Tue.Aug 08, 2023

article thumbnail

Spanish Police Arrest 3 Suspected of Payment Card Fraud

Data Breach Today

Cybercrime Group Defrauded Nearly 200,000 Euros Spanish police estimate that a group that mainly targeted ATMs of Spanish national banks using cloned payment cards had fraudulently pocketed nearly 196,000 euros. Authorities arrested three suspected members of the group Sunday in the Spanish coastal city of Valencia.

246
246
article thumbnail

News alert: SandboxAQ launches new open source framework to simplify cryptography management

The Last Watchdog

Palo Alto, Calif., Aug. 8, 2023 – SandboxAQ today announced Sandwich, an open source framework and meta-library of cryptographic algorithms that simplifies modern cryptography management. With an intuitive, unified API, Sandwich empowers developers to embed the cryptographic algorithms of their choice directly into their applications and to change them as technologies and threats evolve – without rewriting code.

Libraries 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rubrik Buys Startup Laminar to Unify Cyber Posture, Recovery

Data Breach Today

Rubrik Spent More Than $100M to Acquire the Data Security Posture Management Vendor Rubrik purchased a data security posture management startup backed by Salesforce and SentinelOne to provide visibility into where a company's data lives and who has access. The Laminar buy will help organizations expand beyond network and endpoint security and into cloud and data security.

Cloud 246
article thumbnail

Black Hat Fireside Chat: ‘UEM’ solutions seek to protect endpoints, preserve user experience

The Last Watchdog

LAS VEGAS — Shadow IT and BYOD security exposures have long bedeviled businesses – ever since the iPhone and Dropbox first came on the scene. Covid 19 only intensified the problem of how to securely manage the personally owned devices and unvetted apps employees gravitate to. At Black Hat USA 2023 , taking place here this week, suppliers of unified endpoint management ( UEM ) solutions collectively will lay out a roadmap for resolving Shadow IT and BYOD once and for all.

Security 146
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Kyiv Cyber Defenders Spot Open-Source RAT in Phishing Emails

Data Breach Today

Threat Actor Coaxes Users Into Downloading MerlinAgent Hackers attempting to spy on the Ukrainian government are using an open-source remote access Trojan, said Kyiv cyber defenders. The RAT, MerlinAgent, is available on GitHub. The threat actor spoofed the Computer Emergency Response Team of Ukraine in phishing emails.

Phishing 246

More Trending

article thumbnail

UK Electoral Commission Suffered 'Complex' Hack in 2021

Data Breach Today

Agency Detected the Incident in October 2022 - Over 1 Year After the Hack The U.K. Electoral Commission suffered a "complex cyber-attack" in 2021, resulting in hackers accessing sensitive voter information. Commission CEO Shaun McNally said the attack resulted in hackers accessing copies of electoral register files that the agency uses for research purposes.

Access 245
article thumbnail

News alert: DigiCert extends cert management platform to support Microsoft CA, AWS Private CA

The Last Watchdog

Lehi, Utah, Aug. 8, 2023 – DigiCert today announced the expansion of its certificate management platform, DigiCert Trust Lifecycle Manager, to provide full lifecycle support for multiple CAs including Microsoft CA and AWS Private CA, as well as integration with ServiceNow to support existing IT service workflows. DigiCert Trust Lifecycle Manager additionally supports enrollment to a broad range of Microsoft and AWS technologies, providing organizations a unified approach to managing public

article thumbnail

Big Cyberespionage Attack Against Japan Attributed to China

Data Breach Today

Japan's Classified Defense Networks Reportedly Suffered a Major Breach in 2020 Japanese classified military networks reportedly suffered a massive breach in 2020 at the hands of a Chinese cyberespionage group that proved tough to eject. One cybersecurity expert said Chinese cyberespionage groups targeting Japan and its allies are employing ever more "stealthy intrusions.

Military 245
article thumbnail

CHINA: New draft proposes more stringent requirements for processing data in the financial services industry

DLA Piper Privacy Matters

Authors: Carolyn Bigg, Amanda Ge and Venus Cheung On July 24, 2023, the People’s Bank of China (“ PBOC ”) released the Measures for the Management of Data Security in the Business Areas Falling into PBOC’s Jurisdiction (Draft for Comment) (“ Draft Measures” ) for public consultation, which closes on August 24, 2023. The Draft Measures regulate the processing of electronic data collected and generated during the course of business activities that are under the supervision and management of

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lawmaker Quizzes Google on 'Guardrails' for AI in Healthcare

Data Breach Today

Sen. Mark Warner Asks Google CEO to Address AI Trust, Privacy, Ethical Practices Citing several growing concerns, Sen. Mark Warner, D-Va., on Tuesday sent a letter quizzing Google CEO Sundar Pichai about how the tech giant is applying privacy, trust and ethical "guardrails" around the development and use of its generative AI product, Med-PaLM 2, in patient care settings.

Privacy 241
article thumbnail

Watch the Accenture + Collibra Fireside Chat: Drive trusted AI for your organization

Collibra

Is your organization excited by the potential of generative AI? As a data practitioner, are you wondering how you’ll navigate your company’s journey to LLM-inspired success? You’re in luck. Recently, Collibra’s Co-founder & Chief Data Citizen, Stijn “Stan” Christiaens, and Accenture’s Cloud First Chief Technologist, Teresa Tung, sat down to chat about the current craze around generative AI and the renewed importance of data.

article thumbnail

Norway Threatens Meta With Fines for Ad Violations

Data Breach Today

Social Media Giant Faces Prospect of Being Fined $100,000 Per Day Starting Aug. 14 The Norwegian data regulator said it will start fining Facebook parent company Meta nearly $100,000 daily starting on Monday unless the social media giant stops showing users behavioral ads without their explicit consent. Privacy advocates call behavioral advertising a privacy violation.

