Fri.Jul 14, 2023

article thumbnail

Healthcare Summit: Securing Life Sciences, Genomic Data

Data Breach Today

ISMG Summit Speaker Phil Englert of H-ISAC on Emerging Security Healthcare Issues Life sciences firms, including pharmaceutical companies, are facing growing challenges in securing complex sets of sensitive data, including genomic information, said H-ISAC's Phil Englert, one of many high-profile speakers who will discuss industry trends at ISMG's upcoming Healthcare Summit 2023.

article thumbnail

Cybersecurity and Environmental Fraud Top Priorities of U.S. Commodity Futures Trading Commission Division of Enforcement

Data Matters

Just before Americans began their Fourth of July holiday, the U.S. Commodity Futures Trading Commission (CFTC) Division of Enforcement Director announced that the division has established two key task forces: the Cybersecurity and Emerging Technologies and the Environmental Fraud Task Force. 1 Both task forces will be staffed with attorneys and investigators across the Division of Enforcement with the goal of serving as subject matter experts and prosecuting cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Belarus Hackers Targeting Poland, Ukraine With RAT, Phishing

Data Breach Today

State-Linked Spear-Phishing Campaign Targeting Government, Military Personnel Belarus state-linked hackers are targeting government and military entities in both Ukraine and Poland with spear-phishing campaigns that deliver remote access Trojans. Ukrainian authorities say the adversary is focusing on information stealing and remote control of targeted systems.

Phishing 225
article thumbnail

The source code of the BlackLotus UEFI Bootkit was leaked on GitHub

Security Affairs

The source code for the BlackLotus UEFI bootkit has been published on GitHub and experts warn of the risks of proliferation of custom versions. Researchers from ESET discovered in March a new stealthy Unified Extensible Firmware Interface ( UEFI ) bootkit, named BlackLotus , that is able to bypass Secure Boot on Windows 11. Secure Boot is a security feature of the latest Unified Extensible Firmware Interface (UEFI) 2.3.1 designed to detect tampering with boot loaders, key operating system fi

Sales 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ISMG Editors: Why Is the US Behind in Securing Credit Cards?

Data Breach Today

Also: The Latest Generative AI Use Cases; Software Consolidation Trends In the latest weekly update, ISMG editors discuss the complex task of phasing out magnetic stripe payment cards and why the United States lags behind, the great debate over best of breed vs. a single platform vendor approach, and AI insights from Palo Alto CIO Meerah Rajavel.

Security 214

More Trending

article thumbnail

Russian APT Group Actively Targets Ukrainian Public Offices

Data Breach Today

Armageddon Campaign Now Capable of Targeting Thousands of Ukrainian Systems at Once Russian hacking group Armageddon has upgraded its skills to simultaneously target several thousand Ukrainian government information systems. CERT-UA said the hackers infected Microsoft Office Word to generate 80 to 120 malicious documents within a compromised system to multiply the infection.

article thumbnail

New AVrecon botnet remained under the radar for two years while targeting SOHO Routers

Security Affairs

A new malware dubbed AVrecon targets small office/home office (SOHO) routers, it infected over 70,000 devices from 20 countries. Lumen Black Lotus Labs uncovered a long-running hacking campaign targeting SOHO routers with a strain of malware dubbed AVrecon. The malware was spotted the first time in May 2021, but has been operating under the radar for more than two years. “Lumen Black Lotus Labs identified another multi-year campaign involving compromised routers across the globe.

article thumbnail

Latest LokiBot Campaign Exploits Malicious MS Documents

Data Breach Today

Attackers Deploying Remote Code Execution Malware for Information Stealing Researchers are warning of an uptick in attacks using a series of malicious Microsoft Office documents designed to drop LokiBot, an information stealer capable of sweeping up credentials. LokiBot has been active since 2015 and specializes in information stealing through malicious email attachments.

130
130
article thumbnail

US CISA warns of Rockwell Automation ControlLogix flaws

Security Affairs

The U.S. CISA warns of two flaws impacting Rockwell Automation ControlLogix that can lead to remote code execution and DoS attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of two vulnerabilities affecting Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module models that could be exploited to achieve remote code execution and trigger a denial-of-service condition.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How AI Can Empower Defenders, Enhance Cybersecurity

Data Breach Today

BlackBerry Cybersecurity President John Giamatteo on AI Solutions for Defenders Generative AI is growing rapidly as organizations seek ways to transform human tasks. With the ability to process and analyze large volumes of data in real time, AI can empower defenders to detect and respond to threats more effectively, said John Giamatteo, cybersecurity president at BlackBerry.

article thumbnail

Ransomware Crypto Payments Are on the Rise While the Rest of Crypto Crime is on the Decline

KnowBe4

New insight from blockchain analysis company, Chainalysis, shows that activity involving known ransomware crypto addresses has grown over the last 18 months, despite a downfall of other malicious activity.

