Mon.Feb 05, 2024

article thumbnail

Fraudsters Deepfake Entire Meeting, Swindle $25.5M

Data Breach Today

Hong Kong Company Scammed After Criminals Used Deepfake Technology to Imitate CFO Fraudsters used deepfake technology to trick an employee at a Hong Kong-based multinational company to transfer $25.57 million to their bank accounts. Hong Kong Police said Sunday that the fraudsters had created deepfake likenesses of top company executives in a video conference to fool the worker.

332
332
article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

Even in the cloud era, Microsoft Exchange Server remains a staple business communications tool across the globe. Related: The need for robust data recovery policies. One critical issue faced by organizations that rely on Exchange Server is the risk of a corrupt Exchange Server database cropping up. Fortunately, effective tools and wise best practices can help mitigate this this exposure enabling companies to indefinitely leverage Exchange Server as a productive, resilient and secure communicatio

Risk 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Cybersecurity Performance Measures Realistic?

Data Breach Today

Government Watchdog Urges ONCD to Develop Outcome-Oriented Performance Measures A government watchdog urged the White House to establish metrics that would help determine the effectiveness of federal cybersecurity initiatives, but it's a lot easier to recommend developing outcome-oriented performance measures for cybersecurity than it is to actually develop them.

article thumbnail

Crooks stole $25.5 million from a multinational firm using a ‘deepfake’ video call

Security Affairs

Scammers stole HK$200 million (roughly $25,5 million) from a multi-national company using a deepfake conf call to trick an employee into transferring the funds. Scammers successfully stole HK$200 million (approximately $25.5 million) from a multinational company in Hong Kong by employing a deepfake video call to deceive an employee into transferring the funds.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Systems, Phones Still Offline at Chicago Children's Hospital

Data Breach Today

Cyberattacks on Pediatric Facilities Are Rare But Considered Especially Egregious Network systems - including phones, email, electronic health records and patient portals - remain offline at a Chicago children's hospital and research center nearly a week after it was hit by a cyberattack. Such incidents targeting entities that cater to kids are especially egregious, experts say.

IT 275

More Trending

article thumbnail

AnyDesk Confirms Systems Hacked, Triggers Password Reset

Data Breach Today

Company Says Problem Remediated, All Security-Related Certificates Revoked Remote desktop application provider AnyDesk acknowledged hackers recently gained unauthorized access to the company's production systems in a cyberattack. The firm said it revoked all security-related certificates as a precaution and is rolling out a new code-signing certificate.

Passwords 261
article thumbnail

HPE is investigating claims of a new security breach

Security Affairs

Hewlett Packard Enterprise (HPE) is investigating a new data breach after a threat actor claimed to have stolen data on a hacking forum. Hewlett Packard Enterprise (HPE) is investigating a new data breach, following the discovery of an offer on a hacking forum where a threat actor claimed to be selling the allegedly stolen data. According to Bleeping Computer , the company has yet to find any evidence suggesting a new security breach.

Security 112
article thumbnail

Wiz Snags Zscaler COO Dali Rajic

Data Breach Today

Startup Company Vows It Will Earn $1 Billion in Annual Recurring Revenue Fast-growing cloud cybersecurity startup Wiz snagged a former Zscaler executive as its new chief operating officer and president as the company prepares to go public. Wiz announced Monday that Dali Rajic has jumped to the New York-headquartered company.

Cloud 253
article thumbnail

Global Data Breaches and Cyber Attacks in 2024

IT Governance

29,530,829,012 known records breached so far in 4,645 publicly disclosed incidents Welcome to our 2024 data breaches and cyber attacks page, where you can find an overview of the year’s top security incidents, the most breached sectors of 2024, month-on-month trends, links to our monthly reports, and much more. Use the links in the ‘On this page’ section below to navigate.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK Government Warned of AI Regulatory Capture by Big Tech

Data Breach Today

UK Parliament Urges Competition Regulator to Keep LLMs Under 'Close Review' A U.K. parliamentary committee scrutinizing the artificial intelligence market urged the British competition regulator to closely monitor developers of foundation models and warned against regulatory capture. Already, the market is trending toward consolidation, said a House of Lords committee.

article thumbnail

Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

KnowBe4

Check out this one line for a moment.“ duped into attending a video call with what he thought were several other members of staff, but all of whom were in fact deepfake recreations.

108
108
article thumbnail

Mastercard Deploys AI to Power CX and Fight Fraud

Data Breach Today

Rohit Chauhan and Nitendra Rajput of Mastercard on Using AI Beyond Convention Mastercard, a global leader in payments, is expanding its use of artificial intelligence beyond traditional applications. The company has deployed AI to prevent fraud and enhance customer experience, efficiently handling a 20% increase in inquiries and navigating through extensive manuals.

article thumbnail

Experts warn of a surge of attacks targeting Ivanti SSRF flaw 

Security Affairs

The Ivanti SSRF vulnerability tracked as CVE-2024-21893 is actively exploited in attacks in the wild by multiple threat actors. The Ivanti Server-Side Request Forgery (SSRF) vulnerability, identified as CVE-2024-21893 , is currently being actively exploited in real-world attacks by various threat actors. Last week Ivanti warned of two new high-severity vulnerabilities in its Connect Secure and Policy Secure solutions respectively tracked as CVE-2024-21888 (CVSS score: 8.8) and CVE-2024-21893 (

