Thu.Feb 15, 2024

article thumbnail

Ivanti Uses End-of-Life Operating Systems, Software Packages

Data Breach Today

Outdated Software, Exploited Flaws, Security Loopholes Expose Ivanti's Devices Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.

Security 287
article thumbnail

News alert: Harter Secrest & Emery announces designation as NetDiligence-authorized Breach Coac

The Last Watchdog

Rochester, N.Y. Feb. 15, 2024 – Harter Secrest & Emery LLP , a full-service business law firm with offices throughout New York, is pleased to announce that it has been selected as a NetDiligence-authorized Breach Coach ® , a designation only extended to law firms that demonstrate competency and sophistication in data breach response. Through its Breach Coach ® designation, NetDiligence recognizes Harter Secrest & Emery as an industry leader and enhances the firm’s reputation as a trusted

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Banking Trojan Harvests Facial Biometrics for AI Deepfakes

Data Breach Today

GoldPickaxe Malware Can Record User’s Face, Use Video to Commit Deepfake Scams A Chinese-speaking cybercrime group with the codename GoldFactory has built a new Android and iOS banking Trojan, GoldPickaxe, that can harvest and steal personal details, including biometric face profiles, that attackers use to create AI-driven deepfakes to fool bank defenses, researchers warn.

272
272
article thumbnail

China Plans to Accelerate Cross-Border Data Transfers by Implementing Trial Rules in Shanghai Pilot Free Trade Zone

Hunton Privacy

Recent developments in the Shanghai Pilot Free Trade Zone to facilitate cross-border data transfers are expected to provide greater flexibility in exporting data from China, which has been stymied by the Cyberspace Administration of China (“CAC”)’s strict cross-border data transfer regulations proposed in December 2023. In recent years, the legal framework and practical enforcement for cross-border data transfers in China have undergone significant developments, especially with respect to the CA

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Breach Roundup: Zeus Banking Trojan Leader Pleads Guilty

Data Breach Today

Also: Polish Prime Minister Says Previous Administration Deployed Pegasus Spyware This week, the Zeus leader pleaded guilty, Prudential detected hackers, U.S. telecoms have to report breaches, Microsoft patched zero-days, researchers said Chinese threat intel is faulty, ransomware hit Romanian healthcare entities, Juniper was breached and Poland allegedly previously used Pegasus.

More Trending

article thumbnail

Banking Trojan GoldPickaxe Harvests Facial Biometrics

Data Breach Today

Both iOS and Android Variants Can Record Face Videos, Used to Create AI Deepfakes A Chinese-speaking cybercrime group codenamed GoldFactory has built a new Android and iOS banking Trojan, GoldPickaxe, that can to harvest and steal personal details, including biometric face profiles, which attackers use to create AI-driven deepfakes to fool bank defenses, researchers warn.

268
268
article thumbnail

OpenText Elevates Data Intelligence with Aviator Platform at TDWI Transform 2024 

OpenText Information Management

In just a few days, OpenText will make its mark at the TDWI Transform 2024 conference in Las Vegas as a Platinum Level Sponsor! As a global leader in data intelligence, we are excited to connect with a select group of professionals and unveil our latest innovations. Can’t attend in person? You can also check out … The post OpenText Elevates Data Intelligence with Aviator Platform at TDWI Transform 2024 appeared first on OpenText Blogs.

IT 110
article thumbnail

Cryptohack Roundup: Cash Is Still King for Criminals

Data Breach Today

Also: Changpeng Zhao's Sentencing; UN Probe of North Korean Hacks This week, the U.S. Treasury reported on crypto in crime, Changpeng Zhao's sentencing was rescheduled, PlayDapp was hacked, the UN probed North Korean hacking, suspicious crypto transactions increased in South Korea, the U.K. blocked fraud sites and Hong Kong warned about crypto phishing sites.

