Mon.Nov 13, 2023

article thumbnail

Denmark Hit With Largest Cyberattack on Record

Data Breach Today

Report Reveals How Hackers Targeted Danish Energy Infrastructure in Sweeping Attack Critical infrastructure operators across Denmark experienced the most extensive cybersecurity incident in Danish history earlier this year when hackers exploited zero-day vulnerabilities in firewalls meant to protect their networks from attacks, according to a new report published by SektorCERT.

article thumbnail

The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story

WIRED Threat Level

Netflix, Spotify, Twitter, PayPal, Slack. All down for millions of people. How a group of teen friends plunged into an underworld of cybercrime and broke the internet—then went to work for the FBI.

Security 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Info Stealers Thrive in Hot Market for Stolen Data

Data Breach Today

Browser Data, Crypto Wallets and Chat Apps Are Also Top Targets, Researchers Report Info-stealer malware built for stealing lucrative, sensitive data - including cryptocurrency wallet and remote access credentials - continues to remain popular for criminally inclined individuals. Researchers reports that RedLine, LokiBot, Mars and Aurora remain attackers' top info-stealer choices.

Marketing 315
article thumbnail

North Korea-linked APT Sapphire Sleet targets IT job seekers with bogus skills assessment portals

Security Affairs

North Korea-linked APT group Sapphire Sleet set up bogus skills assessment portals in attacks aimed at IT job seekers. The North Korea-linked APT group Sapphire Sleet (aka APT38 , BlueNoroff , CageyChameleon , and CryptoCore ) is considered a sub-group of the popular Lazarus APT group. The APT group’s campaigns focus on cryptocurrency exchanges, venture capital firms, and banks.

IT 125
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Australian Ports Recover From Cyber Incident

Data Breach Today

Citrix Bleed May Have Struck Again Operations resumed Monday at four major Australian ports incapacitated by a cybersecurity incident. Dubai-based DP World took systems offline Friday, provoking what government officials called a significant outage frustrating the movement of goods in and out of the country.

More Trending

article thumbnail

Joe Sullivan on What CISOs Need to Know About the Uber Trial

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," former Uber CSO Joe Sullivan discusses the Uber trial and offers guidance to future CISOs. Was the Uber case a data breach or not. Sullivan explained why that making that distinction can be complicated.

article thumbnail

LockBit ransomware gang leaked data stolen from Boeing

Security Affairs

The LockBit ransomware group published data allegedly stolen from the aerospace giant Boeing in a recent attack. The Boeing Company, commonly known as Boeing, is one of the world’s largest aerospace manufacturers and defense contractors. In 2022, Boeing recorded $66.61 billion in sales, the aerospace giant has 156,000 (2022). At the end of October, the Lockbit ransomware group added Boeing to the list of victims on its Tor leak site.

article thumbnail

McLaren Health Care Hack Affected Millions; Lawsuits Pile Up

Data Breach Today

Michigan Healthcare Provider Faces 7 Federal Lawsuits in Alphv/BlackCat Data Theft McLaren Health Care is notifying nearly 2.2 million people of a data breach weeks after ransomware group Alphv/BlackCat claimed to have stolen 6 terabytes of patient records in a recent attack. In the meantime, the number of lawsuits filed against McLaren related to the incident continues to climb.

article thumbnail

European Parliament Adopts Final Version of the Data Act

Hunton Privacy

On November 9, 2023, the European Parliament adopted, by a majority of 481 votes in favor, 31 votes against and 71 abstentions, the final text of the Data Act. As explained in our previous blog , the Data Act aims to “ensure fairness in the digital environment, stimulate a competitive data market, open opportunities for data-driven innovation and make data more accessible for all” and was initially proposed by the European Commission on February 23, 2022.

IoT 118
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ten Ways AI Will Change Democracy

Schneier on Security

Artificial intelligence will change so many aspects of society, largely in ways that we cannot conceive of yet. Democracy, and the systems of governance that surround it, will be no exception. In this short essay, I want to move beyond the “AI-generated disinformation” trope and speculate on some of the ways AI will change how democracy functions—in both large and small ways.

article thumbnail

Defending Financial Services Against Fraud in a Shifting Cyber Landscape

Thales Cloud Protection & Licensing

Defending Financial Services Against Fraud in a Shifting Cyber Landscape sparsh Tue, 11/14/2023 - 05:05 As we approach International Fraud Awareness Week during 12-18 November 2023, taking stock of the evolving threat landscape and the vulnerabilities that financial services organizations face is crucial. The security challenges faced by financial services organizations can never be understated.

article thumbnail

'Hunters International' Cyberattackers Take Over Hive Ransomware

Dark Reading

Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.

article thumbnail

Jamf enhances security for Android devices

Jamf

Jamf Executive Threat Protection, an advanced detection and response security product for iOS, joins Jamf Protect and Jamf Connect in adding new cross-platform Android security functionality.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ducktail Malware Targets the Fashion Industry

Dark Reading

Threat actors distributed an archive containing images of new products by major clothing companies, along with a malicious executable disguised with a PDF icon.

