Fri.Oct 06, 2023

article thumbnail

Veracode, Synopsys, Checkmarx Dominate SAST Forrester Wave

Data Breach Today

Micro Focus Falls From Leaders Ranking as Static App Testing Vendors Embrace Gen AI Veracode, Synopsys and Checkmarx remain atop Forrester's static application security testing list, while Micro Focus fell from the leaderboard after the OpenText buy. Firms have gone beyond evaluating the security of code itself and now assess the safety of the infrastructure the code is running on.

Security 292
article thumbnail

23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews

WIRED Threat Level

At least a million data points from 23andMe accounts appear to have been exposed on BreachForums. While the scale of the campaign is unknown, 23andMe says it's working to verify the data.

IT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global Cyberespionage Operations Surging, Microsoft Warns

Data Breach Today

Review of Cyberespionage and Information Operations Reports 'Aggressive' Efforts Government-sponsored cyberespionage campaigns and information operations are on the rise - and not just due to efforts by Russia and China, Microsoft warns in its latest Digital Defense Report review of top nation-state and cybercrime attack trends.

article thumbnail

23andMe Cyberbreach Exposes DNA Data, Potential Family Ties

Dark Reading

The information leaked in the breach involves personally identifiable information as well as genetic ancestry data, potential relatives, and geolocations.

139
139
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Are You SEC Ready? What You Need to Know about Finalized Cyber Disclosure Rules

Data Breach Today

Experts discuss the top things that companies, board directors and cyber leaders need to do now to be ready for compliance since the SEC fast-tracked adoption of its cybersecurity disclosure rules.

More Trending

article thumbnail

ISACA Security Survey 2023: Technical Skills Gaps, Budgeting

Data Breach Today

ISACA's Jon Brandt Discusses Threat Trends, Hiring Challenges, New Opportunities What kinds of training do security professionals need? The biggest skills gaps are soft skills (55%), cloud computing (47%), security controls (35%), coding skills (30%) and software development (30%), according ISACA's State of Cybersecurity 2023 survey of more than 2,000 security leaders globally.

Security 284
article thumbnail

Cisco Emergency Responder is affected by a critical Static Credentials bug. Fix it immediately!

Security Affairs

Cisco addressed a critical Static Credentials Vulnerability, tracked as CVE-2023-20101, impacting Emergency Responder. Cisco released security updates to address a critical vulnerability, tracked as CVE-2023-20101 (CVSS score: 9.8), impacting Emergency Responder. A remote, unauthenticated attacker can exploit the vulnerability to log in to susceptible systems using hard-coded credentials that cannot be changed.

IT 115
article thumbnail

China-Linked APT Uses New Backdoor for Espionage in Guyana

Data Breach Today

Attackers Use Previously Undocumented Backdoor as Well as Traditional Hacking Tools The government of a Caribbean nation was the target of a cyberespionage campaign that has indicators of Chinese origin. Cybersecurity firm Eset says attackers used a previously undocumented backdoor as well as traditional hacking tools to target an unidentified "governmental entity" in Guyana.

article thumbnail

Multiple experts released exploits for Linux local privilege escalation flaw Looney Tunables

Security Affairs

Researchers published PoC exploits for CVE-2023-4911 vulnerability (aka Looney Tunables) impacting most popular Linux distributions. The vulnerability CVE-2023-4911 (CVSS score 7.8) is a buffer overflow issue that resides in the GNU C Library’s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. An attacker can trigger the vulnerability to execute code with elevated privileges. “A buffer overflow was discovered in the GNU C Library’s dynamic loader ld

Libraries 106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

MGM Resorts Expects $100 Million Loss From Hack Attack

Data Breach Today

Cyber Insurance Expected to Cover Lost Revenue Plus $10 Million in Mitigation Costs Hotel and casino giant MGM Resorts says the recent hack attack against it has cost $110 million in lost revenue and mitigation expenses. The publicly traded company expects to recoup at least its losses and costs to date via cyber insurance.

Insurance 280
article thumbnail

OS upgrades 2023: OS upgrades and security

Jamf

Apple’s latest operating systems offer new and improved security and privacy features for your device fleet. Read more to learn about these features and how they affect the end user.

Security 105
article thumbnail

ISMG Editors: Can Governments Get a Handle on AI?

Data Breach Today

Also: EU Policy Updates and the Disconnect Between CEOs and CISOs In the latest weekly update, ISMG editors examine policies in the U.S. and Europe that could regulate AI, recent developments within the EU cybersecurity and privacy policy arena, and the disparities between the perspectives of business leaders and cybersecurity leaders on the security landscape.

article thumbnail

Cybersecurity, why a hotline number could be important?

