Mon.Feb 26, 2024

article thumbnail

NIST Unveils Second Iteration of Cybersecurity Framework

Data Breach Today

New CSF Adds 'Governance' to Core Functions Cybersecurity guidance for the private sector published by the U.S. National Institute of Standards and Technology in 2014 has received its first major update. The revised Cybersecurity Framework focuses on governance and says cybersecurity threats are a major source of enterprise risk.

article thumbnail

IntelBroker claimed the hack of the Los Angeles International Airport

Security Affairs

The popular hacker IntelBroker announced that it had hacked the Los Angeles International Airport by exploiting a flaw in one of its CRM systems. The website Hackread first reported that the popular hacker IntelBroker had breached one of the CRM systems used by the Los Angeles International Airport. IntelBroker announced it had exploited a vulnerability in the target system, the attack took place this month. “IntelBroker informed Hackread.com that they successfully executed the data breach

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Groups Warn Health Sector of Change Healthcare Cyber Fallout

Data Breach Today

Some Researchers Confident ConnectWise ScreenConnect Flaw Was Exploited in Attack Healthcare industry groups are urging their members to take certain precautionary actions in the wake of the attack last week on Change Healthcare, a unit of Optum. The advisories come as some researchers say the incident appears to involve exploitation of flaws in ConnectWise's ScreenConnect tool.

282
282
article thumbnail

Russia-linked APT29 switched to targeting cloud services

Security Affairs

Russia-linked APT29 threat actors have switched to targeting cloud services, according to a joint alert issued by the Five Eyes cybersecurity agencies. A joint advisory issued by cybersecurity agencies of Five Eyes (US, UK, Australia, Canada and New Zealand) warns that Russia-linked APT29 threat actors (aka SVR group , Cozy Bear , Nobelium , BlueBravo , Midnight Blizzard , and The Dukes ) have switched to targeting cloud services.

Cloud 116
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ransomware Operation LockBit Relaunches Dark Web Leak Site

Data Breach Today

After Operation Cronos, LockBit Leader LockBitSupp's Vows to Continue Hacking Russian-speaking ransomware operation LockBit reestablished a dark web leak site Saturday afternoon, posting a lengthy screed apparently authored by its leader, who vowed not to retreat from the criminal underground world. The FBI had no comment.

More Trending

article thumbnail

North Korean Group Seen Snooping on Russian Foreign Ministry

Data Breach Today

Espionage Groups Deploy Info Stealer to Monitor Russia's Diplomatic Moves North Korean espionage group TA406, aka the Konni Group, deployed information-stealing malware on a Russian government-owned software to spy on the country's foreign ministry officials. This is the latest attack in a North Korean campaign that targets Russian diplomatic activities.

article thumbnail

Apple Announces Post-Quantum Encryption Algorithms for iMessage

Schneier on Security

Apple announced PQ3 , its post-quantum encryption standard based on the Kyber secure key-encapsulation protocol, one of the post-quantum algorithms selected by NIST in 2022. There’s a lot of detail in the Apple blog post , and more in Douglas Stabila’s security analysis. I am of two minds about this. On the one hand, it’s probably premature to switch to any particular post-quantum algorithms.

article thumbnail

SSH Exec Rami Raulas Named Interim CEO in Finnish Shakeup

Data Breach Today

Teemu Tunkelo Left SSH Abruptly After License Sales Slump and Stock Price Nosedive SSH Communications Security CEO Teemu Tunkelo left the Finnish cybersecurity vendor abruptly Monday after low license sales in late 2023 slowed the company's growth. No reason was given for Tunkelo's departure, which stems from an agreement between the CEO and SSH and will take effect immediately.

Sales 269
article thumbnail

A cyber attack hit Thyssenkrupp Automotive Body Solutions business unit

Security Affairs

ThyssenKrupp disclosed a security breach that impacted its automotive division last week, in response to the attack the company shut down IT systems. Steel giant ThyssenKrupp disclosed a security breach that impacted its Automotive division last week. The company shut down IT systems in response to the attack. The news of the attack was reported by the Saarbrücker Zeitung.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian Threat Actor APT29 Pivots to the Cloud for Espionage

Data Breach Today

Five Eyes Cyber Agencies Say Kremlin Hackers Are Following Victims to the Cloud The Russian intelligence hacking group known as APT29 or Cozy Bear is responding to the corporate migration to the cloud with matching hacking techniques, says an alert from international cyber agencies. Threat intelligence firms warn that APT29 has amplified its global cyberespionage operations.

Cloud 266
article thumbnail

VulnRecap 2/26/24 – VMWare, Apple, ScreenConnect Face Risks

eSecurity Planet

Critical vulnerabilities have been discovered across multiple systems, including Microsoft Exchange Servers, the Bricks Builder Theme for WordPress, VMware, ScreenConnect, Joomla, and Apple Shortcuts. Urgent patching and prompt updates can protect systems from unauthorized access, data breaches, and potential exploitation by threat actors. Organizations must prioritize implementing effective security measures and conducting frequent audits.