Archiving 108
article thumbnail

Nick Poole to step down as CEO of CILIP

CILIP

Nick Poole to step down as CEO of CILIP CILIP has announced that Nick Poole is to step down as CEO from the end of March 2024, after eight years of transformative leadership through which CILIP has become firmly established as the leading voice for the UK’s library, information and knowledge management profession. Working with members from across the UK and CILIP’s skills-based Board of trustees and dedicated staff, Nick has elevated CILIP’s profile and influence in the UK and internationally.

article thumbnail

SaaS Vendor Risk Assessment in 3 Steps

Dark Reading

SaaS applications are the new supply chain and, practically speaking, SaaS is the modern vendor. Here are three straightforward steps to manage this new vendor risk.

Risk 95
article thumbnail

Transferring skills to a digital landscape

CILIP

Skills in a digital landscape Taking the skills learned as a librarian and applying them to digital projects has provided a space to learn and develop for Denice Penrose, Director, Technically Minded, is an Information Professional and Learning Technologist. Here she explains how she has embraced these digital opportunities and put her knowledge to good use.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Week in Cyber Security and Data Privacy: 6 – 12 November 2023

IT Governance

Welcome to this week’s round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks Mulkay Cardiology Consultants notifies Maine Attorney General of breach Date of breach: 1 September – 5 September 2023 Breached organisation: Mulkay Cardiology Consultants at Holy Name Medical Center, New Jersey I

article thumbnail

A Closer Look at State and Local Government Cybersecurity Priorities

Dark Reading

Complexity impedes the universal and consistent application of security policy, which is an obstacle to adequately securing government environments.

article thumbnail

US Privacy Groups Urge Senate Not to Ram Through NSA Spying Powers

WIRED Threat Level

An effort to reauthorize a controversial US surveillance program by attaching it to a must-pass spending bill has civil liberties advocates calling foul.

Privacy 85
article thumbnail

Security Is a Process, Not a Tool

Dark Reading

Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

HHS Announces First HIPAA Settlement Agreement Involving Ransomware Attack

Hunton Privacy

On October 31, 2023, the Department of Health and Human Services (“HHS”) announced the issuance of a settlement agreement with Doctors’ Management Services (“DMS”), a Massachusetts-based medical management company, related to alleged violations of the Health Insurance Portability and Accountability Act’s (“HIPAA’s”) Privacy and Security Rules (collectively, the “HIPAA Rules”).

article thumbnail

Australian Ports Resume Operation After Crippling Cyber Disruption

Dark Reading

Details of a major cyberattack against Australia's shipping industry remain few and far between, but the economic impact is clear.

96
article thumbnail

Sapient Webinar – How OpenAI will transform Information Governance on November 16th at 2pm EST

IG Guru

Event Details: Date:November 16th Time:2 PM EST Duration:1 Hour Title:“How OpenAI Will Transform IG” (Part 2 of 3) In this installment, we are thrilled to have esteemed industry leaders as our featured speakers: Mark Diamond:President and CEO of Contoural David Gould:Chief Customer Officer of EncompaaS Mark and David will delve into the critical topic of how large […] The post Sapient Webinar – How OpenAI will transform Information Governance on November 16th at 2pm ES

article thumbnail

Azerbaijan Agencies Sign Cyber-Partner Deals

Dark Reading

The country has signed fresh deals to boost cyber intelligence and preparedness capabilities.

88
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

AI ethics and governance: responsibly managing innovation

Collibra

In today’s digital age, artificial intelligence (AI) and data are at the forefront of technological advancements. As professionals in the AI and data sector, we have seen the transformative power of AI and its potential to reshape industries. From healthcare innovations to next-gen social platforms, AI and data are the driving forces behind our modern world.

article thumbnail

State of the EMEA Information Capture & IDP Market 2022/2023

Info Source

KEY TAKEAWAYS The demand for Capture & IDP solutions in the EMEA region grew at a double-digit rate in 2022 and exceeded 2 billion US$ based on end customer investments. The demand for the automation of transactional business processes continued to increase, fueled by the shortage in skilled staff and increasing customer expectations following the pandemic.

article thumbnail

Guardrails for data protection in the age of GenAI

CGI

To mitigate the risks of data exposure, major AI and cloud technology vendors provide responsible use frameworks and the ability to use GenAI tools in secure environments without risking data leakage to the public models. However, in a multi-model AI ecosystem, where AI models are fine-tuned with proprietary data, organizations also need to supplement vendor safeguards with their own.

Cloud 52