Tue.Oct 10, 2023

article thumbnail

Unknown Cyberespionage Group Targeted Taiwan

Data Breach Today

Threat Actor Likely Operates From A Region With A Strategic Interest In Taiwan A previously undetected cyberespionage group spied against Taiwanese government agencies and the island-country's manufacturing sector, say cybersecurity researchers. The Symantec Threat Hunter Team says it likely operates "from a region with a strategic interest in Taiwan.

article thumbnail

Patch Tuesday, October 2023 Edition

Krebs on Security

Microsoft today issued security updates for more than 100 newly-discovered vulnerabilities in its Windows operating system and related software, including four flaws that are already being exploited. In addition, Apple recently released emergency updates to quash a pair of zero-day bugs in iOS. Apple last week shipped emergency updates in iOS 17.0.3 and iPadOS 17.0.3 in response to active attacks.

Libraries 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TikTok Chief Summoned by EU Lawmakers For Privacy Probe

Data Breach Today

Parliamentary Committee Heads Says In-Person Appearance Would be "Beneficial" The head TikTok has been summoned by European lawmakers from different parliamentary committees for an inquiry into its privacy practices. In a letter sent to the TikTok CEO Shou Zi Chew on Thursday, the heads of five European Parliament committees requested that Chew appear for an in-person probe.

Privacy 309
article thumbnail

GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion

The Last Watchdog

As tragic as it is, we are in a space where video has become a crucial asset in wartime. Related: Apple tool used as warfare weapon Ukraine’s defense against Russian invaders has changed the role of video. Accessing video-based intelligence at the right time and place is a very effective method for gaining information about the constantly changing military landscape.

Metadata 130
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Researchers: North Korean Hackers Gain Speed, Flexibility

Data Breach Today

Regime Keeps Refining Cyber Operations Focused on Espionage and Financial Crime North Korea's state-sponsored hackers continue to refine their "cyber intrusions to conduct both espionage and financial crime to project power and to finance both their cyber and kinetic capabilities," says a new report from Google's Mandiant group.

294
294

More Trending

article thumbnail

McLaren Health Care Facing 3 Lawsuits in Ransomware Hack

Data Breach Today

Litigation Filed Days After Alphv/BlackCat Claimed to Have Stolen Data of 2.5 Million Patients A recent attack by a Russian ransomware-as-a-service group that stole the personal information of 2.5 million patients of McLaren Health Care has triggered at least three proposed federal class action lawsuits in recent days, claiming the healthcare company failed to protect patient privacy.

article thumbnail

Internet-Wide Zero-Day Bug Fuels Largest-Ever DDoS Event

Dark Reading

Ongoing Rapid Reset DDoS flood attacks exposed organizations need to patch CVE-2023-44487 immediately to head off crippling outages and business disruption.

139
139
article thumbnail

Ukraine Publishes Road Map for AI Regulation

Data Breach Today

Kyiv Sees Regulation As A Pathway to Closer European Integration The Ukrainian government says it will regulate AI, a step it portrays as a way to draw closer to the European Union, where rules for AI systems are close to approval. New rules will enable access to global markets and closer integration with the EU, the Ministry of Digital Transformation said.

article thumbnail

North Korea's State-Sponsored APTs Organize & Align

Dark Reading

An unprecedented collaboration by various APTs within the DPKR makes them harder to track, setting the stage for aggressive, complex cyberattacks that demand strategic response efforts, Mandiant warns.

108
108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New ‘HTTP/2 Rapid Reset’ technique behind record-breaking DDoS attacks

Security Affairs

A new DDoS technique named ‘HTTP/2 Rapid Reset’ is actively employed in attacks since August enabling record-breaking attacks. Researchers disclosed a new zero-day DDoS attack technique, named ‘HTTP/2 Rapid Reset’, that was exploited since August in record-breaking attacks. Google announced to have observed a new series of massive DDoS attacks that reached a peak of 398 million requests per second (rps).

article thumbnail

New One-Click Exploit Is a Supply Chain Risk for Linux OSes

Dark Reading

An overlooked library contains a vulnerability that could enable full remote takeover simply by clicking a link.

Libraries 131
article thumbnail

A flaw in libcue library impacts GNOME Linux systems

Security Affairs

A vulnerability in the libcue library impacting GNOME Linux systems can be exploited to achieve remote code execution (RCE) on affected hosts. A threat actor can trigger a vulnerability, tracked as CVE-2023-43641 (CVSS score: 8.8), in the libcue library impacting GNOME Linux systems to achieve remote code execution (RCE) on affected hosts. libcue provides an API for parsing and extracting data from CUE sheets.

