Mon.Jan 15, 2024

article thumbnail

Exclusive: Cloud Vendor Returns Stolen Hospital Data

Data Breach Today

Alliance Had Sued LockBit Gang to Force Cloud Firm to Release Affected Patient Data A cloud services firm has turned over to a New York hospital alliance the patient data stolen in a ransomware attack by LockBit. The hospital group had filed a lawsuit against LockBit as a legal maneuver to force the storage firm to return data the cybercriminals had stashed on the vendor's servers.

Cloud 317
article thumbnail

Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack

Security Affairs

Researchers from Bishop Fox found over 178,000 SonicWall next-generation firewalls (NGFW) publicly exploitable. SonicWall next-generation firewall (NGFW) series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities, tracked as CVE-2022-22274 and CVE-2023-0656 , that could potentially lead to remote code execution. Despite a proof-of-concept exploit for the flaw CVE-2023-0656 was publicly released, the vendor is not aware of attack in the wild exploiting the vulner

IT 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Spot Critical Security Flaw in Bosch Thermostats

Data Breach Today

Bitdefender Finds Vulnerability in Popular IoT Device Thermostats sold across the globe by German multinational engineering company Bosch contained a flaw allowing hackers to cut power to the heating system and override the firmware, warn researchers from cybersecurity firm Bitdefender. Bosch pushed an over-the-air update in October.

IoT 313
article thumbnail

Balada Injector continues to infect thousands of WordPress sites

Security Affairs

Balada Injector malware infected more than 7100 WordPress sites using a vulnerable version of the Popup Builder plugin. In September, Sucuri researchers reported that more than 17,000 WordPress websites had been compromised in September with the Balada Injector. The researchers noticed that the number of Balada Injector infections has doubled compared with August 2023.

CMS 118
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Busted: Cryptojacking; UndeadApes NFT Rug Pull Suspects

Data Breach Today

Ukraine Nabs Suspected Cryptojacker; US Air Force Cyber Analyst Accused of Rug Pull Cryptocurrency schemes continue to generate alleged returns for criminals, as two separate cases highlight. One centers on a Ukrainian accused of earning $2 million via cryptojacking, while another involves a U.S. Air Force cyber analyst charged with perpetrating an UndeadApes NFT rug pull.

297
297

More Trending

article thumbnail

Mississippi Health System Ransomware Attack Affects 253,000

Data Breach Today

Report to State Regulators Indicates Big Jump in Number of Patients Affected A Mississippi health system is notifying nearly 253,000 individuals that their data was potentially compromised in a "malicious and sophisticated ransomware" attack last August that also took IT systems offline. The cybercriminal gang Rhysida had claimed responsibility for the assault.

article thumbnail

Attackers target Apache Hadoop and Flink to deliver cryptominers

Security Affairs

Researchers devised a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners. Cybersecurity researchers from cyber security firm Aqua have uncovered a new attack targeting Apache Hadoop and Flink applications. The attacks exploit misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency cryptocurrency miners.

Big data 113
article thumbnail

DOD Unveils First-Ever National Defense Industrial Strategy

Data Breach Today

Pentagon Warns Failure to Modernize Defense Industrial Base Will Hinder US Globally The Department of Defense released a 60-page strategy that aims to modernize the defense industrial ecosystem and focuses on four long-term strategic priorities: improving supply chain resilience, enhancing workforce readiness, streamlining acquisitions and refining economic deterrence measures.

290
290
article thumbnail

Phemedrone info stealer campaign exploits Windows smartScreen bypass

Security Affairs

Threat actors exploit a recent Windows SmartScreen bypass flaw CVE-2023-36025 to deliver the Phemedrone info stealer. Trend Micro researchers uncovered a malware campaign exploiting the vulnerability CVE-2023-36025 (CVSS score 8.8) to deploy a previously unknown strain of the malware dubbed Phemedrone Stealer. The vulnerability was addressed by Microsoft with the release of Patch Tuesday security updates for November 2023.

Archiving 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Generative AI Concerns Grow in Record Election Year

Data Breach Today

Davos Forum Highlights Worries About AI-Enabled Misinformation Artificial intelligence-enabled voter misinformation campaigns and voter database hacking are some of the largest threats to election security in a year when more than half of the world's populace will take to the ballot box in elections ranging from free to flawed.

article thumbnail

Analysis of Phishing Emails Shows High Likelihood They Were Written By AI

KnowBe4

It’s no longer theoretical; phishing attacks and email scams are leveraging AI-generated content based on testing with anti-AI content solutions.

