Wed.Jan 10, 2024

article thumbnail

Fidelity National Financial Details LoanCare Breach

Data Breach Today

1.3 Million Customers Notified of Breach; BlackCat Ransomware Group Claimed Credit Financial services giant Fidelity National Financial has confirmed that a November 2023 hack attack compromised personal information pertaining to 1.3 million customers of its LoanCare subsidiary. FNF took multiple systems offline when responding to the attack, disrupting some homebuyers.

article thumbnail

Here’s Some Bitcoin: Oh, and You’ve Been Served!

Krebs on Security

A California man who lost $100,000 in a 2021 SIM-swapping attack is suing the unknown holder of a cryptocurrency wallet that harbors his stolen funds. The case is thought to be first in which a federal court has recognized the use of information included in a bitcoin transaction — such as a link to a civil claim filed in federal court — as reasonably likely to provide notice of the lawsuit to the defendant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HPE to Buy Juniper for $14B to Boost AI and Networking

Data Breach Today

Deal Is 'Major Leap Forward in Our AI and Hybrid Cloud Strategy,' HPE Says Hewlett Packard Enterprise announced a $14 billion acquisition deal with networking equipment maker Juniper Networks and is touting the deal as a way to position the Silicon Valley stalwart for the burgeoning artificial intelligence market. The transaction values Juniper at $40 per share.

article thumbnail

Cisco fixed critical Unity Connection vulnerability CVE-2024-20272

Security Affairs

Cisco addressed a critical Unity Connection security flaw that can be exploited by an unauthenticated attacker to get root privileges. Cisco has addressed a critical flaw, tracked as CVE-2024-20272, in its Unity Connection that can be exploited by a remote, unauthenticated attacker to gain root privileges on vulnerable devices. Cisco Unity Connection is a messaging platform and voicemail system that is part of the Cisco Unified Communications suite of products.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

EU Commission Examines OpenAI, Microsoft Relationship

Data Breach Today

Commission Says Close Company Connections Make Conditions Ripe for Merger Inquiry The European Commission took preliminary steps toward investigating Microsoft's financial interest in ChatGPT maker OpenAI under the trading bloc's antitrust regulation. The Tuesday announcement marks the second instance of official interest in Microsoft's investments in the generative AI firm.

300
300

More Trending

article thumbnail

US Securities and Exchange Commission Probes X Account Hack

Data Breach Today

Value of Bitcoin Rocketed Following Fake Post Claiming Spot Bitcoin ETFs Approved The U.S. Securities and Exchange Commission said it is probing the "compromise" of its X - formerly known as Twitter - social media accounts after a hacker broadcast a fake post claiming the agency had approved spot bitcoin exchange-traded funds, which sent the value of bitcoin rocketing.

Security 299
article thumbnail

[Security Masterminds] Revolutionizing Cybersecurity Training: How AI Is Changing the Game

KnowBe4

Artificial intelligence (AI) in the cybersecurity realm is a nuanced topic. On the one hand, it has the potential to enhance our abilities to detect and prevent cyber threats significantly.

article thumbnail

Cybercriminals Bully Cancer Patients With Swatting Threat

Data Breach Today

Extortion Demands, Lawsuits Pile Up After Fred Hutchinson Cancer Center Hack Cybercriminals are extorting some patients and threatening them with swatting in the wake of a recent cyberattack on a Seattle cancer center. The incident, stemming from a Citrix Bleed exploit, has triggered multiple lawsuits and affected the personal data of at least 1 million people.

article thumbnail

ShinyHunters member sentenced to three years in prison

Security Affairs

A U.S. District Court sentenced ShinyHunters hacker Sebastien Raoult to three years in prison and ordered him to pay more than $5 million in restitution. The member of the ShinyHunters hacker group Sebastien Raoult was sentenced in U.S. District Court in Seattle to three years in prison and more than $5 million in restitution for conspiracy to commit wire fraud and aggravated identity theft.

Sales 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

EU Enhances Cybersecurity Requirements for Agencies

Data Breach Today

Cyber Regulation Requires EU Agencies to Assess Risks and Report Incidents The European Union adopted regulations on cyber hygiene intended to beef up cybersecurity at EU government agencies amid concerns that trading bloc institutions have failed to keep pace with mounting digital threats. European agencies lack "cyber preparedness commensurate with the threat.

article thumbnail

HMG Healthcare disclosed a data breach

Security Affairs

The Healthcare services provider HMG Healthcare has disclosed a data breach that impacted 40 affiliated nursing facilities. In November 2023, the Healthcare services provider HMG Healthcare discovered a data breach that exposed personal health information related to residents and employees at HMG affiliated nursing facilities. The company immediately launched an investigation into the incident and discovered that threat actors in August gained access to a company server and stolen unencrypted fi

article thumbnail

How Our Own Insecurity Fuels Global Threats

Data Breach Today

Professor John Walker on Need for Organizational Introspection, Global Perspective Criminals have built highly successful business models by hacking into a wide range of organizations at will. University professor John Walker warned that the world is witnessing the unintended consequences of our collective inability to secure assets - kinetic threats to global stability.

Security 282
article thumbnail

Facial Scanning by Burger King in Brazil

Schneier on Security

In 2000, I wrote : “If McDonald’s offered three free Big Macs for a DNA sample, there would be lines around the block.” Burger King in Brazil is almost there , offering discounts in exchange for a facial scan. From a marketing video: “At the end of the year, it’s Friday every day, and the hangover kicks in,” a vaguely robotic voice says as images of cheeseburgers glitch in and out over fake computer code. “BK presents Hangover Whopper, a technology that

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Pikabot Malware Spreading Through Phishing Campaigns

KnowBe4

Researchers at Trend Micro warn that a threat actor known as “Water Curupira” is distributing the Pikabot malware loader via widespread phishing campaigns.

