Mon.Nov 20, 2023

article thumbnail

Known MOVEit Attack Victim Count Reaches 2,618 Organizations

Data Breach Today

77 Million Individuals' Information Exposed, as More Victims Continue to Be Counted Trackers of the tally of individuals affected by the Clop ransomware group's mass hack attack on MOVEit servers added another 4.5 million patients' data to the ever-ascending total. The incident currently affects more than 2,600 organizations and 77 million individuals.

article thumbnail

Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records

WIRED Threat Level

A WIRED analysis of leaked police documents verifies that a secretive government program is allowing federal, state, and local law enforcement to access phone records of Americans who are not suspected of a crime.

Access 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Snags OpenAI's Sam Altman to Lead AI Research Team

Data Breach Today

OpenAI Board Thwarts Altman's Return, Names Ex-Twitch Boss Emmett Shear Interim CEO OpenAI co-founders Sam Altman and Greg Brockman will lead a new advanced AI research team at Microsoft after OpenAI's board decided not to bring them back, Satya Nadella said. The nonprofit behind ChatGPT opted instead to name longtime Twitch CEO Emmett Shear as its new interim leader Sunday night.

IT 293
article thumbnail

DarkCasino joins the list of APT groups exploiting WinRAR zero-day

Security Affairs

The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831. Researchers at cybersecurity firm NSFOCUS analyzed DarkCasino attack pattern exploiting the WinRAR zero-day vulnerability tracked as CVE-2023-38831. The economically motivated APT group used specially crafted archives in phishing attacks against forum users through online trading forum posts. “DarkCasino is an APT threat actor with strong technical and learning ability, who is g

Phishing 139
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

OpenAI CEO Emmett Shear Tries to Right Ship Amid Mass Exodus

Data Breach Today

Nearly All OpenAI Employees Threaten to Quit Unless Board That Fired Altman Resigns Emmett Shear's first move as OpenAI's third CEO in three days has been damage control with the AI firm's workers planning a mass exodus over the firing of CEO Sam Altman. But the course correction may be too little, too late as 95% of the staff is demanding that the board that fired Altman resigns.

277
277

More Trending

article thumbnail

ONCD Temporarily Fills Critical Vacant Federal Cyber Role

Data Breach Today

Drenan Dudley Appointed to Serve as Acting National Cyber Director Drenan Dudley, who previously served as deputy national cyber director for strategy and budget at the Office of the National Cyber Director, will temporarily lead the agency while the White House nominee to serve in a permanent capacity awaits a vote in the Senate.

277
277
article thumbnail

US teenager pleads guilty to his role in credential stuffing attack on a betting site

Security Affairs

US teenager Joseph Garrison pleads guilty to carrying out a credential stuffing attack on a betting website. US teenager Joseph Garrison (19) has pleaded guilty to his involvement in a credential stuffing campaign that targeted user accounts at a fantasy sports and betting website.3 On or about November 18, 2022, the man launched a credential stuffing attack on the Betting Website and gained access to approximately 60,000 accounts.

Passwords 119
article thumbnail

NY State Eyes New Cyber Regs for Hospitals; $500M Price Tag

Data Breach Today

Proposals Require a CISO, Strong Cyber Controls, 2-Hour Incident Reporting Window New York State will soon seek public comment on sweeping new cybersecurity regulations for hospitals. The proposed rules would come with $500 million in requested funding to help the providers step up their security investments to comply with the new requirements.

article thumbnail

Amid Military Buildup, China Deploys Mustang Panda in the Philippines

Dark Reading

China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.

Military 144
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russia Uses Upgraded USB Worm for Espionage Against Kyiv

Data Breach Today

'LitterDrifter' Worm Is Designed to Support Large-Scale Collection Operation A hacking group linked to Russian domestic intelligence and known as Gamaredon is deploying a worm dubbed "LitterDrifter" that is spread through thumb drives to attack Ukrainian organizations. LitterDrifter has two functions: automatic propagation and communication with command-and-control servers.

article thumbnail

How to build a successful talent management strategy

IBM Big Data Hub

Advanced organizations know their greatest assets are their employees. However, keeping employees happy and engaged can be challenging, especially when considering available resources and the need to meet other organizational goals. An organization is only as strong as its talent pool, so organizations have increasingly embraced talent management as a core component of their overarching strategy.

article thumbnail

Hospital Pays Fine for Disclosing Patient PHI to Reporter

Data Breach Today

HHS HIPAA Settlement With Yonkers, NY Facility Also Includes Corrective Action Federal regulators have smacked a New York medical center with an $80,000 penalty as part of a settlement for a HIPAA privacy breach involving the information of three patients that was exposed to a reporter and distributed nationally during press coverage in the early days of the COVID-19 pandemic.

