Mon.Jun 26, 2023

article thumbnail

Army Alert on Free Smartwatches: Don't Sport These Wearables

Data Breach Today

Malware-Infected Watches Are the New USB Thumb Drive for Social Engineers Are unsolicited smartwatches the new USB thumb drive? The U.S. Army warns that service members are being sent free wearables preloaded with malware designed to steal data from mobile devices as well as intercept voice communications and hijack cameras.

article thumbnail

GUEST ESSAY: Dialing in generative AI to truly relieve and assist cybersecurity professionals

The Last Watchdog

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: A call to regulate facial recognition Although AI has become a powerful weapon, there’s concern it might be too effective compared to human cybersecurity professionals — leading to layoffs and replacements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Irish Government Accused of Trying to Muzzle Privacy Critics

Data Breach Today

New Bill Set to Penalize Disclosure of Data Protection Commission's Reprimands Irish Parliament has proposed changes to a new bill that would make it a criminal offense to disclose privacy reprimands issued by the Data Protection Commission. Civil rights groups are accusing the government of shielding the country's privacy regulator from criticism.

Privacy 228
article thumbnail

News Alert: Flexxon selects a Chief Technology Strategist, signals intent to expand into the US

The Last Watchdog

Singapore, June 26, 2023 – Hardware cybersecurity solutions pioneer Flexxon today announced the appointment of Erik Nilsen, PhD, as its Chief Technology Strategist. An industry veteran with almost three decades of experience, Nilsen will work closely with the Company’s executive management and Research and Development (R&D) team to design and deploy technological roadmaps for its value-driven cybersecurity innovations, with a focus on the US market.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Chinese APT Group Uses New Tradecraft to Live Off the Land

Data Breach Today

Group Targeting Transportation, Construction, Government Agencies, CrowdStrike Says A Chinese state hacker is using novel tradecraft to gain initial access to victim systems, according to CrowdStrike. Targeted organizations include those in the communications, manufacturing, utility, transportation, construction, maritime, government, IT and education sectors.

More Trending

article thumbnail

Monopoly Darknet Market: Suspected Operator Extradited to US

Data Breach Today

FBI: Market Facilitated $18 Million in Illegal Drug Transactions via Cryptocurrency The alleged operator of the darknet narcotics marketplace Monopoly has been extradited to the U.S. to stand trial. The FBI said it identified Milomir Desnica, a 33-year-old dual Croatian and Serbian national, thanks in part to invoices found in a Monopoly database seized by German law enforcement.

Marketing 144
article thumbnail

Trojanized Super Mario Installer Goes After Gamer Data

Dark Reading

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.

Security 107
article thumbnail

Victim Count in Maryland Ransomware Breach Jumps Fivefold

Data Breach Today

Atlantic General Hospital Now Says Attack Compromised PHI of Nearly 137,000 A Berlin, Maryland-based hospital recently told regulators that a ransomware breach discovered in January had compromised the sensitive information of nearly 137,000 patients, about five times the number of people originally estimated as having been affected by the incident.

article thumbnail

Internet Systems Consortium (ISC) fixed three DoS flaw in BIND

Security Affairs

The Internet Systems Consortium (ISC) addressed three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The Internet Systems Consortium (ISC) released security updates to address three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The three issues, tracked as CVE-2023-2828, CVE-2023-2829 and CVE-2023-2911, are remotely exploitable.

IT 98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Jamf Connect and Jamf Protect now available in the AWS Marketplace!

Jamf

Discover Jamf Connect and Jamf Protect in the AWS Marketplace and Jamf's Integration with Amazon EC2, ensuring secure and trusted access to company resources.

Access 98
article thumbnail

Citizen of Croatia charged with running the Monopoly Market drug marketplace

Security Affairs

Milomir Desnica, a citizen of Croatia and Serbia, has been charged with running the Monopoly Market drug darknet marketplace. Milomir Desnica (33), a citizen of Croatia and Serbia, has been extradited from Austria to the United States to face charges of running the darknet drug marketplace Monopoly Market. According to the indictment, in late 2019, the man launched and operated a darknet marketplace to sell illicit narcotics, including opioids, stimulants, psychedelics, and prescription medicati

article thumbnail

3 Steps to Successfully & Ethically Navigate a Data Breach

Dark Reading

In this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.

article thumbnail

Energy company Suncor suffered a cyber attack and its company Petro-Canada gas reported problems at its gas stations in Canada

Security Affairs

The cyber attack suffered by Suncor Energy impacted payment operations at Petro-Canada gas stations in Canada. Suncor Energy is Canada’s leading integrated energy company that provides oil sands development, production and upgrading, offshore oil and gas, and petroleum refining in Canada and the U.S. It owns the Petro-Canada retail and wholesale distribution networks.

