Thu.Sep 07, 2023

article thumbnail

Tattletale Ransomware Gangs Threaten to Reveal GDPR Breaches

Data Breach Today

Repeat Shakedown Tactic: Victims Told to Pay Up or Else They'll Pay Massive Fines Ransomware groups do whatever they can to pressure a victim into paying. Enter the likes of Ransomed, following in the footsteps of Alphv/BlackŠ”at, NoEscape and Good Day-powered Cloak, all of which threaten victims with a world of General Data Protection Regulation violation pain, unless they pay.

article thumbnail

Apple discloses 2 new actively exploited zero-day flaws in iPhones, Macs

Security Affairs

Apple rolled out emergency security updates to address two new actively exploited zero-day vulnerabilities impacting iPhones and Macs. The two Apple zero-day vulnerabilities, tracked as CVE-2023-41064 and CVE-2023-41061, reside in the Image I/O and Wallet frameworks. CVE-2023-41064 is a buffer overflow issue that was reported by researchers from researchers at Citizen Lab.

Security 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Swedish Insurer Fined $3M for GDPR Breach

Data Breach Today

Also, Google Fitbit Faces Privacy Complaints From Schrems This week, the Swedish DPA fined an insurer $3 million for violating GDPR, a DDoS attack disrupted a German financial agency website, Google Fitbit faced privacy complaints from Schrems, Ragnar Locker published hacked hospital data, and Seville, Spain dealt with the aftermath of a ransomware attack.

Insurance 306
article thumbnail

Customer Spotlight: Achieve Smarter Modernization Beyond Mainframe ArchitectureĀ Ā 

OpenText Information Management

For organizations where mainframe and COBOL are at the heart of operations, going beyond the bounds of mainframe architecture to efficiently scale and innovate at speed can seem daunting. Fortunately, there are valuable steps you can take to accelerate your digital transformation journey while staying agile in todayā€™s fast-paced multi-cloud world. Recent OpenText research revealed … The post Customer Spotlight: Achieve Smarter Modernization Beyond Mainframe Architecture appeared first on

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tenable to Buy Startup Ermetic for $265M to Safeguard Clouds

Data Breach Today

2nd-Largest Pure-Play Cyber M&A Transaction of 2023 Unites Identity, Cloud Security Tenable will purchase a cloud security startup founded by the longtime leader of Secdo to help security teams make efficient and accurate remediation decisions. The proposed buy of Ermetic will make it easier for security professionals of all cloud expertise levels to spot and quickly address risks.

Cloud 283

More Trending

article thumbnail

Cryptohack Roundup: Tornado Cash, Privacy Pools

Data Breach Today

Also: Web3's August Losses, Stake, Binance This week's roundup includes an update on the Tornado Cash case, a proposal for a law-abiding crypto mixer, August hack numbers, Stake's resumption of operations, Binance's delisting of privacy coins in Belgium and a court order against the CEO of Celsius.

Privacy 282
article thumbnail

Zero-days fixed by Apple were used to deliver NSO Groupā€™s Pegasus spyware

Security Affairs

Citizen Lab reported that the actively exploited zero-days fixed by Apple are being used in Pegasus spyware attacks Researchers at Citizen Lab reported that the actively exploited zero-day flaws (CVE-2023-41064 and CVE-2023-41061) fixed by Apple are being used to infect devices with NSO Group ā€™s Pegasus spyware. According to the researchers, the two vulnerabilities were chained as part of a zero-click exploit, named BLASTPASS, used in attacks on iPhones running the latest version of iOS (16.6).

Security 117
article thumbnail

Why Connected Devices Are Such a Risk to Outpatient Care

Data Breach Today

The number of connected devices used in healthcare is growing as manufacturers constantly introduce new types of IoT equipment. The ever-evolving threat landscape is making it harder for many entities, particularly outpatient care providers, to keep up, said Justin Foster, CTO of Forescout.

IoT 282
article thumbnail

IT Governance Podcast 08.09.23: Electoral Commission (again), Meta, PĆ“le emploi

IT Governance

This week, we discuss security issues at the Electoral Commission, Metaā€™s appeal against daily GDPR fines, and a breach affecting 10 million users of the French unemployment agency PĆ“le emploi. Also available on Spotify , Amazon Music , Apple Podcasts and SoundCloud. Transcript: Hello and welcome to the IT Governance podcast for Friday, 8 September 2023.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. Itā€™s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Exploit Multiple Bugs in Hotel Booking Platform

Data Breach Today

Financially Motivated Hackers Deploy Custom Malware Financially motivated hackers developed custom malware to exploit a likely zero-day flaw in popular vacation resort management software, say security researchers. Hackers target the hospitality industry with regularity, given the massive amounts of personal and payment data inside the sector.

Security 282
article thumbnail

A winning summer for Jamf

Jamf

Jamf is awarded by Enterprise Security Tech, TrustRadius and SoftwareReviews for corporate responsibility, contributions to the cybersecurity community and Jamf Pro's user reviews.

article thumbnail

Trail of Errors Led to Chinese Hack of Microsoft Cloud Email

Data Breach Today

Crash Dump Snapshot Included Active Signing Key Chinese hackers were able to access the email accounts of senior U.S. officials after Microsoft included an active digital signing key in a snapshot of data taken to analyze a crash of its consumer signing system in April 2021. Inclusion of the key in the crash dump was just one of many mishaps.

