Fri.Feb 16, 2024

article thumbnail

US FTC Proposes Penalties for Deepfake Impersonators

Data Breach Today

FTC Says It Should Be Able to Sue Providers Who Know Their Tech Is Used for Fraud The U.S. Federal Trade Commission said it's too easy for fraudsters to launch "child in trouble" and romance scams, so it has proposed rule-making that would give the agency new authority to sue in federal court any technology providers that facilitate impersonation fraud.

IT 260
article thumbnail

RETVec: Resilient and Efficient Text Vectorizer

Elie

This research study presented at NeurIPS 2024 introduces RETVec, a robust and multilingual text vectorizer that provides efficiency and resilience against typos and adversarial attacks for neural-based text processing.

137
137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FDA Ramps Up Resources for Medical Device Cybersecurity

Data Breach Today

FDA's Dr. Suzanne Schwartz on How New 'Super Office' Boosts Agency's Cyber Efforts The FDA's multifaceted approach to strengthening medical device security centers on several key areas, including enhanced regulatory oversight, industry collaboration and a recent organizational change that raises the profile of the agency's device work, said the FDA's Dr.

article thumbnail

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say

WIRED Threat Level

A surprise disclosure of a national security threat by the House Intelligence chair was part of an effort to block legislation that aimed to limit cops and spies from buying Americans' private data.

Security 135
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ukrainian Behind Raccoon Stealer Operations Extradited to US

Data Breach Today

Mark Sokolovsky Has Fought Extradition From the Netherlands Since March 2022 Arrest A Dutch court extradited a Ukrainian national to the United States, where he faces criminal charges related to his role in the malware-as-a-service Raccoon Stealer. The extradition of Mark Sokolovsky, 28, comes nearly two years after Netherlands police arrested him in March 2022.

257
257

More Trending

article thumbnail

Cyberwar: What Is It Good For?

Data Breach Today

CISO Sam Curry and CMO Red Curry discuss the chaos and disruption of cyberwar and how attacks on critical infrastructure can tactically help attackers in combat, demoralize the general population and affect critical capabilities at just the right point in time.

IT 246
article thumbnail

US gov offers a reward of up to $10M for info on ALPHV/Blackcat gang leaders

Security Affairs

The U.S. government offers rewards of up to $10 million for information that could lead to the identification or location of ALPHV/Blackcat ransomware gang leaders. The U.S. Department of State is offering a reward of up to $10 million for information leading to the identification or location of the key figures behind the ALPHV/Blackcat ransomware operation.

article thumbnail

Navigating the AI Career Maze

Data Breach Today

CyberEd.io's Steve King on Job Opportunities Available in Age of AI The AI industry is exploding with demand for talent that can navigate the maze of machine learning, data analytics and neural networks. But what does this mean for the average IT person looking for a job? Steve King of CyberEd.io discusses finding work in the AI field.

Analytics 244
article thumbnail

CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2020-3259 Cisco ASA and FTD Information Disclosure Vulnerability CVE-2024-21410 Microsoft Exchange Server Privilege Escalation Vulnerability The vulnerability CVE-2020-3259

IT 117
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

On Point: Identity Fabric Is the Future of Cybersecurity

Data Breach Today

Improving Security by Integrating IAM Infrastructure, Applications and Services Protecting our identities is extremely important. An identity fabric is a robust identity control framework, but before you can roll one out, you need to understand all aspects of the IAM life cycle, assess all the areas of risk and make sure that remediation controls are in place.

article thumbnail

Maintaining GDPR and Data Privacy Compliance in 2024

IT Governance

Expert tips from Alan Calder Alan is the Group CEO of GRC International Group PLC, the parent company of IT Governance, and is an acknowledged international security guru. He’s also an award-winning author, and has been involved in developing a wide range of information security and data privacy training courses, has consulted for clients across the globe, and is a regular media commentator and speaker.

article thumbnail

Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs

Security Affairs

Russia-linked APT group Turla has been spotted targeting Polish non-governmental organizations (NGO) with a new backdoor dubbed TinyTurla-NG. Russia-linked cyberespionage group Turla has been spotted using a new backdoor dubbed TinyTurla-NG in attacks aimed at Polish non-governmental organizations. The Turla APT group (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ) has been active since at least 2004 targeting diplomatic and government organizations and private businesse

