Tue.Feb 13, 2024

article thumbnail

Hack at Software Services Firm Affects 57,000 BoA Customers

Data Breach Today

InfoSys McCamish Says Incident Involved BoA's Deferred Compensation Plan Customers Bank of America is notifying more than 57,000 customers that their information, including Social Security numbers, was potentially compromised in a hacking incident last November at Atlanta, Georgia-based insurance software firm InfoSys McCamish. BoA says none of its systems were affected.

Insurance 313
article thumbnail

Fat Patch Tuesday, February 2024 Edition

Krebs on Security

Microsoft Corp. today pushed software updates to plug more than 70 security holes in its Windows operating systems and related products, including two zero-day vulnerabilities that are already being exploited in active attacks. Top of the heap on this Fat Patch Tuesday is CVE-2024-21412 , a “security feature bypass” in the way Windows handles Internet Shortcut Files that Microsoft says is being targeted in active exploits.

Phishing 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative AI and the Brave New World of Work

Data Breach Today

CyberEd.io's Steve King on How Gen AI Will Disrupt and Transform Careers Generative AI is both the villain in the tale of job displacement and the hero ushering in a new era of enhanced job roles and opportunities. Steve King of CyberEd.io discusses how gen AI will make your career an uncertain journey that demands lifelong learning, skepticism, humor and adaptability.

304
304
article thumbnail

Workshops Work at the AIIM Conference 2024

AIIM

Why do workshops work so well in adult learning? Read on to see how we are incorporating workshops at AIIM24 and how you can use workshops as a powerful tool for adult learning.

174
174
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Europe's AI Act Poised To Become Law After Committees Vote

Data Breach Today

ACt Will Require Developers to Allows A Copyright Holder Opt Out Two key European Parliament committees accepted a political compromise set to govern how trading bloc countries develop and deploy artificial intelligence. The regulation is set to become the globe's first comprehensive AI regulation.

More Trending

article thumbnail

Responsible Use of Artificial Intelligence

Data Breach Today

A Practical Guide for Cybersecurity Professionals Beyond the hype, AI is transforming cybersecurity by automating threat detection, streamlining incident response and predicting attacker behaviors. Organizations are increasingly deploying AI to protect their data, stay ahead of cybercriminals and build more resilient security systems.

article thumbnail

Generative AI use cases for the enterprise

IBM Big Data Hub

Remember how cool it felt when you first held a smartphone in your hand? The compact design and touch-based interactivity seemed like a leap into the future. Before long, smartphones became a way of life for organizations worldwide because of all they offer for business productivity and communication. Generative AI ( artificial intelligence ) promises a similar leap in productivity and the emergence of new modes of working and creating.

article thumbnail

Apparent Pig-Butchering Crypto Scam Took Down a US Bank

Data Breach Today

Kansas Bank Forced to Close After CEO Allegedly Embezzled Nearly $50 Million A watchdog report reveals how Heartland Tri-State Bank CEO Shan Hanes allegedly defrauded a local church and investment club in Kansas out of $47.1 million through a "pig-butchering" cryptocurrency scam that ultimately caused the bank to fail in 2023.

269
269
article thumbnail

A ransomware attack took 100 Romanian hospitals down

Security Affairs

Authorities in Romania reported that at least 100 hospitals went offline after a ransomware attack hit the Hipocrate platform. Authorities in Romania confirmed that a ransomware attack that targeted the Hipocrate Information System (HIS) has disrupted operations for at least 100 hospitals. Hipocrate Information System (HIS) is a software suite designed to manage the medical and administrative activities of hospitals and other healthcare institutions.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

More Signs of a Qakbot Resurgence

Data Breach Today

Qakbot Wouldn't Be the First Trojan to Come Back After a Takedown Takedowns aren't always forever in cyberspace. Months after a U.S. law enforcement operation dismantled the notorious Qakbot botnet, security researchers said signs are pointing to a resurgence. Someone with access to the Qakbot - also known as Qbot - source code is experimenting with new builds.

Access 268
article thumbnail

Bank of America customer data compromised after a third-party services provider data breach

Security Affairs

Bank of America revealed that the personal information of some customers was stolen in a data breach affecting a third-party services provider. Bank of America began notifying some customers following a data breach at the third-party services provider Infosys McCamish System (IMS). The bank has sent notification letters to 57,000 customers, informing them that their personal information has been compromised Infosys disclosed the security breach on November 3, 2023, in a filing with SEC the compa

article thumbnail

Canadian Flipper Zero Planned Crackdown Provokes Backlash

Data Breach Today

A Rash of Canadian Car Thefts Won't Be Solved by Banning Pen-Testing Tools A Canadian effort amid a surge of car thefts to ban pen-testing devices such as the Flipper Zero that grab wireless signals has provoked backlash among security researchers and advocates, who accused Ottawa of finding a scapegoat for bad auto industry security practices.

Security 254
article thumbnail

Ransomfeed – Third Quarter Report 2023 is out!