Cloud 281
article thumbnail

The International Criminal Court Will Now Prosecute Cyberwar Crimes

WIRED Threat Level

And the first case on the docket may well be Russiaā€™s cyberattacks against civilian critical infrastructure in Ukraine.

Security 138
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented ā€“ threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US, UK Sanction 11 Russian Cybercriminals Tied to TrickBot

Data Breach Today

US Prosecutors Unseal Charges Against TrickBot and Conti Ransomware Operators The United States and Great Britain imposed sanctions against nearly a dozen Russian members of the malware gang behind the TrickBot ransomware dropper while U.S. federal prosecutors unsealed criminal indictments against nine individuals for their involvement in online crimes including ransomware.

article thumbnail

A malvertising campaign is delivering a new version of the macOS Atomic Stealer

Security Affairs

Researchers spotted a new malvertising campaign targeting Mac users with a new version of the macOS stealer Atomic Stealer. Malwarebytes researchers have observed a new malvertising campaign distributing an updated version of the popular Atomic Stealer (AMOS) for Mac. The Atomic Stealer first appeared in the threat landscape in April 2023. In April Cyble Research and Intelligence Labs (CRIL) discovered a Telegram channel advertising a new information-stealing malware, named Atomic macOS Stealer

Passwords 112
article thumbnail

Experts Probe AI Risks Around Malicious Use, China Influence

Data Breach Today

Senate Hearing Examines Misuse of Advanced AI Systems, Risks With Chinese Nationals The rise of artificial intelligence makes it easier for adversaries to harm the U.S. and introduces new risks around malicious insiders with loyalties to China, experts say during a Senate hearing. Generative AI can help less technically sophisticated threat actors carry out complex cyberattacks.

Risk 279
article thumbnail

Ireland: Non-material damages under GDPR ā€“ Irish law developments and the international approach

DLA Piper Privacy Matters

Authors: Eilis McDonald; Marcus Walsh; John Magee; Gavin Woods; David Cook; Andreas RĆ¼diger The Irish Circuit Court has recently delivered an important judgment on non-material damages for infringement of the GDPR. The judgment also establishes a list of factors for the courts to consider when assessing non-material damages. This judgment comes in the context of other recent decisions on this topic in the UK and EU and which continue to shape the data protection environment that multi-national

GDPR 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

California Executive Order Hopes to Ensure 'Trustworthy AI'

Data Breach Today

Governor Sets 2-Year Deadline for Policies on AI Use, Risks at Public Agencies California Gov. Gavin Newsom on Wednesday signed an executive order to study the development, use and risks of artificial intelligence, and develop a process to deploy "trustworthy AI" in the state government. The order calls for a staggered implementation over the next two years.

article thumbnail

Facebook Trains Its AI on Your Data. Opting Out May Be Futile

WIRED Threat Level

Here's how to request that your personal information not be used to train Meta's AI model. "Request" is the operative word here.

IT 117
article thumbnail

Social Engineering Seeks Okta Credentials

KnowBe4

Identity and authentication management provider Okta has warned of social engineering attacks that are targeting IT workers in an attempt to gain administrative privileges within organizationsā€™ networks.

article thumbnail

How New SEC Rules Can Benefit Cybersecurity Teams

Dark Reading

Securities and Exchange Commission rules elevate cybersecurity to a critical strategic concern and compel businesses to prioritize cyber resilience.

article thumbnail

Reimagined: Building Products with Generative AI

ā€œReimagined: Building Products with Generative AIā€ is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cybersecurity Mergers Flatline. Hereā€™s Why That Wonā€™t Last.

eSecurity Planet

Much like the rest of technology, merger and acquisition (M&A) activity for cybersecurity companies has been in a slump this year. There are a number of reasons why that won’t last, but still, the decline has been noteworthy. For the first seven months of this year, there were a mere 34 startups that got acquired, according to data from Crunchbase.

article thumbnail

Harnessing AI and data analytics can make clean energy more viable

IBM Big Data Hub

The effects of climate change grow more tangible by the day. As a result, the electric power industry is hastening efforts to reduce environmental impact. To do so, they need help to get a clearer picture of where they fall on the emissions reduction roadmap, and to better understand their opportunities for improvement. This is where harnessing artificial intelligence (AI) and data analytics can help.

article thumbnail

Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain

Dark Reading

Researchers at Citizen Lab recommend immediately updating any iPhones and iPads to the latest OSes.

129
129
article thumbnail

US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs

WIRED Threat Level

Authorities have sanctioned 11 alleged members of the cybercriminal groups, while the US Justice Department unsealed three federal indictments against nine people accused of being members.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If youā€™re considering migrating from DataStax Enterprise (DSE) to open source Apache CassandraĀ®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether youā€™re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Weaponized Windows Installers Target Graphic Designers in Crypto Heist

Dark Reading

Attackers use legitimate Windows installer to hide malicious scripts that install a backdoor and miners that leverage victims' graphics processing power.

102
102
article thumbnail

Managing your cloud ecosystems: Migrating to a new Ubuntu operating system version

IBM Big Data Hub

Planning and managing your cloud ecosystem and environments is critical for reducing production downtime and maintaining a functioning workload. In the “Managing your cloud ecosystems” blog series, we cover different strategies for ensuring that your setup functions smoothly with minimal downtime. In the third blog of the series, we’re discussing migrating your worker nodes to a new Ubuntu operating system.

Cloud 85
article thumbnail

Does Generative AI Comply With Asimov's 3 Laws of Robotics?

Dark Reading

Putting the top 10 generative AI tools to the ethical test reveals more about humanity than artificial intelligence.