Wed.Oct 04, 2023

article thumbnail

Okta Buys Personal Password Manager Uno to Service Consumers

Data Breach Today

Uno's Design Wisdom Will Accelerate Rollout of Okta's First-Ever Consumer Product Okta bought a password manager founded by a former Google engineer and backed by Andreessen Horowitz to get a foothold in the consumer identity market. Okta was impressed by Uno's experience in building consumer-first, design-focused and easy-to-use password management and personal identity tools.

Passwords 292
article thumbnail

STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

The Last Watchdog

Something simply must be done to slow, and ultimately reverse, attack surface expansion. Related: What Cisco’s buyout of Splunk really signals We’re in the midst of driving towards a dramatically scaled-up and increasingly connected digital ecosystem. Companies are obsessed with leveraging cloud-hosted IT infrastructure and the speedy software development and deployment that goes along with that.

Risk 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US FTC Keeping 'Close Watch' on Artificial Intelligence

Data Breach Today

Consumers Complain of Bias, Fraud, Privacy, Copyright, Data Use Concerns The U.S. FTC says it is keeping a "close watch" on artificial intelligence, writing Tuesday that it has received a swath of complaints objecting to bias, collection of biometric data such as voice prints and limited ways to appeal a decisive algorithm that fails to satisfy consumers.

article thumbnail

How Neuralink Keeps Dead Monkey Photos Secret

WIRED Threat Level

Elon Musk’s brain-chip startup conducted years of tests at UC Davis, a public university. A WIRED investigation reveals how Neuralink and the university keep the grisly images of test subjects hidden.

Privacy 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

North Korean Hackers Target South Korean Naval Shipyards

Data Breach Today

Nation-State Attacks on Defense Manufacturers Rising Since November 2022 South Korean national intelligence has sounded alarms about North Korean hackers targeting the country's shipbuilding industry to steal naval military secrets. The agency said the hacks are part of North Korean leader Kim Jong Un's strategy to build larger, more advanced warships.

Military 284

More Trending

article thumbnail

Amazon Web Services Warns of TorchServe Flaws

Data Breach Today

Open-Source Tool Used By of Global Enterprises Working With AI A clutch of vulnerabilities in an open source tool used by major corporations to scale up machine learning models could lead to remote takeover, says a cybersecurity firm in an warning downplayed by Meta, which co-manages the open source project.

article thumbnail

'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover

Dark Reading

The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.

IoT 133
article thumbnail

Cyber Mavens Slam Europe's Cyber Resilience Act

Data Breach Today

Experts Warn Vulnerability Disclosure to Government Agencies Increases Hacking Risks More than four dozen cybersecurity mavens say a proposed European Union mandate for software publishers to inform the trading bloc's cybersecurity agency of zero day exploits within 24 hours of their discovery risks harming cybersecurity efforts.

article thumbnail

Safe, Secure, Anonymous, and Other Misleading Claims

Troy Hunt

Imagine you wanted to buy some s**t on the internet. Not the metaphorical kind in terms of "I bought some random s**t online", but literal s**t. Turds. Faeces. The kind of thing you never would have thought possible to buy online until. Shitexpress came along. Here's a service that enables you to send an actual piece of smelly s**t to "An irritating colleague.

Security 132
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Red Cross Tells Hacktivists: Stop Targeting Hospitals

Data Breach Today

Of Course, KillNet and Its Ilk Don't Care - They're Likely Proxies for Moscow Hacktivists who hit healthcare or otherwise target civilians are violating international humanitarian law, warns the International Committee of the Red Cross. As many self-proclaimed hacktivists appear to be Russian government cutouts, will legal threats make them rethink their life choices?

article thumbnail

Atlassian Confluence zero-day CVE-2023-22515 actively exploited in attacks

Security Affairs

Atlassian fixed a critical zero-day flaw in its Confluence Data Center and Server software, which has been exploited in the wild. Software giant Atlassian released emergency security updates to address a critical zero-day vulnerability, tracked as CVE-2023-22515 (CVSS score 10), in its Confluence Data Center and Server software. The flaw CVE-2023-22515 is a privilege escalation vulnerability that affects Confluence Data Center and Server 8.0.0 and later.

Mining 127
article thumbnail

Atos Taps Senior Accenture Exec to Run Eviden Security Group

Data Breach Today

Current Atos Security Leader to Leave as Company Gets 3rd CEO In Less Than 2 Years Atos snagged the longtime European CEO of Accenture Technology to lead its soon-to-be-independent $5.76 billion cybersecurity, big data and digital unit. Yves Bernaert, 55, will split Atos' infrastructure and data management and business and platform solutions unit from its high-growth Eviden unit.

Big data 272
article thumbnail

Phishing campaign targeted US executives exploiting a flaw in Indeed job search platform

Security Affairs

Threat actors exploited an open redirection vulnerability in the job search platform Indeed to carry out phishing attacks. Researchers from the cybersecurity firm Menlo Security reported that threat actors exploited an open redirection vulnerability in the job search platform Indeed in phishing attacks. The phishing attacks were aimed at senior executives across various industries, primarily in Banking, Financial, Insurance, Property Management and Real Estate, and Manufacturing sectors.