IT 92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Twitter Celeb Account Hacker Heads to Jail for 5 Years

Dark Reading

Extradited from Spain, PlugWalkJoe has been sentenced in US court and is now headed to federal prison on a raft of charges related to account hijacking and cyber stalking.

87
article thumbnail

China-linked APT group VANGUARD PANDA uses a new tradecraft in recent attacks

Security Affairs

China-linked APT group VANGUARD PANDA, aka Volt Typhoon, was spotted observing a novel tradecraft to gain initial access to target networks. CrowdStrike researchers observed the China-linked APT group VANGUARD PANDA, aka Volt Typhoon , using a novel tradecraft to gain initial access to target networks. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

Cleanup 88
article thumbnail

SolarWinds Execs Targeted by SEC, CEO Vows to Fight

Dark Reading

CEO says SEC penalties related to the 2020 SolarWinds supply chain attacks are unwarranted and is ready to mount a defense to any legal actions against the company or its employees.

IT 83
article thumbnail

Excel Data Forensics

Schneier on Security

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. (And, yes, an author of a paper on dishonesty is being accused of dishonesty. There’s more evidence.

Paper 81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Cryptocurrency Coinbase Phishing Campaign Uses Social Engineering

KnowBe4

A phishing campaign is impersonating cryptocurrency trading platform Coinbase, Tech.co reports. Crypto trader Jacob Canfield described the campaign in a Twitter thread, stating that the threat actors texted and then called him.

article thumbnail

Remediation Ballet Is a Pas de Deux of Patch and Performance

Dark Reading

AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.

article thumbnail

Small and Medium Businesses Day: Tips on Securing the Backbone of National Economies

Thales Cloud Protection & Licensing

Small and Medium Businesses Day: Tips on Securing the Backbone of National Economies madhav Tue, 06/27/2023 - 05:46 The United Nations General Assembly designated 27 June as Micro-, Small, and Medium-sized Enterprises Day to raise awareness of these businesses’ contribution to national economies. SMBs account for 90% of companies, 60 to 70% of employment, and 50% of GDP globally.

article thumbnail

Cl0p in Your Network? Here's How to Find Out

Dark Reading

Companies targeted by hacking groups with Cl0p ransomware typically have several chances to catch the attack prior to the payload being deployed, experts say.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to responsibly scale business-ready generative AI

IBM Big Data Hub

Imagine the possibilities of providing text-based queries and opening a world of knowledge for improved learning and productivity. Possibilities are growing that include assisting in writing articles, essays or emails; accessing summarized research; generating and brainstorming ideas; dynamic search with personalized recommendations for retail and travel; and explaining complicated topics for education and training.

Retail 69
article thumbnail

How Infrastructure as Code Can Help Minimize Human Error

Dark Reading

Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.

Cloud 73
article thumbnail

The Hybrid Cloud Forecast: Part 2

IBM Big Data Hub

In my previous post , I described how I got started with a podcast series called The Hybrid Cloud Forecast. In each episode, I invite an IBM Fellow as the guest and ask them to share their insights on hybrid cloud and their careers and experiences. Across the 30+ episodes published so far, three themes have emerged that appeared to come up: Research , which I covered in the previous blog Journey to Cloud , which I will cover here Life Stories , which I will leave for the next blog post Theme: Jo

Cloud 60
article thumbnail

It's Open Season on Law Firms for Ransomware & Cyberattacks

Dark Reading

Law firms have an ethical responsibility to protect their clients' sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to shore up cybersecurity.

IT 69
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

IBM Tech Now: June 26, 2023

IBM Big Data Hub

​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 79 On this episode, we’re covering the following topics: The age of quantum utility The general availability of IBM Storage Defender Stay plugged in You can check out the IBM Blog Announcements for a full rundown of all news,

Cloud 60
article thumbnail

European Commission and ASEAN releases Guide to ASEAN Model Contractual Clauses and EU Standard Contractual Clauses

Data Protection Report

Introduction To enable international businesses to comply with cross-border personal data transfers and the relevant laws across the European Union ( EU ) and South-East Asia, on 24 May 2023 the European Commission and the Association of Southeast Asian Nations ( ASEAN ) published a Reference Guide to ASEAN Model Contractual Clauses ( ASEAN MCC s) and EU Standard Contractual Clauses ( EU SCC s) (the Reference Guide ).

article thumbnail

Three ways to drive higher agent productivity

OpenText Information Management

In today’s demanding business environment, contact center agents need to be highly effective and efficient to handle customer interactions. As customer expectations continue to rise, agents must possess a wide range of skills and capabilities to seamlessly handle interactions across various channels. They need to be adept at quickly understanding and adapting to new technologies, … The post Three ways to drive higher agent productivity appeared first on OpenText Blogs.