Tue.Jun 20, 2023

article thumbnail

Info-Stealing Malware Is Harvesting ChatGPT Credentials

Data Breach Today

Security Alert Again Highlights Risk of Sharing Sensitive Information With Chatbots Compromised chatbot credentials are being bought and sold by criminals who frequent underground marketplaces for stolen data, warns cybersecurity firm Group-IB, as the use of ChatGPT and rival AI chatbot offerings and services newly baked into existing products continues to surge across the globe.

article thumbnail

Schneider Power Meter Vulnerability Opens Door to Power Outages

Dark Reading

A severe security vulnerability allows credentials for the power meters to continuously transmit in cleartext, allowing device takeover.

Security 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine Tracks Multiple Spear Phishing Campaigns From Russia

Data Breach Today

Russian GRU Hackers Reach for Government Email Inboxes Cybersecurity defenders in Ukraine revealed multiple Russian spearphishing campaigns including an effort by Kremlin military intelligence to penetrate open source email servers used by government agencies. Russia is intensifying phishing campaigns againt Ukraine.

Phishing 237
article thumbnail

Hackers Will Be Quick to Bypass Gmail's Blue Check Verification System

Dark Reading

It's still important to use other security measures, such as strong passwords and two-factor authentication, to protect your data.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

SEC Delays Final Rules on Breach Disclosure, Board Expertise

Data Breach Today

Delay Comes Amid Criticism of Rule Requiring 4-Day Disclosure of Material Incidents Federal market regulators delayed until October a decision on rules mandating private sector disclosure of cybersecurity incidents and cyber expertise on public boards. The delay comes amid pushback to a mandate to disclose a "material cybersecurity incident" within four business days of discovery.

More Trending

article thumbnail

European Officials Tout Private Sector Collaboration

Data Breach Today

A top European cybercrime official extoled public-private cooperation during a Tuesday conference, saying collaboration is helping the ongoing fight against ransomware. Consulting with cybersecurity specialists over policy is also a must, said an OECD official.

article thumbnail

Reltio is recognized a Leader in The Forrester Wave™: Master Data Management, Q2 2023

Reltio

Every organization must solve daunting data challenges while managing risks, growing profits, and carefully monitoring costs. That’s why the quest for clean, connected, and actionable real-time data has become the linchpin of every successful digital transformation, even in this budget-constrained era. When done well, master data management (MDM) transforms enterprise data from a chronic source of frustration to its most valuable asset.

MDM 98
article thumbnail

Groups Urge HHS to Finalize Reproductive Health Data Changes

Data Breach Today

Some Associations Want Certain Privacy Protections Stretched Even Further Major healthcare industry associations are urging federal regulators to finalize proposed changes to the HIPAA privacy rule that would bolster protections over reproductive healthcare data. In some cases, the groups are suggesting that regulators go even further in stretching privacy safeguards.

Privacy 130
article thumbnail

3CX data exposed, third-party to blame

Security Affairs

A third-party vendor of 3CX, a popular Voice over Internet Protocol (VoIP) comms provider, left an open server and exposed sensitive 3CX data. The issue went under the company’s radar, even though it was recently targeted by North Korean hackers. While victims of cyberattacks should not be ridiculed, there’s a reason that sayings like “fool me once, shame on you; fool me twice, shame on me” resonate so well.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

100K+ Infected Devices Leak ChatGPT Accounts to the Dark Web

Dark Reading

Infostealers are as alive as ever, wantonly sweeping up whatever business data might be of use to cybercriminals, including OpenAI credentials.

110
110
article thumbnail

Critical RCE flaw CVE-2023-20887 in VMware vRealize exploited in the wild

Security Affairs

VMware is warning customers that critical remote code execution vulnerability CVE-2023-20887 is being actively exploited in attacks. VMware is warning customers that a critical remote code execution vulnerability in Aria Operations for Networks (Formerly vRealize Network Insight), tracked as CVE-2023-20887 , is being actively exploited in the wild. “VMware has confirmed that exploitation of CVE-2023-20887 has occurred in the wild,” reads the advisory.

article thumbnail

Re-invent your warranty process with a digital twin

IBM Big Data Hub

According to Warranty Week , claims totaling 46 billion USD were paid by the global automotive Original Equipment Manufacturers in 2021. 54 billion USD in accruals have been made. This means that based on experience, roughly $630 per vehicle sold is held back for upcoming warranty issues. The challenge to avoid or reduce warranty claims and their costs is enormous, as flaws can happen along the complete value chain.

article thumbnail

Zyxel addressed critical flaw CVE-2023-27992 in NAS Devices

Security Affairs

Zyxel released security updates to address a critical vulnerability affecting its network-attached storage (NAS) devices. Zyxel released security updates to address a critical security flaw, tracked as CVE-2023-27992 (CVSS score: 9.8), affecting its network-attached storage (NAS) devices. The vulnerability is a pre-authentication command injection issue that impacts the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmw

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Social Engineering Tactic Uses PDFs in Business Email Compromise Attacks

KnowBe4

Legitimate services can be exploited in social engineering , including business email compromise (BEC) attacks.  Researchers at Check Point describe one current BEC campaign that’s using Soda PDF to send messages encouraging the recipients to call a phone number. Should they make the call, the bad actor on the line seeks to winkle them out of their cash.

