Wed.Jan 03, 2024

article thumbnail

Ransomware: 2023 Victim Count Appears to Reach Record Levels

Data Breach Today

Healthcare, School District and University Victim Counts Increase, Research Reports The count of known U.S. organizations that fell victim to ransomware last year - whether or not they paid a ransom - surged from 220 to 321, and hospital systems, K-12 school districts and post-secondary schools were especially affected, researchers report.

article thumbnail

Hackers stole more than $81 million worth of crypto assets from Orbit Chain

Security Affairs

Crypto platform Orbit Chain suffered a cyberattack, threat actors have stolen more than $81 million worth of cryptocurrency. Orbit Chain has suffered a security breach that has resulted in the theft of more than $81 million worth of cryptocurrency. Orbit Chain is a multi-asset blockchain platform that connects various blockchains through Inter-Blockchain Communication (IBC).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia Hacked Surveillance Cameras to Target Sites in Kyiv

Data Breach Today

Hackers Used the Cameras to Spy on Ukraine's Air Defenses, Critical Infrastructure The Russian military hacked into surveillance cameras to spy on Ukrainian air defenses and Kyiv's critical infrastructure during the missile and drone strikes on the capital city Tuesday. Ukraine has blocked and dismantled the cameras, and it urged users to stop sharing security camera feeds online.

Military 307
article thumbnail

Don’t trust links with known domains: BMW affected by redirect vulnerability

Security Affairs

Sometimes, you can’t even trust links with your own domain. As the Cybernews research team has discovered, some BMW subdomains were vulnerable to redirect vulnerability, enabling attackers to forge links leading to malicious sites through them. Cybernews researchers have discovered two BMW subdomains that were vulnerable to SAP redirect vulnerability.

Phishing 120
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ransomware Actors Steal Australian Courts' Video Recordings

Data Breach Today

Hackers Lock Up Recordings of Court Hearings to Extort Victoria's Court System The court system of Victoria said it had experienced a serious cybersecurity incident in late 2023 that gave hackers access to video recordings of proceedings at multiple courts, including the Supreme Court and the County Court. The hack took place on Dec. 8 and was discovered two weeks later.

More Trending

article thumbnail

Hack on Defunct Ambulance Firm Affects 912,000 People

Data Breach Today

Archived Data Stolen 2 Months After Sale of Business Affects Patients, Employees A defunct ambulance company is notifying nearly 912,000 patients and employees that their archived records were compromised in an early 2023 data theft hack. The firm previously provided emergency care in the Boston region and administrative services to affiliated transportation companies.

Archiving 280
article thumbnail

CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome and Perl library flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Below is the list of the issues added to the catalog: CVE-2023-7024 – The vulnerability is a Heap buffer overflow issue in WebRTC.

Libraries 111
article thumbnail

Large Language Models: Moving Past the Early Stage

Data Breach Today

AI, machine learning and large language models are not new, but they are coming to fruition with the mass adoption of generative AI. For cybersecurity professionals, these are "exciting times we live in," said Dan Grosu, CTO and CISO at Information Security Media Group.

article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

Welcome to a new year! Following our Christmas break, we’re rounding up two weeks’ worth of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. We’ll also soon publish our 2023 review of publicly disclosed incidents and records known to be breached across the year, as well as our quarterly report, so keep an eye on our blog.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How NOT to Lead: Critical Errors in Cybersecurity Leadership

Data Breach Today

Zero Trust Expert Chase Cunningham on His Latest Book About Leadership Styles Chase Cunningham discusses his new book, "How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders,” which details critical errors that can undermine your cybersecurity leadership and jeopardize your reputation and your company's future.

article thumbnail

IBM’s new watson large speech model brings generative AI to the phone 

IBM Big Data Hub

Most everyone has heard of large language models, or LLMs, since generative AI has entered our daily lexicon through its amazing text and image generating capabilities, and its promise as a revolution in how enterprises handle core business functions. Now, more than ever, the thought of talking to AI through a chat interface or have it perform specific tasks for you, is a tangible reality.

Analytics 105
article thumbnail

SentinelOne to Bolster Cloud Security With PingSafe Buy

Data Breach Today

SentinelOne to Add CNAP Capabilities for 'Best of Breed' Security Platform Endpoint security firm SentinelOne is set to acquire PingSafe for an undisclosed sum of cash and stock. The move will integrate PingSafe's cloud-native application protection platform into SentinelOne's Singularity Platform, creating a unified and advanced cloud security solution.