CMS 112
article thumbnail

Reducing defects and downtime with AI-enabled automated inspections

IBM Big Data Hub

A large, multinational automobile manufacturer responsible for producing millions of vehicles annually, engaged with IBM to streamline their manufacturing processes with seamless, automated inspections driven by real-time data and artificial intelligence (AI). As an automobile manufacturer, our client has an inherent duty to provide high-quality products.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Volt Typhoon Disrupts US Organizations, CISA Issues Alerts

eSecurity Planet

Volt Typhoon, a notorious cyber group linked to the People’s Republic of China, has expanded its operations beyond illegal access and data theft. This state-backed hacker collective, also known as Vanguard Panda, BRONZE SILHOUETTE, Dev-0391, UNC3236, Voltzite, and Insidious Taurus, has infiltrated the networks of critical infrastructure sectors ranging from aviation to maritime in a strategic bid for future catastrophic cyberattacks.

article thumbnail

Customer service vs customer experience: Key differentiators

IBM Big Data Hub

In many organizations, but not all, customer service is treated as part of the customer experience. Both are interested in driving customer satisfaction, but they focus on different parts of the customer journey to achieve it. So what are the key differences in customer service vs. customer experience? And why do both matter for your business? Customer experience , or CX, is a holistic accounting of customers’ perceptions resulting from all their interactions with a business or brand, whet

article thumbnail

Augmented Security: The Impact of AR on Cybersecurity

KnowBe4

Recently, Apple launched its Apple Vision Pro to much fanfare and has pushed the discussion of Augmented Reality (AR) beyond the realms of gaming and entertainment. From healthcare innovations to retail experiences and manufacturing enhancements, AR has the potential to reshape operational frameworks and redefine user interactions.

Retail 88
article thumbnail

What are Breach and Attack Simulations?

IBM Big Data Hub

Breach and Attack Simulation (BAS) is an automated and continuous software-based approach to offensive security. Similar to other forms of security validation such as red teaming and penetration testing , BAS complements more traditional security tools by simulating cyberattacks to test security controls and provide actionable insights. Like a red team exercise, breach and attack simulations use the real-world attack tactics, techniques, and procedures (TTPs) employed by hackers to proactively i

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Messaging Platform Telegram Sprouts Cyber Crime “Marketplaces” of Tools, Insights and Data

KnowBe4

Cybercriminals are taking advantage of the messaging platform Telegram by creating channels and groups where learning and commerce all can take place freely.

article thumbnail

Junk mail: how one click can lead to a deluge

The Guardian Data Protection

When piles of unsolicited mail and catalogues thud through the letterbox, ask yourself: how do they get your details and how can you stop it? Do catalogues from companies you have never heard of regularly land with a thud on your doormat? These deliveries of junk mail may make you wonder how the senders got your name and address – and if your personal details are being shared without your say-so.

Retail 74
article thumbnail

How are Medical Records Stored?

Record Nations

Medical records can be stored digitally as electronic health records (EHRs) or physically as paper documents. Typically, files used regularly are more accessible as an EHR. Whereas, long-term or inactive records are best stored offsite in physical files. Both options are regulated by HIPAA guidelines to protect privacy. HIPAA also requires that regardless of the.

Paper 75
article thumbnail

The right of access to personal data: a more extensive view?

Data Protection Report

This article first appeared in PLC Magazine in the January / February 2024 issue of PLC Magazine. The right of access to personal data looks set to be a key focus area for data protection regulators for 2024 in both the EU and the UK. The European Data Protection Board (EDPB) announced that its 2024 co-ordinated enforcement action will look at how controllers implement the right of access to personal data.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Vectara Launches New Chatbot Development Platform

Information Matters

Santa Clara-based startup Vectara has unveiled a new platform called Vectara Chat that aims to simplify and streamline the process of building chatbots using generative AI. The company says Vectara Read more The post Vectara Launches New Chatbot Development Platform appeared first on Information Matters - Where AI Meets Knowledge Management.

52
article thumbnail

SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles

WIRED Threat Level

The prototype satellites hitched a ride on a Falcon 9 rocket.

article thumbnail

SMARTPHONE SCREENS ARE ABOUT TO BECOME SPEAKERS via IEEE Spectrum

IG Guru

Check out the article here. The post SMARTPHONE SCREENS ARE ABOUT TO BECOME SPEAKERS via IEEE Spectrum first appeared on IG GURU.

Risk 66
article thumbnail

ISMG Editors: What Happened to the Cyberwar in Israel?

Data Breach Today

Also: Potential HIPAA Audit Revival; Security Risks of Sovereign AI In the latest weekly update, four ISMG editors discussed the relatively low profile of cyberwarfare in recent international conflicts, the potential revival of a dormant HIPAA compliance audit program and the security implications of sovereign AI development.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Friday Squid Blogging: Vegan Squid-Ink Pasta

Schneier on Security

It uses black beans for color and seaweed for flavor. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.