Phishing 260
article thumbnail

US Gov dismantled the Moobot botnet controlled by Russia-linked APT28

Security Affairs

The US authorities dismantled the Moobot botnet, which was controlled by the Russia-linked cyberespionage group APT28. A court order allowed US authorities to neutralize the Moobot botnet, a network of hundreds of small office/home office (SOHO) routers under the control of the Russia-linked group APT28. The botnet was used by the Russian state-sponsored hackers to carry out a broad range of attacks. “A January 2024 court-authorized operation has neutralized a network of hundreds of small

Military 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sophos' Kris Hagerman Steps Down as CEO, Joe Levy Takes Helm

Data Breach Today

Hagerman Moves to Advisory Role After Leading Company for the Past 12 Years Sophos announced Thursday that its CEO for the past 12 years, Kris Hagerman, has stepped down. Long-time Sophos executive Joe Levy, who has nearly three decades of experience in cybersecurity products and services, is the new president and acting CEO, "effective immediately.

article thumbnail

Jobcentres told to stop referring benefit claimants to food banks

The Guardian Data Protection

DWP briefing says jobcentres should no longer issue ‘signposting slips’ over concerns about data privacy Jobcentre officials have been ordered to stop referring penniless benefit claimants to food banks because it breaches data privacy law, in a move charities have warned will cause delays in crisis help for thousands of hungry households. For years the Department for Work and Pensions (DWP) has allowed jobcentres to issue DWP-designed “signposting slips”, which allow claimants to access local f

article thumbnail

Russia Continues to Focus on Cyber Operations and Espionage

Data Breach Today

Google and Mandiant Researchers Track Russia-Ukraine War Tactics Ahead of Elections Russia continues to focus on running cyber operations and espionage that target Ukraine's military, government and civil society in support of its ground campaign, researchers at Google said, warning that the information operations will likely soon be brought to bear on Western elections.

Military 247
article thumbnail

A cyberattack halted operations at Varta production plants

Security Affairs

On February 12, 2023, a cyber attack halted operations at five production plants of German battery manufacturer Varta. On February 13, German battery manufacturer Varta announced that a cyber attack forced the company to shut down IT systems. The attack disrupted operations at five production plants and the administration. VARTA AG is a leading global manufacturer of batteries with over 4,500 employees worldwide, reporting revenue of €1.2 billion in 2023.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

OpenAI and Microsoft Terminate State-Backed Hacker Accounts

Data Breach Today

Hackers Used LLMs to Perform Tasks That Non-AI Tools Can Perform Nation-state hackers including Russian military intelligence and hackers backed by China have used OpenAI large language models for research and to craft phishing emails, the artificial intelligence company disclosed Tuesday in conjunction with major financial backer Microsoft.

article thumbnail

Phishing Campaign Exploits Remote Desktop Software

KnowBe4

A phishing campaign is attempting to trick users into downloading remote monitoring and management (RMM) software like AnyDesk, Atera, and Splashtop, according to researchers at Malwarebytes.

Phishing 102
article thumbnail

To Avoid Bankruptcy, EMR Firm Settles Lawsuit for $4M

Data Breach Today

Pediatric Tech Vendor Hit by 2022 Data Breach Affecting 3 Million - Mostly Children An electronic health record and practice management software firm says the only way to avoid bankruptcy from the consolidation of nine proposed class action lawsuits filed in the wake of a 2022 data breach is to settle the case for $4 million.

article thumbnail

North Korea-linked actors breached the emails of a Presidential Office member

Security Affairs

The office of South Korean President Yoon Suk Yeol said that North Korea-linked actors breached the personal emails of one of his staff members. The office of South Korean President Yoon Suk Yeol announced a security incident involving the compromise of personal emails belonging to a member of the presidential staff. The government attributes the security breach to North Korean threat actors.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

US Disrupts Russian Military Intelligence Botnet

Data Breach Today

GRU Hackers Commandeered 'Moobot' for Cyberespionage The U.S. federal government says it disrupted a criminal botnet that Russian military intelligence had converted into a platform for global cyberespionage. The malware targets Linux-based IoT devices - in this case, routers made by New York manufacturer Ubiquiti.