Cloud 271
article thumbnail

New Research: Phishing Attacks Stole $295 Million In Crypto In 2023

KnowBe4

Researchers at Scam Sniffers have found that phishing attacks stole nearly $295 million worth of cryptocurrency from 324,000 victims in 2023, CryptoSlate reports. The cryptocurrency is stolen by malware delivered via phishing sites.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Airbus Renews Bid to Buy French Atos' Cybersecurity Unit

Data Breach Today

Aerospace Firm's Proposed Acquisition Valued at Up to 1.8 Billion Euros French IT firm Atos has confirmed it is in early-stage talks with Airbus to sell its cybersecurity unit for an estimated 1.8 billion euros, or 1.79 billion. The latest Airbus offer comes just six months after Airbus' unsuccessful bid for a minority stake in Atos Evidian.

article thumbnail

Facial Recognition Systems in the US

Schneier on Security

A helpful summary of which US retail stores are using facial recognition, thinking about using it, or currently not planning on using it. (This, of course, can all change without notice.) Three years ago, I wrote that campaigns to ban facial recognition are too narrow. The problem here is identification, correlation, and then discrimination. There’s no difference whether the identification technology is facial recognition, the MAC address of our phones, gait recognition, license plate reco

Retail 97
article thumbnail

Population Health Management Firm's Breach Affects Millions

Data Breach Today

HealthEC Hack Also Compromised More Than a Dozen US Healthcare Systems A hacking incident at a New Jersey-based vendor of artificial intelligence-enabled population health management services that involved a network server has affected more than a dozen of its healthcare clients across the country and nearly 4.5 million of their patients.

article thumbnail

Lockbit 3.0 Ransomware Disrupts Emergency Care at Multiple German Hospitals

KnowBe4

Hitting three hospitals within a Germany-based hospital network, the extent of the damage in this confirmed ransomware attack remains undetermined but has stopped parts of operations.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Navigating the Future: Strategic Insights on Identity Verification and Digital Banking in 2024

Thales Cloud Protection & Licensing

Navigating the Future: Strategic Insights on Identity Verification and Digital Banking in 2024 madhav Thu, 01/04/2024 - 05:32 As we embark on 2024, the digital landscape is undergoing a seismic shift, especially in identity verification and digital banking. This transformation presents both opportunities and challenges for business executives. Understanding these emerging trends is crucial to navigating this new terrain strategically.

article thumbnail

State of Cybersecurity: Top 10 predictions for 2024

Jamf

In this blog, we predict the top ten global trends that will impact and drive cybersecurity in 2024.

article thumbnail

Australia’s Digital Platform Regulators Release Working Papers on Risks and Harms Posed by Algorithms and Large Language Models

Data Matters

Australia’s Digital Platform Regulators Forum ( DP-REG ) has recently released two working papers relevant to developing AI policy on the global stage: Literature summary: Harms and risks of algorithms ( Algorithms WP ) and Examination of technology: Large language models used in generative artificial intelligence ( LLM WP ) (together, the Working Papers ) to mark the launch of its website.

Paper 88
article thumbnail

Delivering responsible AI in the healthcare and life sciences industry

IBM Big Data Hub

The COVID-19 pandemic revealed disturbing data about health inequity. In 2020, the National Institute for Health (NIH) published a report stating that Black Americans died from COVID-19 at higher rates than White Americans, even though they make up a smaller percentage of the population. According to the NIH, these disparities were due to limited access to care, inadequacies in public policy and a disproportionate burden of comorbidities, including cardiovascular disease, diabetes and lung disea

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CyberheistNews Vol 14 #01 [Heads Up] SMTP Smuggling - How It Easily Circumvents Your Email Defenses

KnowBe4

[Heads Up] SMTP Smuggling - How It Easily Circumvents Your Email Defenses

IT 93
article thumbnail

How AI will change the future of mass surveillance via Cyber News

IG Guru

Check out the article here. The post How AI will change the future of mass surveillance via Cyber News first appeared on IG GURU.

article thumbnail

People-focused digital transformation: Four keys to revolutionizing the health and care experience

CGI

From financial constraints and sustainability management to workforce shortages and capacity issues, the need for the health industry to address mounting pressures and modernize has never been more urgent.