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

EquiLend Continues System Restoration Post-Ransomware Attack

Data Breach Today

Back Online: NGT Platform, Which Handles Daily Transactions Worth $100 Billion Financial giant EquiLend Holdings said it's brought back online multiple systems, including its NGT platform that handles securities lending transactions worth $2.4 trillion every month, following an outage triggered by ransomware-wielding attackers gaining unauthorized access to its systems.

article thumbnail

How to hack the Airbus NAVBLUE Flysmart+ Manager

Security Affairs

Airbus Navblue Flysmart+ Manager allowed attackers to tamper with the engine performance calculations and intercept data. Flysmart+ is a suite of apps for pilot EFBs, helping deliver efficient and safe departure and arrival of flights. Researchers from Pen Test Partners discovered a vulnerability in Navblue Flysmart+ Manager that can be exploited to tamper with the engine performance calculations.

article thumbnail

Deepfake Fraud

Schneier on Security

A deepfake video conference call—with everyone else on the call a fake— fooled a finance worker into sending $25M to the criminals’ account.

108
108
article thumbnail

Fake “I Can’t Believe He’s Gone” Posts Seek to Steal Facebook Credentials

KnowBe4

This new scam relies on a victims sense of curiosity, a bit of brand impersonation, and the hopes of a new login to compromise Facebook credentials that.

Security 106
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 ways generative AI can optimize asset management

IBM Big Data Hub

Every asset manager, regardless of the organization’s size, faces similar mandates: streamline maintenance planning, enhance asset or equipment reliability and optimize workflows to improve quality and productivity. In a recent IBM Institute for Business Value study of chief supply chain officers, nearly half of the respondents stated that they have adopted new technologies in response to challenges.

article thumbnail

New Phishing-As-A-Service Kit with Ability to Bypass MFA Targets Microsoft 365 Accounts

KnowBe4

A phishing-as-a-service platform called “Greatness” is facilitating phishing attacks against Microsoft 365 accounts, according to researchers at Sucuri.

article thumbnail

Mastering identity security: A primer on FICAM best practices

IBM Big Data Hub

For federal and state governments and agencies, identity is the crux of a robust security implementation. Numerous individuals disclose confidential, personal data to commercial and public entities daily, necessitating that government institutions uphold stringent security measures to protect their assets. This need for robust security underscored by Executive Order 14028 , published in May 2021, calls for enhancing the nation’s cybersecurity posture.

article thumbnail

VulnRecap 2/5/24 – Azure, Apple, Ivanti, & Mastodon at Risk

eSecurity Planet

Critical multi-platform vulnerabilities impacting diverse systems dominated the past week’s cybersecurity headlines. Juniper Networks released updates for the high-severity flaws in SRX and EX Series. A coding vulnerability in Microsoft’s Azure Pipelines affected 70,000 open-source projects. Linux distros faced a heap-based buffer overflow issue.

Risk 89
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

2054, Part I: Death of a President

WIRED Threat Level

“They had, quite swiftly, begun an algorithmic scrub of any narrative of the president suffering a health emergency, burying those stories.” An exclusive excerpt from 2054: A Novel.

article thumbnail

The future of work: How Vision Pro is leading the charge

Jamf

Vision Pro unlocks the exciting world of spatial computing. Is your organization ready?

111
111
article thumbnail

Common cloud migration challenges and how to manage them

IBM Big Data Hub

Cloud computing continues to grow in popularity, and its scalability, functionality, cost-effectiveness and other potential benefits have helped transform traditional business models and update legacy systems, creating opportunities for various organizations. A cloud migration, however, is a huge undertaking that requires thorough planning and execution of a comprehensive strategy to successfully achieve business goals.

Cloud 70
article thumbnail

Is the future of contact centers bot or human?

CGI

Human-like responses from OpenAI’s ChatGPT and other generative AI large language models (LLMs) have employees and politicians concerned about impending waves of job losses. Meanwhile, contact centers have trouble recruiting and retaining enough agents to keep up with rising consumer demand. Is the stage set for a showdown between humankind and machines?

59
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How is DNSSEC different from encryption? 

IBM Big Data Hub

It’s a question we often hear: “Isn’t DNSSEC the same as encrypted DNS?” Not really. While DNSSEC protects networks against man-in-the-middle attacks, it does so through public key cryptography, which is different from encryption. In other words, DNSSEC provides a form of authentication, but not a form of confidentiality. How is public key cryptography different from encryption?

article thumbnail

Webinar: Shantanoo A. Govilkar, from DivIHN, will discuss recent trends in Information Governance & Risk Management via ARMA Chicago on February 13, 2024 at 12pm Central

IG Guru

Join your ARMA Chicago colleagues from the privacy of your home or from the convenience of your office! This is a one-hour live video conference with an expert presenter and a chance to ask questions and connect with your fellow ARMA members. Topic: Shantanoo A. Govilkar, from DivIHN, will discuss recent trends in Information Governance & […] The post Webinar: Shantanoo A.

article thumbnail

Navigating the digital wave: Understanding DORA and the role of confidential computing

IBM Big Data Hub

The Digital Operational Resilience Act (DORA) marks a significant milestone in the European Union’s (EU) efforts to bolster the operational resilience of the financial sector in the digital age. Envisioned to comprehensively address information and communications technology (ICT) risk management in financial services, DORA aims to harmonize existing regulations across EU member states.