Security Affairs

The creation of a dedicated emergency number for cybersecurity could provide an effective solution to this rapidly growing challenge The growing threat of cybercrime is calling for new and innovative defense strategies. While the phone number for physical emergencies is already time-tested, the absence of a similar hotline for cybercrimes is a significant gap in our digital security.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

User Protection: Removing the Security Burden From Users

Data Breach Today

Eric Eddy, principal technical marketing engineer at Cisco, discusses critical aspects of user-centric security. From alleviating the security burden on users to the role of zero trust in granting access, Eric provides actionable insights for achieving a seamless and robust security posture.

Security 272
article thumbnail

Too Rich To Ransomware? MGM Brushes Off $100M in Losses

Dark Reading

MGM wins big bet that days of operations outages is better business than paying a ransom, following last month's data breach.

article thumbnail

The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team

KnowBe4

In response to improved email security measures, cybercriminals have pivoted to more advanced attack methods, namely artificial intelligence (AI), that bypass existing protections. But security defenders are also using AI in remarkable new ways to fortify their networks.

article thumbnail

Deepfake Election Interference in Slovakia

Schneier on Security

Well designed and well timed deepfake or two Slovakian politicians discussing how to rig the election: Šimečka and Denník N immediately denounced the audio as fake. The fact-checking department of news agency AFP said the audio showed signs of being manipulated using AI. But the recording was posted during a 48-hour moratorium ahead of the polls opening, during which media outlets and politicians are supposed to stay silent.

IT 90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Libraries lead the way with Green Libraries Week

CILIP

Libraries lead the way with Green Libraries Week This year, Libraries Week went Green, with libraries from Jersey to John O’Groats hosting more than 280 environmental and sustainability activities,* from 2nd-8th October 2023. On the day of launch, the campaign made it into Twitter/X’s trending list at number 8, boosting the campaign’s reach beyond the libraries sector.

article thumbnail

Preparing for the Unexpected: A Proactive Approach to Operational Resilience

Dark Reading

Try these steps to create an operational resilience action plan that will satisfy financial regulators and help sustain business without disruption.

95
article thumbnail

Clorox Experiences Significant Financial Loss Stemming From Recent Cyber Attack

KnowBe4

Popular American global manufacturer of cleaning products Clorox stated that recent sales and profit loss to a cyber attack.

article thumbnail

Suspected Crime Gang Hacks Israeli President's Telegram Account

Dark Reading

The encrypted messaging app was hacked in the wake of an online scam before access was "swiftly restored.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

OpenText Cybersecurity Aviator enables a new threat detection approach

OpenText Information Management

The cybersecurity industry finds itself at a crossroads. The existing threat detection measures, once considered formidable, are struggling to keep up with the pace and complexity of modern cyber threats. Traditional approaches are often rigid, relying on static and stale mechanisms that attackers can easily bypass or manipulate. Maintaining security posture is extremely challenging, and … The post OpenText Cybersecurity Aviator enables a new threat detection approach appeared first on Ope

article thumbnail

Google, Yahoo Push DMARC, Forcing Companies to Catch Up

Dark Reading

The move means that DMARC, already in use by half of enterprises, will become table stakes for anyone using email for marketing.

Marketing 101
article thumbnail

Transform user productivity with an AI-powered intelligent assistant

OpenText Information Management

Even with modern tools at our disposal, the demand for more automation to support productivity and efficiency remains high, with 41% of knowledge workers reporting that their performance would benefit most from reducing common, repetitive types of work. In short – your teams want to get things done faster, and with greater accuracy. Addressing this … The post Transform user productivity with an AI-powered intelligent assistant appeared first on OpenText Blogs.

article thumbnail

Zoom Adds Features Like Document Editing in Bid to Compete With Microsoft via Bloomberg

IG Guru

Check out the article here. The post Zoom Adds Features Like Document Editing in Bid to Compete With Microsoft via Bloomberg first appeared on IG GURU.

87
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Reshape the future of DevOps with generative AI

OpenText Information Management

Evolve quality with next-generation AI and analytics-focused insights in OpenText DevOps Aviator. The post Reshape the future of DevOps with generative AI appeared first on OpenText Blogs.

article thumbnail

The transformative power of data-driven insurance and generative AI

CGI

As generative artificial intelligence (AI) continues to evolve rapidly, it has sparked transformative change across the insurance industry. Learn best practices for insurers to pursue data-driven insurance and generative AI to create strategic advantage in the face of new disruptors.

article thumbnail

Soar to new heights with AI-powered Experience Aviator

OpenText Information Management

The future is here! There is no shortage of interest in AI, but what is the best way to get started? Chief Marketing Officers (CMOs) are already succeeding with generative AI. Some 70% of CMO survey respondents said that their organizations already use GenAI, while another 19% are testing it. Three of the many areas CMOs … The post Soar to new heights with AI-powered Experience Aviator appeared first on OpenText Blogs.