Military 241
article thumbnail

On the Insecurity of Software Bloat

Schneier on Security

Good essay on software bloat and the insecurities it causes. The world ships too much code, most of it by third parties, sometimes unintended, most of it uninspected. Because of this, there is a huge attack surface full of mediocre code. Efforts are ongoing to improve the quality of code itself, but many exploits are due to logic fails, and less progress has been made scanning for those.

article thumbnail

Unveiling the transformative AI technology behind watsonx Orders

IBM Big Data Hub

You’re headed to your favorite drive-thru to grab fries and a cheeseburger. It’s a simple order and as you pull in you notice there isn’t much of a line. What could possibly go wrong? Plenty. The restaurant is near a busy freeway with roaring traffic noise and airplanes fly low overhead as they approach the nearby airport. It’s windy.

Sales 91
article thumbnail

Iran-Aligned Threat Actor "CharmingCypress" Launches Spear Phishing Attacks

KnowBe4

Researchers at Volexity warn that the suspected Iranian threat actor CharmingCypress (also known as “Charming Kitten” or “APT42”) has been launching spear phishing attacks against Middle Eastern policy experts.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The U.S. Plans to ‘Lead the Way’ on Global AI Policy

Data Matters

Policymakers around the world took significant steps toward regulating artificial intelligence (AI) in 2023. Spurred by the launch of revolutionary large language models such as OpenAI’s GPT series of models, debates surrounding the benefits and risks of AI have been brought into the foreground of political thought. Indeed, over the past year, legislative forums, editorial pages, and social media platforms were dominated by AI discourse.

article thumbnail

Number of Data Compromises Affecting U.S. Organizations Rises To 77%

KnowBe4

New data summarizing the compromises of data in 2023 provides key details on who’s being targeted, what types of data is being compromised, and what attack vectors are being used.

article thumbnail

How digital fax and capture are transforming healthcare

OpenText Information Management

Every second, an exponential amount of healthcare data is created and mined for valuable insights. A staggering 30% of the world’s data volume is currently generated by the healthcare industry. The compound annual growth rate of healthcare data will reach 36% by 2025 – rising 6% faster than manufacturing, 10% faster than financial services and … The post How digital fax and capture are transforming healthcare appeared first on OpenText Blogs.

Mining 67
article thumbnail

Over Half of Malware Downloads Originate from SaaS Apps

KnowBe4

As the popularity of SaaS apps continues to grow, security analysts expect the misuse of such apps as the host for malware downloads to continue to rise through 2024.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

6 Ways to elevate the Salesforce experience for your users

IBM Big Data Hub

Customers and partners that interact with your business, as well as the employees who engage them, all expect a modern, digital experience. According to the Salesforce Report, nearly 90% Of buyers say the experience a company provides matters as much as products or services. Whether using Experience Cloud, Sales Cloud, or Service Cloud, your Salesforce user experience should be seamless, personalized and hyper-relevant, reflecting all the right context behind every interaction.

Cloud 73
article thumbnail

Google stops notifying publishers of ‘right to be forgotten’ removals from search results

The Guardian Data Protection

Move comes after Swedish court rules that informing webmasters about delisted content is breach of privacy Google has quietly stopped telling publishers when it has removed websites from its search results under European “right to be forgotten” rules after a ruling in a Swedish court which the search engine is applying globally. Previously, when an individual applied to have records about them expunged under EU data protection laws, Google would notify the publisher of the original articles.

Privacy 65
article thumbnail

How to achieve Kubernetes observability: Principles and best practices

IBM Big Data Hub

Kubernetes (K8s) containers and environments are the leading approach to packaging, deploying and managing containerized applications at scale. The dynamic, open-source , microservices-based configuration of Kubernetes can be a great fit for businesses that are looking to maximize infrastructure agility. However, the distributed flexibility that makes Kubernetes appealing can also make implementing Kubernetes monitoring and observability practices challenging.

Cloud 72