Security Affairs

Maintainers behind the Ransomfeed platform have released Q3 Report 2023 including activities of 185 criminal groups operating worldwide. A comprehensive report delving into the intricate landscape of ransomware threats during the last four months of 2023 is out, with a meticulous focus on the monitoring activities conducted by the OSINT Ransomfeed platform ( www.ransomfeed.it ).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

They're Back? HHS OCR Is Eyeing the Return of HIPAA Audits

Data Breach Today

The Agency Is Surveying Previous Auditees to Reassess the Dormant Program As U.S. federal regulators fine-tune a strategy to push the healthcare sector into a stronger cybersecurity posture, they appear to be dusting off a HIPAA compliance audit program that's been dormant for the last seven years. Is a new round of HIPAA audits for regulated entities on the horizon?

article thumbnail

Significant amendments to the Singapore Cyber Security Act set to have implications for the cybersecurity landscape

Data Protection Report

On 15 December 2023, the Cyber Security Agency of Singapore ( CSA ) released the draft Cybersecurity (Amendment) Bill ( Draft Bill ), which seeks to amend the Cyber Security Act 2018 ( CS Act ), for public consultation. The public consultation concluded on 15 January 2024. The consultation paper and the Draft Bill can be accessed here. The proposed changes are significant and will have implications for the cybersecurity landscape in Singapore which we consider below.

article thumbnail

What Is Packet Filtering? Definition, Advantages & How It Works

eSecurity Planet

Packet filtering is a firewall feature that allows or drops data packets based on simple, pre-defined rules regarding IP addresses, ports, or protocols. Once a type of firewall, packet filtering now provides a fundamental feature of nearly all firewalls and some network equipment (routers, smart switches, etc.). The feature involves key principles, as well as pros and cons, and there are four packet filtering types to be aware of, which determine its best use cases.

IT 98
article thumbnail

The European Commission Draft GDPR Procedural Regulation and European Parliament Draft LIBE Report: On the Road to Harmony?

Hunton Privacy

On February 9, 2024, Hunton Andrews Kurth attorneys, David Dumont and Laura Léonard, and Centre for Information Policy Leadership Director of Privacy and Data Policy, Natascha Gerlach, published an op-ed discussing the implications of the European Commission’s proposal for a Regulation laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679 (the “Draft GDPR Procedural Regulation”) and the draft report on the Draft GDPR Procedural Regulation by the European

GDPR 85
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

4 strategic sourcing use cases to strengthen your supply chain

IBM Big Data Hub

In this age of supply chain disruptions that hold the power to upend entire industries, strength and resilience across the entire value chain is no longer a nice-to-have—it’s a survival tactic. For sourcing teams, that means pivoting their mindset around selecting suppliers from a tactical, lowest-cost-above-all approach to a strategic one.

article thumbnail

A Hacker’s Mind is Out in Paperback

Schneier on Security

The paperback version of A Hacker’s Mind has just been published. It’s the same book, only a cheaper format. But—and this is the real reason I am posting this—Amazon has significantly discounted the hardcover to $15 to get rid of its stock. This is much cheaper than I am selling it for, and cheaper even than the paperback. So if you’ve been waiting for a price drop, this is your chance.

IT 70
article thumbnail

Application performance optimization: Elevate performance and reduce costs

IBM Big Data Hub

Application performance is not just a simple concern for most organizations; it’s a critical factor in their business’s success. Driving optimal application performance while minimizing costs has become paramount as organizations strive for positive user experiences. These experiences can make or break a business, that’s why prioritizing high performance among applications is non-negotiable.

Cloud 70
article thumbnail

Collaboration tools are critical for digital workplace success

OpenText Information Management

The adage ‘two heads are better than one’ is just about always true. Enabling people to work well together is just smart business. Companies continue to put more productivity applications and collaboration tools at employees’ fingertips and to embrace flexible, modern work environments to support better ways of working. IDC’s 2023 State of Content Services … The post Collaboration tools are critical for digital workplace success appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CyberheistNews Vol 14 #07 Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

KnowBe4

Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

86
article thumbnail

An in-depth review of the Kandji platform from Rocketman Tech

Jamf

Rocketman Tech helps organizations succeed with Jamf, offering consulting and tools to simplify the management process. In this blog, Chris Schasse, — Founder, Owner and Lead Engineer at Rocketman Tech — recaps his in-depth comparison of Kandji and Jamf Pro.

52
article thumbnail

What Is PIAM? Part 3: How PIAM Is Revolutionizing Compliance

HID Global

In part 3 of our physical identity access management (PIAM) series, discover how compliance plays a critical role in a modern PIAM solution.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

On January 18, 2024, the U.S. Federal Trade Commission announced a complaint and proposed consent order with InMarket Media, LLC, a digital marketing platform and data aggregator. Less than two weeks later, on February 1, the FTC announced a complaint and proposed consent order with software licensor and data provider Blackbaud, Inc. In both cases, the FTC’s complaint alleged that the companies retained personal data for longer than was necessary, and that conduct violated Section 5 of the Fed

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ARMA Mile High Chapter – Denver Spring Seminar on April 16, 2024

IG Guru

Check out the post on LinkedIn here. The post ARMA Mile High Chapter – Denver Spring Seminar on April 16, 2024 first appeared on IG GURU.

article thumbnail

Jamf Safe Internet Adds Custom DNS Support

Jamf

Dive into the Jamf Safe Internet's latest features and workflows. Discover Custom DNS and Internal Services support.

52
article thumbnail

Spotlight: Valentine’s Day Greetings and Dances

Unwritten Record

Happy Valentine’s Day from the National Archives Special Media Division! Did you know that the oldest known printed Valentine’s Day card was published in January 1797? The verse printed on the card reads: “Since on this ever Happy day, All Nature’s full of Love and Play Yet harmless still if my design, ‘Tis but to be your Valentine.” The 1797 card , in addition to over six hundred other Valentine’s cards , are held by the York Museums Trust.