Phishing 107
article thumbnail

Voice Cloning with Very Short Samples

Schneier on Security

New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds. Research paper.

Paper 98
article thumbnail

Women CyberSecurity Society Targeted by Smishing Campaign

KnowBe4

The Canada-based Women CyberSecurity Society (WCS2) has warned that its leadership, members, and volunteers are being targeted by an SMS phishing (smishing) campaign, IT World Canada reports.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly Update 382

Troy Hunt

Geez it's nice to be back in Oslo! This city has such a special place in my heart for so many reasons, not least of which by virtue of being Charlotte's home town we have so many friends and family here. Add in NDC Security this week with so many more mutual connections, beautiful snowy weather, snowboarding, sledging and even curling, it's just an awesome time.

Access 77
article thumbnail

Three-Quarters of Organizations Have Experienced Phishing Attack in the Last 12 Months

KnowBe4

Regardless of whether your environment remains on-premise, resides in the cloud, or is a hybrid configuration, new data makes it clear that your biggest risk is phishing attacks.

article thumbnail

Unlocking value: Top digital transformation trends

IBM Big Data Hub

While digital transformation has been a trend for some years, emerging technologies have made this movement even more important. Companies are rethinking their business models to become more digital and competitive. They face an ever-increasing cadre of startups and established organizations, all of whom are also trying to keep up to date on digital transformation trends to achieve a competitive edge.

article thumbnail

The Enduring Legacy of Martin Luther King Jr.: A Beacon of Hope and History

Hanzo Learning Center

As we observe Martin Luther King Jr. Day, it's more than a commemoration of a great leader; it's a vital reminder of our ongoing journey toward equality and justice. This reflection explores the importance of this holiday in the context of our collective history and the imperative of civil rights as a foundational element of society.

IT 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How IBM process mining unleashed new efficiencies in BoB-Cardif Life

IBM Big Data Hub

Enterprises now recognize the importance of leveraging innovative technologies to drive digital transformation and achieve cost efficiency. However, a lack of precise top-level planning and a narrow focus on technology without integration with business needs led to significant investments with suboptimal results for many companies. The path of digital transformation is fraught with challenges.

Mining 72
article thumbnail

Jo Cornish to become Interim CEO of CILIP

CILIP

Jo Cornish to become Interim CEO of CILIP Jo Cornish will be stepping into the position of Interim CEO on 1st February 2024, and work with current CEO Nick Poole before he leaves at the end of March. The CILIP Board has requested Jo Cornish, Chief Development Officer at CILIP, to step in as interim Chief Executive, following CILIP's Chief Executive, Nick Poole's announcement that he will leave CILIP at at the end of March for a new role.

article thumbnail

5 key areas for governments to responsibly deploy generative AI

IBM Big Data Hub

In 2024, the ongoing process of digitalization further enhances the efficiency of government programs and the effectiveness of policies, as detailed in a previous white paper. Two critical elements driving this digital transformation are data and artificial intelligence (AI). AI plays a pivotal role in unlocking value from data and gaining deeper insights into the extensive information that governments collect to serve their citizens.

article thumbnail

CILIP welcomes new members to Board of Trustees

CILIP

CILIP welcomes new members to Board of Trustees Portraits from top left: Jonathan Waterfield, Cornelia Andersson, Corin Peacock, Surash Patel, Andrew Praeter, Kate Robinson Five new members will join the CILIP Board on 25 January 2024, with a new Chair and a presidential team reshuffle. Together they bring a unique and diverse skillset from libraries, finance, and brand management, that will help steer the direction of CILIP as we implement our We are CILIP strategy and action plan , during this

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

SymphonyAI Teams Up With Microsoft to Bring AI-Powered Solutions to Retailers

Information Matters

New York – SymphonyAI, a leader in enterprise AI software, announced an expanded collaboration with Microsoft at the National Retail Federation’s annual conference. The partnership aims to provide retailers and Read more The post SymphonyAI Teams Up With Microsoft to Bring AI-Powered Solutions to Retailers appeared first on Information Matters - Where AI Meets Knowledge Management.

Retail 52
article thumbnail

Financial Supervision in a Digital World

Thales Cloud Protection & Licensing

Financial Supervision in a Digital World madhav Tue, 01/16/2024 - 05:44 If you’ve been working in the finance sector over the past few years, you will have noticed some big changes in the world of financial supervision. A new generation of Fintech players, as well as major regulatory changes regarding GDPR, KYC and AML have meant that Financial Supervision continues to evolve in our increasingly digitalised world.