Phishing 102
article thumbnail

Navigating the EU-US Data Protection Framework

Thales Cloud Protection & Licensing

Navigating the EU-US Data Protection Framework sparsh Thu, 01/11/2024 - 05:26 On 10 July 2023, the European Commission adopted a new adequacy decision regarding the Data Privacy Framework (“DPF”). This follows the invalidation of the EU-US Privacy Shield, by the Court of Justice of the European Union on 16 July 2020. That decision of adequacy provides in substance that there is an adequate level of protection—comparable to that in the EU—for personal data transferred from the EU to US companies

article thumbnail

Beyond the Scams: Unraveling the Dark Tactics of Real-World Kidnapping Scams and Virtual Extortion

KnowBe4

The world can be a scary and dangerous place. Its unethical scammers have no problem doing almost anything to make a buck, but sometimes, their plots seem to be extra messed up.

IT 90
article thumbnail

Lawmakers Are Out for Blood After a Hack of the SEC’s X Account Causes Bitcoin Chaos

WIRED Threat Level

The US Securities and Exchange Commission is under pressure to explain itself after its X account was compromised, leading to wild swings in the bitcoin market.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

KnowBe4 Named a Leader in the Winter 2024 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

Confidential Containers with Red Hat OpenShift Container Platform and IBM® Secure Execution for Linux

IBM Big Data Hub

Hybrid cloud has become the dominant approach for enterprise cloud strategies , but it comes with complexity and concerns over integration, security and skills. To address these concerns the industry is embracing container runtime environments to abstract away infrastructure. Red Hat OpenShift Container Platform (RH OCP) has emerged as a leading solution for supporting the application development lifecycle, provisioning and managing container images and workloads into a platform for containerize

article thumbnail

FTC Issues Proposed Order Against Data Broker X-Mode for Processing of Sensitive Location Information

Hunton Privacy

On January 9, 2024, in its first settlement with a data broker concerning the collection and sale of sensitive location information, the Federal Trade Commission announced a proposed order against data broker X-Mode Social, Inc. and its successor Outlogic, LLC (“X-Mode”) for unfair and deceptive acts or practices in violation of Section 5 of the FTC Act.

Sales 67
article thumbnail

Six eDiscovery Trends for 2024

eDiscovery Daily

By Rick Clark and Jacob Hesse 2023 was an eventful year in the world of legal technology, with new technology emerging to address both traditional and new challenges legal teams face when collecting, processing, and reviewing data for litigation, investigations, or public access requests. What will 2024 hold, especially in the world of eDiscovery? We’ve captured the top trends for the year based on the conversations we’ve had in recent months with customers and industry experts.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The battle of the personas in the world of enterprise applications—how IBM Hybrid Cloud Mesh and Red Hat Services Interconnect unify them

IBM Big Data Hub

Navigating the intricate realm of modern enterprise applications requires collaboration among diverse personas to effectively manage complexity. This helps with continuous business support through applications automating essential workflows. Traditionally, applications and their hosting infrastructure align with DevOps and CloudOps. However, rising costs due to diverse IT environments led to the emergence of FinOps, focusing on expense monitoring and control.

Cloud 69
article thumbnail

FTC Reminds AI Companies to Uphold Privacy Commitments

Hunton Privacy

On January 9, 2024, the Federal Trade Commission published a blog post reminding artificial intelligence (“AI”) “model-as-a-service” companies to uphold the privacy commitments they make to customers, including promises made in Terms of Service agreements, promotional materials and online marketplaces. “Model-as-a-service” companies develop AI products and make them available to customers via end-user interfaces or application programming interfaces (“APIs”).

Privacy 61
article thumbnail

Ask-AI raises $11M in Series A funding to launch AI-powered enterprise productivity tool

Information Matters

Enterprise artificial intelligence start-up Ask-AI has raised $11 million in a Series A funding round to launch a new “generative AI sidekick” aimed at boosting employee productivity. The round was Read more The post Ask-AI raises $11M in Series A funding to launch AI-powered enterprise productivity tool appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Unlocking the potential of digitalization within the pharmacy market

CGI

Digitalization across the pharmacy industry is evolving quickly. It’s crucial for organizations to consider how to keep pace with up-and-coming pure players and how their IT landscape is facilitating their ability to compete in a modern market.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Aims to Extend Its AI Platform With ‘Copilot’ Key for Windows Laptops

Information Matters

Microsoft is making a substantial wager on artificial intelligence by requiring PC manufacturers to include a dedicated ‘Copilot’ key on Windows laptop keyboards. The key will provide direct access to Read more The post Microsoft Aims to Extend Its AI Platform With ‘Copilot’ Key for Windows Laptops appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Decryptor for Tortilla variant of Babuk ransomware released

Security Affairs

Researchers and the Dutch Police released a decryptor for the Tortilla variant of the Babuk ransomware after the arrest of its operator. Cisco Talos researchers obtained a decryptor for the Babuk Tortilla ransomware variant. The experts were able to extract and share the private decryption key used by the ransomware operators. Talos experts shared the key with Avast that added it to the Avast Babuk decryptor released in 2021.

article thumbnail

New Survey of Hallucination Mitigation Techniques in Large Language Models

Information Matters

A new study just relased provides a detailed and technical overview of some key methods for reducing the risk of hallucinations in Large Language Models (LLMs). As large language models Read more The post New Survey of Hallucination Mitigation Techniques in Large Language Models appeared first on Information Matters - Where AI Meets Knowledge Management.

Risk 52