Wed.Apr 19, 2023

article thumbnail

Emerging Security Concerns About Generative AI in Healthcare

Data Breach Today

Generative AI tools such as ChatGPT will undoubtedly change the way clinicians and healthcare cybersecurity professionals work, but the use of these technologies come with security, privacy and legal concerns, says Lee Kim of the Healthcare Information Management and Systems Society.

Security 272
article thumbnail

The Hacker Who Hijacked Matt Walsh’s Twitter Was Just ‘Bored’

WIRED Threat Level

The breach of the right-wing provocateur was simply a way of “stirring up some drama,” the attacker tells WIRED. But the damage could have been much worse.

Security 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine Facing Phishing Attacks, Information Operations

Data Breach Today

Russia's Invasion Tactics Include Creating Fake Hacktivist Groups, Researchers Find The Russian government continues to use an array of phishing attacks and information operations - including hack-and-leak efforts and running hacktivist groups such as CyberArmyofRussia - to support its illegal invasion of Ukraine, Google researchers report.

Phishing 268
article thumbnail

Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones

Dark Reading

Unsophisticated attackers can pinpoint where a person lives by lifting metadata from Strava and other apps, even if they're using a feature specifically aimed at protecting their location information.

Metadata 126
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Akamai to Buy Startup Neosec for API Detection and Response

Data Breach Today

Proposed Neosec Deal Will Help Akamai Customers Discover APIs and Assess Their Risk Akamai Technologies has agreed to purchase a finalist in last year's RSA Conference Innovation Sandbox Contest to get more visibility into the API threat landscape. Silicon Valley-based Neosec will help customers discover all their APIs, assess their risk and respond to vulnerabilities and attacks.

Risk 245

More Trending

article thumbnail

5 Cybersecurity Pillars Where 85% of Companies Are Lagging

Data Breach Today

Only 15% of Global Orgs Rank as 'Mature' on Cisco’s Cybersecurity Readiness Index Cisco's Cybersecurity Readiness Index shows a mere 15% of global organizations rank as mature across five security pillars.

article thumbnail

Iran-linked Mint Sandstorm APT targeted US critical infrastructure

Security Affairs

An Iran-linked APT group tracked as Mint Sandstorm is behind a string of attacks aimed at US critical infrastructure between late 2021 to mid-2022. Microsoft has linked the Iranian Mint Sandstorm APT (previously tracked by Microsoft as PHOSPHORUS ) to a series of attacks aimed at US critical infrastructure between late 2021 to mid-2022. The IT giant reported Mint Sandstorm is refining its tactics, techniques, and procedures (TTPs).

article thumbnail

AI Heightens Cyber Risk for Legacy Weapon Systems

Data Breach Today

'Blind Faith' Architectures Pervade Military Arsenal The U.S. weapons arsenal developed without a zero trust architecture is at growing risk from cyberattacks, lawmakers heard today in a panel dedicated to how artificial intelligence can simultaneously help and hurt efforts to protect warfighters from digital attacks.

Risk 157
article thumbnail

US and UK agencies warn of Russia-linked APT28 exploiting Cisco router flaws

Security Affairs

UK and US agencies are warning of Russia-linked APT28 group exploiting vulnerabilities in Cisco networking equipment. Russia-linked APT28 group accesses unpatched Cisco routers to deploy malware exploiting the not patched CVE-2017-6742 vulnerability (CVSS score: 8.8), states a joint report published by the UK National Cyber Security Centre ( NCSC ), the US National Security Agency ( NSA ), US Cybersecurity and Infrastructure Security Agency ( CISA ) and US Federal Bureau of Investigation ( FBI )

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Aren't 3rd Parties More Transparent About Breaches?

Data Breach Today

Vendors should be more transparent and faster in communicating when they experience a breach or other security incident that affect clients' data, says Anahi Santiago, CISO at ChristianaCare. "Sometimes we find out about these incidents through our third-party monitoring systems," she said.

article thumbnail

KnowBe4 Named a Leader in the Spring 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Spring 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the eigth consecutive quarter!

article thumbnail

Russian Hacktivists Aspire to Attack Critical Infrastructure

Data Breach Today

UK NCSC Calls on Critical Infrastructure Entities to Strengthen Defenses Britain's National Cyber Security Centre said Russian hacktivists have ambitions of becoming a larger threat to Western critical infrastructure. "Disclosing this threat is not something we do lightly," said U.K. Cabinet Office Secretary of State Oliver Dowden.

Security 144
article thumbnail

Wayfinding – Indoor Positioning System for Navigating Large Campuses

HID Global

HID's IPS improves a visitor's experience and as they navigate their way on large campuses like a hospital and saves costs from late or missed appointments.

98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Iranian State Hacker Aggression Escalates, Says Microsoft

Data Breach Today

Subgroup of Mint Sandstorm Threat Group Is Exploiting Vulnerabilities More Quickly An Iranian state hacking group shifted from espionage to direct targeting of U.S. critical infrastructure - a likely indicator of newfound aggression by the national security apparatus, says Microsoft. One sign of Iran's new intensity is quicker uptake of exploits of newly disclosed vulnerabilities.