91
article thumbnail

New Tsunami botnet targets Linux SSH servers

Security Affairs

Researchers warn of an ongoing Tsunami DDoS botnet campaign targeting inadequately protected Linux SSH servers. Researchers from AhnLab Security Emergency response Center (ASEC) have uncovered an ongoing hacking campaign, aimed at poorly protected Linux SSH servers, to install the Tsunami DDoS botnet (aka Kaiten). The threat actors behind these attacks were also observed installing other malware families, including ShellBot , XMRig CoinMiner, and Log Cleaner.

article thumbnail

Rorschach Ransomware: What You Need to Know

Dark Reading

Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations.

article thumbnail

Tackling Data Sovereignty with DDR

Security Affairs

Data-centric distributed resilience (DDR) offers a compelling approach to addressing data sovereignty in cybersecurity. As much of our modern life relies upon the cloud, the question of data protection is front of mind for many organizations. Those who fail to take a proactive approach to secure their data often learn the hard way how vulnerable – and valuable – that data can be.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fresh Ransomware Gangs Emerge As Market Leaders Decline

Dark Reading

The ransomware landscape is energized with the emergence of smaller groups and new tactics, while established gangs like LockBit see fewer victims.

article thumbnail

Building a unified developer experience for z/OS and cloud applications with the IBM Z and Cloud Modernization Stack

IBM Big Data Hub

Emerging cloud-based technology trends like artificial intelligence (AI) , the Metaverse, the Internet of Things (IoT) and edge computing are evolving at a rapid pace, seemingly adding new capabilities every few months to fundamentally transform how people and organizations interact with them. For enterprises to match scale and speed, it is critical to modernize their core business applications to accelerate innovation.

Cloud 77
article thumbnail

Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months

Dark Reading

A criminal crowd-sourcing campaign has led to swift adoption of the stealer, which can pilfer key computer data, credentials from browsers and chat apps, and cryptocurrency from multiple wallets.

81
article thumbnail

Asset lifecycle management strategy: What’s the best approach for your business?

IBM Big Data Hub

Assets are the lifeblood of any successful business—from software programs tailored to meet an enterprise’s unique needs to a pipeline that stretches across oceans. One of the most important strategic decisions a business leader can make is how these assets are cared for over the course of their lifespans. Whether you’re a small enterprise with only a few assets or a large-scale corporation with offices spanning the globe, asset lifecycle management, or ALM, is a fundamental pa

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

KnowBe4’s 2023 Phishing By Industry Benchmarking Report Reveals that 33.2% of Untrained End Users Will Fail a Phishing Test

KnowBe4

2023 marks the 6th year KnowBe4 has analyzed hundreds of millions of elements of data in order to provide the 2023 Phishing by Industry Benchmark Report.

article thumbnail

eSentire's AI Investigator Chatbot Aids Human Response to Security Incidents

Dark Reading

The tool trained on the company's investigative cybersecurity services data set, and provides natural language responses to client queries, to improve response and remediation efforts.

article thumbnail

The Benefits of a Document Management System for HR

Record Nations

No matter the industry or company, the Human Resources Department is tasked with handling some of the most sensitive documents a company produces. From personnel files, to NDAs, to healthcare information, the list is long and filled with privacy and regulatory concerns. With how effective new document management technology is, the benefits make the system.

Privacy 75
article thumbnail

Jordanian Cyber Leaders Kick Off Cybersecurity Framework Development

Dark Reading

The nation of Jordan begins work on a national cybersecurity framework to align with international practices and better mitigate threats.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Take advantage of automation – If you got it, flaunt it, with eDiscovery!

OpenText Information Management

We are busy professionals who don’t always have time to learn every new feature that comes around. I get it. I really do. I can’t tell you how many times I get lost writing a Word document because I can no longer find that drop down option – you know the one! – all because … The post Take advantage of automation – If you got it, flaunt it, with eDiscovery!

IT 52
article thumbnail

Cymulate Announces Security Analytics for Continuous Threat Exposure Management

Dark Reading

New product provides customers with an attacker's view of their cyber resilience aligned to business context.

article thumbnail

The Deskless Workforce: Understanding the Impact on Business and Empoyees

Jamf

Help your deskless workers succeed with Apple mobile devices by using modern tools that simplify workflows, keep data and devices secure and support employee productivity.