Libraries 107
article thumbnail

Microsoft Patch Tuesday Haunted by Zero-Days, Wormable Bug

Dark Reading

October's CVE update is here. Here's which security vulnerabilities to patch now to exorcise your Microsoft systems demons.

Security 118
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Model Extraction Attack on Neural Networks

Schneier on Security

Adi Shamir et al. have a new model extraction attack on neural networks: Polynomial Time Cryptanalytic Extraction of Neural Network Models Abstract: Billions of dollars and countless GPU hours are currently spent on training Deep Neural Networks (DNNs) for a variety of tasks. Thus, it is essential to determine the difficulty of extracting all the parameters of such neural networks when given access to their black-box implementations.

Paper 99
article thumbnail

A Frontline Report of Chinese Threat Actor Tactics and Techniques

Dark Reading

Threat intel experts see a reduced focus on desktop malware as threat groups prioritize passwords and tokens that let them access the same systems as remote workers.

Passwords 104
article thumbnail

Google Makes Passkeys Default, Stepping Up Its Push to Kill Passwords

WIRED Threat Level

Google is making passkeys, the emerging passwordless login technology, the default option for users as it moves to make passwords “obsolete.

Passwords 110
article thumbnail

Badbox Operation Targets Android Devices in Fraud Schemes

Dark Reading

Researchers believe that more than 70,000 Android devices may have been affected with preloaded Peachpit malware that was installed on the electronics before being sold at market.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Improving Sustainability in the Workplace

Record Nations

The importance of sustainability has never been more evident. As we struggle with the consequences of climate change, and resource depletion, the need to prioritize sustainability in every aspect of our lives has become increasingly urgent. We can make a significant impact by improving sustainability in the workplace. In fact, 77% of consumers are more.

95
article thumbnail

How Keyloggers Have Evolved From the Cold War to Today

Dark Reading

Keyloggers have been used for espionage since the days of the typewriter, but today's threats are easier to get and use than ever.

113
113
article thumbnail

74% of CEOs Concerned About Their Organization's Ability to Protect Against Cyber Attacks, Despite Seeing Cybersecurity as Critical

KnowBe4

According to the recent The Cyber-Resilient CEO report released by IT services and consulting agency Accenture , a staggering 74% of CEOs have expressed concerns about their organizations' ability to protect their businesses from cyber attacks. This is despite the fact that 96% of CEOs acknowledge the importance of cybersecurity for the growth and stability of their organizations.

article thumbnail

Old-School Attacks Are Still a Danger, Despite Newer Techniques

Dark Reading

The cold, hard truth? Cybercriminals are still perpetuating plenty of unsophisticated attacks for a simple reason: They work.

108
108
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Smishing Triad Threat Actor Sets Its Sights on the UAE

KnowBe4

Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE).

IT 102
article thumbnail

IBM watsonx Assistant: Driving generative AI innovation with Conversational Search

IBM Big Data Hub

Generative AI has taken the business world by storm. Organizations around the world are trying to understand the best way to harness these exciting new developments in AI while balancing the inherent risks of using these models in an enterprise context at scale. Whether its concerns over hallucination, traceability, training data, IP rights, skills, or costs, enterprises must grapple with a wide variety of risks in putting these models into production.

Cloud 87
article thumbnail

Securely Moving Financial Services to the Cloud

Dark Reading

Financial services organizations migrating applications to the cloud need to think about cloud governance, applying appropriate policies and oversight, and compliance and regulatory requirements.

article thumbnail

Deploying applications built in external CI through IBM Cloud DevSecOps

IBM Big Data Hub

Cyber risk is preeminent in today’s threat landscape, and that includes attacks on the software supply chain. In fact, the increase in cyberattacks on software supply chains is estimated to affect 45% of organizations worldwide. These are referred to as supply chain risks, and they include vulnerable code that may be included from open source or third parties.

Cloud 79
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Reasonable Valuations Drove Mergers and Acquisition Activity in Q3, 2023

Dark Reading

Cisco's $28 billion purchase of Splunk was the biggest story, but other security majors made strategic acquisitions as well in a better-than-expected quarter.

article thumbnail

6 ways to avoid and reduce data debt via InfoWorld

IG Guru

Check out the article here. The post 6 ways to avoid and reduce data debt via InfoWorld first appeared on IG GURU.

Risk 84
article thumbnail

Guidance on Digitization and Quality Management

National Archives Records Express

Digitization Project at Archives I, National Archives Identifier: 184341402 We are pleased to announce the release of the Digitization Quality Management Guide. This guide provides detailed information about the various aspects of quality management (QM) in digitization, including quality assurance and quality control, as well as the role of objective testing and automation in optimizing quality control and inspection processes.