Privacy 240
article thumbnail

LockBit threatens to leak medical data of cancer patients stolen from Varian Medical Systems

Security Affairs

The LockBit ransomware group threatens to leak medical data of cancer patients stolen from Varian Medical Systems. The LockBit ransomware group claims to have hacked the healthcare company Varian Medical Systems and threatens to leak the medical data of cancer patients. Varian Medical Systems, Inc. designs, manufactures, sells, and services medical devices and software products for treating cancer and other medical conditions worldwide.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Recent Updates From our Office

National Archives Records Express

We would like to call your attention to three recent releases from our office. First, the GRS team has recently produced an updated version of the machine-implementable GRS file. This update adds a new field containing the full disposition instruction in text form. We produce this version of the GRS as a resource for agencies. Agencies can upload the CSV file into their records management systems as an aid to applying the GRS to their records.

article thumbnail

Microsoft Patch Tuesday for August 2023 fixed 2 actively exploited flaws

Security Affairs

Microsoft Patch Tuesday security updates for August 2023 addressed 74 vulnerabilities, including two actively exploited flaws. Microsoft Patch Tuesday security updates for August 2023 addressed 74 new vulnerabilities in multiple products including Windows and Windows Components; Edge (Chromium-Based); Exchange Server; Office and Office Components; NET and Visual Studio; ASP.NET; Azure DevOps and HDInsights; Teams; and Windows Defender.

article thumbnail

KnowBe4’s Interactive Phishing Analysis Center: Keep Your Finger On The Pulse

KnowBe4

As a security awareness practitioner, keeping your pulse on industry - and geographical - benchmarking data and best practices is always a good way to measure your organization’s security awareness success.

article thumbnail

10 Key Controls to Show Your Organization Is Worthy of Cyber Insurance

Dark Reading

More-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more sophisticated.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 Intriguing Ways AI Is Changing the Landscape of Cyber Attacks

KnowBe4

In today's world, cybercriminals are learning to harness the power of AI. Cybersecurity professionals must be prepared for the current threats of zero days, insider threats, and supply chain, but now add in Artificial Intelligence (AI), specifically Generative AI. AI can revolutionize industries, but cybersecurity leaders and practitioners should be mindful of its capabilities and ensure it is used effectively.

article thumbnail

Better together: IBM and Microsoft make enterprise-wide transformation a reality

IBM Big Data Hub

IBM® and Microsoft—the two largest global IT companies—are working together. While many may see IBM and Microsoft as competitors, we are much better partners bringing the best of both companies together to accelerate impact and influence at scale. We provide current and new clients the unique opportunity to take advantage of the combined value from our technology, cloud, and consulting services alongside our ecosystem of partners to meet ever-evolving business needs.

Cloud 81
article thumbnail

Most Organizations Using Weak Multifactor Authentication

KnowBe4

Most organizations are still using weak forms of multi-factor authentication (MFA), a survey by Nok Nok has found. These forms of MFA can be bypassed if an employee falls for a social engineering attack.

article thumbnail

SandboxAQ Open Sources Cryptography Management Tool for Post-Quantum Era

eSecurity Planet

SandboxAQ today introduced an open-source cryptography management framework built for the post-quantum era. The AI and quantum spin-out from Alphabet uses the Sandwich framework for the Cryptoservice module in its SandboxAQ Security Suite, currently used by several U.S. government agencies, global banks, telcos, and tech companies. The framework is designed to simplify cryptography management and give developers greater observability and control. “Modern cryptography management and cryptog

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips

WIRED Threat Level

The vulnerability could allow attackers to take advantage of an information leak to steal sensitive details like private messages, passwords, and encryption keys.

article thumbnail

Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications

Dark Reading

Further TETRA-related vulnerabilities have been disclosed in base stations that run and decrypt the worldwide communications protocol for industrial systems.

article thumbnail

How to build more sustainable transportation infrastructure

IBM Big Data Hub

Transportation infrastructure—a broad term that encompasses the networks of fixed installations that ensure safe transport of people and goods—is a critical part of thriving, modern economies. Examples of transportation systems include roadways, public transit systems, airports, train stations, bus stations, ferry terminals, pipelines and warehouses.

article thumbnail

Citrix Zero-Day: 7K Instances Remain Exposed, 460 Compromised

Dark Reading

Many organizations have failed to patch a critical zero-day vulnerability, allowing hackers to install Web shells on hundreds of endpoints.

81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apply to the Content Development Committee at ARMA

IG Guru

Check out the link here. The post Apply to the Content Development Committee at ARMA first appeared on IG GURU.

89
article thumbnail

Celebrating Infinity Day. To August 8th… and Beyond!

Thales Cloud Protection & Licensing

Celebrating Infinity Day. To August 8th… and Beyond! andrew.gertz@t… Tue, 08/08/2023 - 12:49 Infinity Day is a celebration that transcends boundaries, embracing the limitless potential of technology and its impact on our lives. This annual observance, held on August 8th (a nod to the double-8 date and its relevance to the symbol ∞), signifies the boundless opportunities that lie ahead in the ever-evolving digital age.

article thumbnail

Millions of UK voters’ data accessible in cyber-attack, says Electoral Commission

The Guardian Data Protection

Watchdog apologises for security breach in which names and addresses were accessible as far back as 2021 UK politics live – latest updates The data of millions of voters was accessible to hackers in a cyber-attack by “hostile actors” discovered almost a year ago, the Electoral Commission has admitted. The watchdog apologised for the security breach in which the names and addresses of millions of voters were accessible to hackers as far back as 2021.

Access 73