Phishing 120
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Hacker Perspective on Generative AI and Cybersecurity

Data Breach Today

Unveiling the Risks and Insights: A Hacker's Take on Generative AI and Cybersecurity Discover the crucial insights and predictions from experienced hackers about the intersection of Generative AI and cybersecurity, including emerging risks, vulnerabilities, and innovative approaches to safeguarding data and systems in this brave new world.

article thumbnail

A cyberattack disrupted Lyca Mobile services

Security Affairs

International mobile virtual network operator Lyca Mobile announced it has been the victim of a cyber attack that disrupted its network. Lyca Mobile is a mobile virtual network operator (MVNO) that provides prepaid mobile phone services to customers in several countries worldwide. A mobile virtual network operator doesn’t own its own physical wireless network infrastructure but instead leases network services from established mobile carriers.

Retail 118
article thumbnail

Attackers Exploit SQL Server to Penetrate Azure Cloud

Data Breach Today

Microsoft Discloses Unusual Hacking Attempt Microsoft says it spotted an unusual hacking campaign in which hackers attempted to move laterally through the Azure cloud after compromising a virtual SQL server. It marks the first time that computing giant defenders have seen a lateral movement attempt with SQL Server as the starting point.

Cloud 167
article thumbnail

Apple fixed the 17th zero-day flaw exploited in attacks

Security Affairs

Apple released emergency security updates to address a new actively exploited zero-day vulnerability impacting iPhone and iPad devices. Apple released emergency security updates to address a new zero-day vulnerability, tracked as CVE-2023-42824, that is exploited in attacks targeting iPhone and iPad devices. The vulnerability is a privilege escalation issue that resides in the Kernel, it was addressed with improved checks. “A local attacker may be able to elevate their privileges.

Security 119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Common Grounds: Unleashing innovation and growth through partnership

IBM Big Data Hub

At IBM, we believe we can make greater progress together. Our purpose is to be the catalyst that makes the world work better—and our partners are key to this mission. Together with our partners and clients, we work to solve the most complex challenges with AI and hybrid cloud. Last year, we launched our “ Common Grounds ” video series to showcase the value of partnership and how we’re better together.

Libraries 104
article thumbnail

DRM Report Q2 2023 – Ransomware threat landscape

Security Affairs

The DRM Report Q2 2023 report provides a detailed insight into the ransomware threat landscape during the period between May and August 2023. In an era where digitalization has woven its web into the very fabric of our lives, the dark underbelly of the digital realm continues to pose an ever-growing threat. Ransomware, a menace that has evolved into a formidable adversary, takes center stage in our examination of the cyber threat landscape during the second quarter of 2023.

article thumbnail

Turnkey Rootkit for Amateur Hackers Makes Supply Chain Attacks Easy

Dark Reading

It's never been easier to hide malware in plain sight in open source software package repositories, and "DiscordRAT 2.0" now makes it easy to take advantage of those who stumble upon it.

IT 105
article thumbnail

Chipmaker Qualcomm warns of three actively exploited zero-days

Security Affairs

Chipmaker Qualcomm addressed 17 vulnerabilities in various components and warns of three other actively exploited zero-day flaws. Chipmaker Qualcomm released security updates to address 17 vulnerabilities in several components. Three out of 17 flaws are rated Critical, 13 are rated High, and one is rated Medium in severity. The company is also warning that three other zero-day vulnerabilities are actively exploited in attacks in the wild.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor

WIRED Threat Level

New research has found that some streaming devices and dozens of Android and iOS apps are secretly being used for fraud and other cybercrime.

Security 120
article thumbnail

Episode 253: DevSecOps Worst Practices With Tanya Janca of We Hack Purple

The Security Ledger

Tanya Janca of the group We Hack Purple, talks with Security Ledger host Paul Roberts about the biggest security mistakes that DevSecOps teams make, and application development’s “tragedy of the commons,” as more and more development teams lean on open source code. The post Episode 253: DevSecOps Worst Practices With Tanya Janca of We Hack. Read the whole entry. » Click the icon below to listen.

article thumbnail

Which Files Do You Need to Encrypt?

Record Nations

In today’s increasingly digital world, the importance of safeguarding your personal and sensitive information cannot be overstated. Data breaches and cyberattacks have become all too common, putting our personal, financial, and professional information at risk. One effective way to enhance your digital security is by encrypting your files. But which files should you encrypt?

article thumbnail

Data mesh: The key to innovation in government

Collibra

To help federal agencies maximize innovation efforts, Collibra and Accenture Federal Services recently hosted ‘Enabling a Federal Data Mesh ,’ a webinar to demonstrate the data mesh experience and illustrate how it can accelerate data discovery and speed time-to-value for federal agencies. Watch the webinar It’s a digital world The truth is that in an increasingly digital world, the need for organizations to be data-driven has never been more pronounced.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Open-Source Intelligence (OSINT): Learn the Methods Bad Actors Use to Hack Your Organization

KnowBe4

They are out there, watching and waiting for an opportunity to strike; the bad actors who have carefully researched your organization in order to set the perfect trap using easily found public resources. Open-Source Intelligence (OSINT) can provide cybercriminals everything they need to know to perfectly target your users by gathering data on everything from password clues to tech stack details, banking/credit card accounts, social media details and more.

article thumbnail

AWS Plans Multifactor Authentication Mandates for 2024

Dark Reading

Amazon will add new MFA requirements for users with the highest privileges, with plans to include other user levels over time.

article thumbnail

The Impact of AI-assisted Call Spoofing and What We Can Do About It

Thales Cloud Protection & Licensing

The Impact of AI-assisted Call Spoofing and What We Can Do About It madhav Thu, 10/05/2023 - 05:12 It is widely discussed that cyber criminals look for the easiest way to maximize profit. They are also keen to capitalize on the most vulnerable and to exploit crises, such as during the pandemic or political instability. One of their favorite targets is the older generation.

IT 83