Risk 106
article thumbnail

Privacy Watchdog Cracks Down on Biometric Employee Tracking

Data Breach Today

Leisure Center Operators Ordered to Stop Using Facial and Fingerprint Recognition Britain's privacy watchdog ordered Serco Leisure, which operates nearly 40 leisure facilities, to cease using facial recognition and fingerprint scanning for clocking employees in and out, saying the company failed to demonstrate such technology was "necessary or proportionate.

Privacy 258
article thumbnail

How IBM is helping accelerate AI adoption and application centric connectivity

IBM Big Data Hub

This week, as thousands of network operators, technology vendors, and mobile device providers from all over the world converge on Barcelona for Mobile World Congress , it’s the perfect time to discuss how IBM® is shaping the future of network operations and telecommunications. Outside the glitz of new phones, connected cars and 5G with everything, there are some real challenges the industry must address.

Cloud 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Swiss Government Identified 10,000 Phishing Websites Impersonating 260 Brands

KnowBe4

Attacks targeting Swiss residents increased 10% last year, according to newly-released data that shows a growth in not just phishing attacks , but brand impersonation at purely a national level.

article thumbnail

What Is Cross-Site Scripting (XSS)? Types, Risks & Prevention

eSecurity Planet

Cross-site scripting attacks are web application and web server exploits that occur because of a vulnerability in the server or application code. They’re particularly dangerous because it’s difficult for security or development teams to see an XSS vulnerability, and it’s also hard to see the effects of an attack until the ensuing breach is well underway.

Risk 91
article thumbnail

I regularly shared photos of my son on social media – until alarm bells started ringing | Hannah Nwoko

The Guardian Data Protection

Like millions of doting parents, I wanted to keep others abreast of my child’s milestones. But the ‘likes’ weren’t worth the risks Social media is a strange place. On the one hand it can be a relentlessly toxic, dark cluster of ill intent; on the other, it can act as the glue that binds us to new communities, friends of the past and family we’ve almost forgotten.

Risk 95
article thumbnail

How to improve network resilience with NS1 Connect Filter Chains

IBM Big Data Hub

Network service outages happen. It’s not a matter of if but when. Cloud platforms and content delivery networks (CDNs) with 100% uptime SLAs aren’t immune. They experience outages just like everything else. The question is: what do you do when one of your network services goes down? Will the lack of redundant services knock you offline? Or will you failover to another provider, maintaining a seamless user experience?

Cloud 84
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from February 2024

KnowBe4

Check out the February updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

New York Strengthens Data Retention & Disposal Requirements via Corporate Compliance Insights

IG Guru

Check out the article here. The post New York Strengthens Data Retention & Disposal Requirements via Corporate Compliance Insights first appeared on IG GURU.

article thumbnail

Ethical considerations of AI in newsroom workflows

CGI

From research to verification of information, production, and distribution, and from accounting to workflow scheduling, AI and intelligent automation currently support routine tasks along the journalistic value chain.

52
article thumbnail

Upcoming RMS Coffee Chat: Records Managment and Institutional Change

The Schedule

Join us Monday, March 11th, 2024, at 3 pm EST, for “Records Management and Institutional Change”. Sophia McGuire, Records Management Analyst, City of Gahanna, Jennifer Motszko, Head of Archives at the University of Wisconsin-Whitewater, and Autumn Oakey, Library Assistant at the University of Wisconsin-Whitewater will share their experiences navigating institutional change.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

6 benefits of data lineage for financial services

IBM Big Data Hub

The financial services industry has been in the process of modernizing its data governance for more than a decade. But as we inch closer to global economic downturn, the need for top-notch governance has become increasingly urgent. How can banks, credit unions, and financial advisors keep up with demanding regulations while battling restricted budgets and higher employee turnover?

article thumbnail

Identity first: Best Practices of B2B IAM

Thales Cloud Protection & Licensing

Identity first: Best Practices of B2B IAM madhav Tue, 02/27/2024 - 05:18 In today’s evolving landscape of distributed workforces, the once well-defined boundaries of the corporate network have blurred into obscurity. The rise of remote work has shattered the traditional notion of a fortified perimeter, leaving organizations grappling with the challenge of securing identities rather than relying on sentinels at the gate to keep undesirable elements out.

B2B 83
article thumbnail

How Meta’s Llama 3 will impact the future of AI

IBM Big Data Hub

In January of 2024, Meta CEO Mark Zuckerberg announced in an Instagram video that Meta AI had recently begun training Llama 3. This latest generation of the LLaMa family of large language models (LLMs) follows the Llama 1 models (originally stylized as “LLaMA”) released in February 2023 and Llama 2 models released in July. Though specific details (like model sizes or multimodal capabilities) have not yet been announced, Zuckerberg indicated Meta’s intent to continue to open sou

article thumbnail

How a Right-Wing Controversy Could Sabotage US Election Security

WIRED Threat Level

Republicans who run elections are split over whether to keep working with the Cybersecurity and Infrastructure Security Agency to fight hackers, online falsehoods, and polling-place threats.

Security 104
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.