Privacy 244
article thumbnail

Malware Uses Trigonometry to Track Mouse Strokes

Dark Reading

The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.

116
116
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Using Generative AI for Surveillance

Schneier on Security

Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My guess is that it isn’t very good yet, but that it will get better.

IT 100
article thumbnail

How the Evolving Role of the CISO Impacts Cybersecurity Startups

Dark Reading

CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.

article thumbnail

Business leaders highlight the need for a hybrid cloud approach to unlock the power of generative AI

IBM Big Data Hub

In 2023, organizations have faced an unprecedented level of pressure to digitally transform with the rise of generative AI as well as imperatives such as sustainability, labor productivity and security. The “ Cloud Transformation Report ,” a new global survey from the IBM Institute for Business Value (IBV), found that many leading enterprises share a common foundation to digital transformation—a clear hybrid cloud strategy.¹ These businesses cite several key benefits to us

Cloud 90
article thumbnail

Cybercrime Group "Scattered Spider" is a Social Engineering Threat

KnowBe4

The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a joint Cybersecurity Advisory describing the Scattered Spider cybercriminal gang’s activities.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity

Thales Cloud Protection & Licensing

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity sparsh Tue, 11/21/2023 - 05:01 As global consumers gear up for the much-anticipated shopping bonanza that is Black Friday and Cyber Weekend, retailers brace themselves for the frenzied onslaught of shoppers and the deluge of cyber threats lurking in the shadows.

Retail 83
article thumbnail

CISA Launches Pilot Program to Address Critical Infrastructure Threats

Dark Reading

CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.

IT 115
article thumbnail

With Expected Increases of Holiday Sales Comes Similar Expectations of More Cyber Scams

KnowBe4

If increases in cyberattacks this year are any indication of what to expect in the next six weeks of holiday shopping, we should expect a massive uptick in holiday-related scams.

Sales 86
article thumbnail

What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines

Dark Reading

New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their devices approved for market.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Tenth Edition of Lexology In-Depth: Privacy, Data Protection and Cybersecurity (formerly The Privacy, Data Protection and Cybersecurity Law Review) is now available

Data Matters

The tenth edition of Lexology In-Depth: Privacy, Data Protection and Cybersecurity (formerly The Privacy, Data Protection and Cybersecurity Law Review) provides a global overview of the evolving legal and regulatory regimes governing data privacy and security, at a time when both privacy and security are increasingly challenged by the fast-paced development of technologies such as large language models, generative AI, and self-teaching/self-replicating applications.

Privacy 97
article thumbnail

Saudi Arabia Arms Public Sector With Google Cloud Services

Dark Reading

Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.

Cloud 97
article thumbnail

EDPB Publishes Guidelines to Clarify Scope of EU “Cookie” Notice and Consent Requirements

Hunton Privacy

On November 16, 2023, the European Data Protection Board (“EDPB”) published its Guidelines 2/2023 on the Technical Scope of Art. 5(3) of the ePrivacy Directive (the “Guidelines”). Article 5(3) of the ePrivacy Directive is most commonly known for establishing the cookie notice and cookie consent requirements in the EU. That said, Article 5(3) of the ePrivacy Directive applies to more than just cookies.

article thumbnail

GenAI Requires New, Intelligent Defenses

Dark Reading

Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective business and public use of GenAI.

Risk 81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

IBM Named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management

IBM Big Data Hub

We are thrilled to share that IBM is named a Leader in the most recent Gartner® Magic Quadrant™ for Access Management. IBM is recognized for its Ability to Execute and Completeness of Vision. As a team, we’ve been working hard to deliver on a roadmap of identity and access management capabilities that we believe solve the biggest challenges organizations are facing when it comes to managing identities in today’s dispersed, hybrid cloud environments.

Access 71
article thumbnail

Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats

Dark Reading

Combining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities.

article thumbnail

NHS data platform may be undermined by lack of public trust, warn campaigners

The Guardian Data Protection

Patients cannot opt out of personal medical records being shared, albeit anonymised, between NHS bodies The NHS’s new data platform could be derailed by a lack of public trust because patients are being denied the chance to opt out of it sharing their personal medical records, campaigners claim. NHS England will announce on Tuesday that it is handing the £480m contract to operate the new software to the US spy tech firm Palantir , sparking a backlash over privacy and its “murky” past.

Privacy 69