Sift broke into the leaders category for the first time. Many providers in the space have expanded from payment transactions to account takeover fraud as well as handling scams.

Risk 281
article thumbnail

Microsoft AI research division accidentally exposed 38TB of sensitive data

Security Affairs

Microsoft AI researchers accidentally exposed 38TB of sensitive data via a public GitHub repository since July 2020. Cybersecurity firm Wiz discovered that the Microsoft AI research division accidentally leaked 38TB of sensitive while publishing a bucket of open-source training data on GitHub. The exposed data exposed a disk backup of two employees’ workstations containing secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages. “The researchers shared their fi

Risk 129
article thumbnail

Nuance Notifying 14 NC Healthcare Clients of MOVEit Hacks

Data Breach Today

Entities Are Among Growing Tally of Health Sector Victims in Clop Mass Attack The list of healthcare entities affected by MOVEit file transfer hacks continues to grow. Nuance Communications acknowledged that hackers had stolen data belonging to 14 of its clients, all North Carolina medical providers. Hackers may have obtained diagnostic information including imaging reports.

article thumbnail

How to Get Your Board on Board With Cybersecurity

Dark Reading

CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Dragos Raises $74M to Advance OT Protection in Europe, Asia

Data Breach Today

Money Will Address Enhanced OT Security Rules From Regulators, Insurance Providers Dragos completed a Series D extension to help organizations address enhanced OT security requirements from regulators and cyber insurance providers. The money will allow Dragos to help EU businesses affected by updated cybersecurity directives requiring many smaller organizations to boost security.

Insurance 270
article thumbnail

Payment Card-Skimming Campaign Now Targeting Websites in North America

Dark Reading

"Silent Skimmer" is a technically complex campaign that has successfully targeted online businesses in the Asia Pacific region for over a year.

131
131
article thumbnail

iFoodDS and IBM forge new path to food safety with IBM Food Trust™

IBM Big Data Hub

Picture this: You’re at your local supermarket, eagerly exploring the fresh produce section. You carefully select a carton of ripe, juicy fresh-cut strawberries, envisioning them as the star ingredient in your weekend’s mouthwatering desserts. You’re all set to enjoy a delightful culinary adventure. But as you savor your first bite of a luscious strawberry shortcake, you receive a notification on your smartphone.

article thumbnail

AI and government: Why data governance is key in our AI-era

Collibra

This year, AI catapulted to the front pages, introducing chatbots and generative AI capabilities to a mainstream audience. If you work in a government agency you aren’t isolated or immune from the hype. In fact, many Americans are wanting to know how the government will use this technology to provide cheaper and faster services. AI offers tremendous value for agencies across every level and branch of government.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The International Joint Commission Falls Victim to Ransomware Attack; 80GB Of Data Stolen

KnowBe4

The International Joint Commission (ICJ), an organization that handles water issues along the Canada–United States border, was hit by a ransomware attack, the Register reports.

article thumbnail

LockBit Is Using RMMs to Spread Its Ransomware

Dark Reading

The LockBit group is using native IT management software to live off the land, planting and then spreading itself before deploying its ransomware.

article thumbnail

Weekly Vulnerability Recap – September 18, 2023 – Patch Tuesday Also For Adobe, Apple and More

eSecurity Planet

Microsoft’s Patch Tuesday dominates the headlines because of near-universal Windows adoption. However, many other companies time their updates for the same week, such as Adobe, SAP, and VMware. Active exploits also lead to new versions of all major browsers as well as older versions of Apple products. Organizations of all sizes need to review the active exploits and announced patches and ensure that vulnerabilities in all of their high value and high risk systems are mitigated.

article thumbnail

AI in Software Development: The Good, the Bad, and the Dangerous

Dark Reading

Just like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software.

IT 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Clock is Ticking for PCI DSS 4.0 Compliance

Thales Cloud Protection & Licensing

The Clock is Ticking for PCI DSS 4.0 Compliance madhav Tue, 09/19/2023 - 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS). Consumers’ payment data is a compelling target for criminals who continue to circumvent IT security defenses.

article thumbnail

Microsoft Azure Data Leak Exposes Dangers of File-Sharing Links

Dark Reading

Shared Access Signature (SAS) link exposed a storage bucket with 38TB of private data, including passwords, Teams messages, and the backups of two Microsoft AI research employees' workstations.

Passwords 127
article thumbnail

Federal Judge Blocks the California Age-Appropriate Design Code

Hunton Privacy

On September 18, 2023, Judge Beth Labson Freeman of the U.S. District Court for the Northern District of California granted NetChoice’s request for preliminary injunction in NetChoice v. Bonta , finding that NetChoice is likely to succeed on its claim that the California Age-Appropriate Design Code (“CA AADC”) violates the First Amendment. Specifically, the Court found that, as a speech restriction, the CA AADC would likely fail both strict scrutiny and a lesser standard of scrutiny.

article thumbnail

A Playbook for Bridging Africa's Cybersecurity Skills Shortage

Dark Reading

A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The next wave of payments modernization: Minimizing complexity to elevate customer experience

IBM Big Data Hub

The payments ecosystem is at an inflection point for transformation, especially as we see the rise of disruptive digital entrants who are introducing new payment methods, such as cryptocurrency and central bank digital currencies (CDBC). With more choices for customers, capturing share of wallet is becoming more competitive for traditional banks. This is just one of many examples that show how the payments space has evolved.

article thumbnail

Supporting Africa's Cybersecurity Talent Makes the World Safer

Dark Reading

The global infosec community needs to help African nations defend against growing threats.

article thumbnail

[New PhishER Feature] Immediately Add User-Reported Email Threats to Your M365 Blocklist

KnowBe4

Now there's a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform!

77
article thumbnail

Companies Explore Ways to Safeguard Data in the Age of LLMs

Dark Reading

Generative AI models are forcing companies to become creative in how they keep employees from giving away sensitive data.

96
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Optimism abounds in the world of functional testing

OpenText Information Management

In the fast-paced world of technology, partnerships and acquisitions often hold the key to innovation and growth. The OpenText acquisition of Micro Focus has sent ripples of excitement through the tech community, with promises of enhanced capabilities in functional testing for critical business applications. This strategic move marks a new chapter in the evolution of … The post Optimism abounds in the world of functional testing appeared first on OpenText Blogs.

62
article thumbnail

Security Conferences Keep Us Honest

Dark Reading

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — in public.

article thumbnail

The big Australian companies cashing in on healthcare – podcast

The Guardian Data Protection

Some of Australia’s largest companies are getting into the business of healthcare, claiming they are making medical appointments and prescriptions easier to access. But not everyone is convinced. Health reporter Natasha May tells Laura Murphy-Oates why some experts are concerned about the rise of ‘McMedicine’ You can subscribe for free to Guardian Australia’s daily news podcast Full Story on Apple Podcasts , Spotify and Google Podcasts Read more: Continue reading.

Access 62