Security 144
article thumbnail

Portnox Cloud: NAC Product Review

eSecurity Planet

Portnox Cloud offers network access control (NAC) as a cloud-hosted SaaS solution that enables rapid deployment of basic NAC capabilities. Although the capabilities are more limited than some NAC competitors, the quick deployment and reduced IT labor costs make Portnox Cloud an attractive solution for many. To compare Portnox Cloud against competitors, see our complete list of top network access control (NAC) solutions.

Cloud 88
article thumbnail

Poorly Set Server, Human Error Blamed for DC Health Breach

Data Breach Today

Lawmakers Call for Firing in the Wake of Data Breach That Affected Congress House Oversight Committee members on Thursday called for the firing of whoever caused the DC Health Benefit Exchange breach and exposed the personal information of Congress members on a dark web forum. The breached was blamed on "human error" and a server configured with no authentication controls.

article thumbnail

That Email Isn’t from the New Jersey Attorney General

KnowBe4

Earlier this month, state employees in the US state of New Jersey began receiving emails that falsely represented themselves as originating with the state’s attorney general.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Russian national sentenced to time served for committing money laundering for the Ryuk ransomware operation

Security Affairs

Russian national Denis Mihaqlovic Dubnikov has been sentenced to time served for committing money laundering for the Ryuk ransomware operation. Russian national Denis Dubnikov (30) has been sentenced to time served for committing money laundering for the Ryuk ransomware group. The man was also ordered to pay $2,000 in restitution. On February 7, 2023, Dubnikov pleaded guilty in the U.S. to one count of conspiracy to commit money laundering for the Ryuk ransomware operation.

article thumbnail

EFF on the UN Cybercrime Treaty

Schneier on Security

EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being negotiated in Vienna. The draft treaty has the potential to rewrite criminal laws around the world, possibly adding over 30 criminal offenses and new expansive police powers for both domestic and international criminal investigations. […] While we don’t think the U.N.

Privacy 79
article thumbnail

Guarding Against AI-Enabled Social Engineering: Lessons from a Data Scientist's Experiment

KnowBe4

The Verge came out with an article that got my attention. As artificial intelligence continues to advance at an unprecedented pace, the potential for its misuse in the realm of information security grows in parallel. A recent experiment by data scientist Izzy Miller shows another angle.

article thumbnail

Michelle’s Google Usage Is Down 60 Percent. Discuss.

John Battelle's Searchblog

Uh oh, Google. On Sunday The New York Times reported that Google is furiously working to incorporate conversational AI into its core search products – not exactly news, but there was a larger takeaway: Google has got to get some killer AI products out the door, and fast, or it risks losing its core users for good. And if my own family is any indication, the company is already imperiled.

Risk 75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Russian Fancy Bear APT Exploited Unpatched Cisco Routers to Hack US, EU Gov't Agencies

Dark Reading

The nation-stage threat group deployed custom malware on archaic versions of Cisco's router operating system. Experts warn that such attacks targeting network infrastructure are on the rise.

75
article thumbnail

Regulatory Update: National Association of Insurance Commissioners Spring 2023 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Spring 2023 National Meeting (Spring Meeting) March 21–25, 2023. This Sidley Update summarizes the highlights from this meeting in addition to interim meetings held in lieu of taking place during the Spring Meeting. Highlights include continued development of accounting principles and investment limitations related to certain types of bonds and structured securities, continued discussion of considerations related to private equi

article thumbnail

Newer Authentication Tech a Priority for 2023

Dark Reading

Organizations are planning on newer multifactor authentication methods, such as invisible MFA and passwordless, says SecureAuth in its "State of Authentication" report.

article thumbnail

How ChatGPT—and Bots Like It—Can Spread Malware

WIRED Threat Level

Generative AI is a tool, which means it can be used by cybercriminals, too. Here’s how to protect yourself.

IT 85
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Coro Raises an Additional $75M Bringing the Total Raised to $155M in 12 Months

Dark Reading

New funding to drive aggressive growth of industry’s only cybersecurity platform that brings enterprise grade cybersecurity to the mid-market; 300% year-over-year growth projected for 5th year in a row.

article thumbnail

OpenText World EMEA 2023 – Innovation Summits come to Paris

OpenText Information Management

OpenText World EMEA 2023 – Innovation Summits is coming to Paris, France on April 26, the second stop of the three-city tour. Join global thought leaders and regional experts for an unforgettable, event-packed day learning about the future of information management. Taking place at the historic Maison de la Chimie, in the heart of Paris, OpenText … The post OpenText World EMEA 2023 – Innovation Summits come to Paris appeared first on OpenText Blogs.

article thumbnail

Killnet Boss Exposes Rival Leader in Kremlin Hacktivist Beef

Dark Reading

Killnet's leader outs the identity of the new Anonymous Russia leader, in an effort to consolidate power among pro-Russia cybercriminals.

78