article thumbnail

Collibra and Amazon Web Services (AWS) partnership reaches new heights

Collibra

At Collibra, we partner with the best technology platforms in the world, including AWS. Today, we’re excited to announce we’ve attained two new AWS Competencies under the AWS Competency Program: the Data and Analytics Competency, and the Government Competency. The AWS Competency Program’s goal is to give AWS customers confidence that the AWS Partner has demonstrated technical expertise and a proven track record in specialty areas across various industries, use cases and workloads.

article thumbnail

Nearly One-Quarter of All Emails Are Considered to be Malicious

KnowBe4

The quantity of emails involved in scams and cyber attacks continues to grow as credential theft and response-based phishing persist as top attack variants.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Indexing Over 15 Million WordPress Websites with PWNPress

Security Affairs

Sicuranex’s PWNPress platform indexed over 15 million WordPress websites, it collects data related to vulnerabilities and misconfigurations Leveraging the extensive Common Crawl dataset and pushing the boundaries of data analysis, cybersecurity firm Sicuranex successfully indexed over 15 million WordPress websites using the PWNPress service. This endeavor involved parsing the entire Web Archive Text (WAT) database, a massive 21 TiB repository, to identify WordPress installations worldwid

Risk 75
article thumbnail

KnowBe4 Wins 2023 Top Workplaces for Technology Award

KnowBe4

KnowBe4 ranks number one overall on the 2023 Technology Top Workplaces list for the third consecutive year and earns national recognition as an employer of choice!

article thumbnail

Rogue Azure AD Guests Can Steal Data via Power Apps

Dark Reading

A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.

85
article thumbnail

FBI Surveillance Fears Are Uniting a Badly Broken Congress

WIRED Threat Level

The FBI has collected sensitive data on millions of Americans without warrants, drawing intense scrutiny from Congress and turning the agency into a punching bag across the political divide.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to get started with designing your Information Architecture (IA) via Leadership Through Data

IG Guru

Check out the article here. The post How to get started with designing your Information Architecture (IA) via Leadership Through Data first appeared on IG GURU.

article thumbnail

Friday Squid Blogging: Balloon Squid

Schneier on Security

Masayoshi Matsumoto is a “master balloon artist,” and he made a squid (and other animals). As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

[LIVE DEMO] Are Your Users Making Risky Security Mistakes? Deliver Real-Time Coaching in Response to Risky User Behavior with SecurityCoach

KnowBe4

Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training campaigns you manage today?

article thumbnail

Zimbra Zero-Day Demands Urgent Manual Update

Dark Reading

A bug in Zimbra email servers is already being exploited in the wild, Google TAG researchers warn.

87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Jamf Account News

Jamf

Jamf Account is an online portal where you can find and manage features related to your account with Jamf. Learn how Jamf Account enables you to unlock the full potential of everything Jamf has to offer, accessed from one convenient place.

Access 52
article thumbnail

Electrical Grid Stability Relies on Balancing Digital Substation Security

Dark Reading

Because digital substations are critical elements of electrical systems, they are a prime target for sophisticated cyberattacks.

article thumbnail

July 2023: E-Invoicing & VAT compliance updates

OpenText Information Management

Welcome to the July 2023 edition of our e-Invoicing newsletter. In our Hot Topics section read about the exciting new changes coming to our blog for 2023. In “Compliance news and updates” read the latest world news on mandates. In the EU, the European Parliament has provided significant updates to the proposed amendments to the … The post July 2023: E-Invoicing & VAT compliance updates appeared first on OpenText Blogs.

article thumbnail

How Hackers Can Hijack a Satellite

Dark Reading

We rely on them for communications, military activity, and everyday tasks. How long before attackers really start to look up at the stars?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Elevate your call center’s performance with agent experience software

OpenText Information Management

Call centers often face the challenge of increasing the number of interactions while keeping agent staffing at current levels. This situation calls for a revolutionary approach to the way call center agents work. Contact center leaders must empower agents with streamlined workflows, user-friendly interfaces, and powerful features in an agent dashboard to transform call center … The post Elevate your call center’s performance with agent experience software appeared first on OpenText B

article thumbnail

Cisco Flags Critical SD-WAN Vulnerability

Dark Reading

A flaw in the REST API of Cisco's SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.

59
article thumbnail

Buying Campaign Contributions as a Hack

Schneier on Security

The first Republican primary debate has a popularity threshold to determine who gets to appear: 40,000 individual contributors. Now there are a lot of conventional ways a candidate can get that many contributors. Doug Burgum came up with a novel idea: buy them : A long-shot contender at the bottom of recent polls, Mr. Burgum is offering $20 gift cards to the first 50,000 people who donate at least $1 to his campaign.

IT 71