Tue.Jan 23, 2024

article thumbnail

Medical Lab Database Exposed 1.3M Records, COVID Test Info

Data Breach Today

Researcher Reported Configuration Issue to Cloud Vendor After Lab Failed to Respond An unsecured database appearing to belong to a Netherlands-based medical laboratory exposed 1.3 million records on the internet, including COVID test results and other personal identifiable information, said a security researcher who discovered the trove and reported his findings to the company.

Cloud 293
article thumbnail

Navigating Your Career Path with Challenges and Supports

AIIM

I love information management! I love the information governance, records management, and data governance fields. Most of my family and friends think I’m crazy and I would agree with them. This work doesn’t excite everyone. I didn’t always use to be in this field though. Before entering the information management field, I spent 25 years in higher education.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia, US, UK Sanction Russian Over 2022 Medibank Breach

Data Breach Today

Governments Accuse Aleksandr Ermakov and REvil of Being Medibank Hackers The United States, Australia and the United Kingdom sanctioned a Russian man the governments say was behind the October 2022 hacking of Medibank, Australia's largest private health insurer. The attack was a high point in a wave of data breaches buffeting the country that year.

Insurance 290
article thumbnail

Black Basta gang claims the hack of the UK water utility Southern Water

Security Affairs

The Black Basta ransomware gang claimed to have hacked the UK water utility Southern Water, a major player in the UK water industry. Southern Water is a private utility company responsible for collecting and treating wastewater in Hampshire, the Isle of Wight, West Sussex, East Sussex and Kent, and for providing public water supply to approximately half of this area.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Malicious Traffic Distribution System Spotted by Researchers

Data Breach Today

Cybercrime Groups Hire VexTrio to Help Route Victims to Their Malicious Content As if the cybercrime ecosystem wasn't already damaging enough, security researchers have discovered a malicious traffic broker named VexTrio, which affiliates hire to route victims to their malicious content that is often disguised via fake dating site profiles, tech support or browser updates.

Security 285

More Trending

article thumbnail

UK Intelligence Agency Warns of Mounting AI Cyberthreat

Data Breach Today

British Lawmakers Call on Government to Boost Protections From AI Scams Generative artificial intelligence-enabled ransomware and nation-state hacks in the United Kingdom are "almost certainly" likely to surge after this year, the National Cyber Security Center warned. And British lawmakers called on the government to roll out measures to prevent AI scams.

article thumbnail

CISA adds VMware vCenter Server bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds VMware vCenter Server Out-of-Bounds Write bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a VMware vCenter Server Out-of-Bounds Write bug, tracked as CVE-2023-34048 , to its Known Exploited Vulnerabilities (KEV) catalog. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

IT 120
article thumbnail

Silverfort Plans Platform Expansion With $116M Funding Round

Data Breach Today

Israel-Based Cybersecurity Startup Announces Impressive Series D Fundraising Haul Silverfort, the Israel-based cybersecurity startup that claims to have built "the world's first unified identity threat protection platform," announced an impressive fundraising haul that the CEO told ISMG will be used to further invest in its identity protection platform.

article thumbnail

What Should Be on Your AI Wishlist for eDiscovery: Insights from Dave Ruel, VP of Product at Hanzo

Hanzo Learning Center

In the rapidly evolving world of Artificial Intelligence (AI), it's crucial for enterprises to adopt technologies that integrate seamlessly into mission-critical workflows. Understanding the practicalities of this integration, especially in the legal domain, is key. To delve deeper into this topic, I had the opportunity to speak with Dave Ruel, VP of Product at Hanzo.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI Automation Won't Steal All Jobs, for Now

Data Breach Today

Study Looks at Impact of AI on Tasks Requiring Visual Processing Artificial intelligence may not steal our jobs just yet, but only because humans are currently cheaper to employ. Many of the human jobs that could be replaced with AI are not "economically beneficial" to automate - at least for now - say researchers at MIT.

article thumbnail

UK Government Publishes Draft Code of Practice on Cybersecurity Governance

Hunton Privacy

On January 23, 2024, the UK government announced that it published a draft Code of Practice on cybersecurity governance (the “Code”). The guidelines in the Code are intended to “help directors and senior leaders shore up their defences from cyber threats.” The Code has been designed in partnership with industry directors, cyber and governance experts, and the UK National Cyber Security Centre (NCSC), with a key focus to ensure that organizations have detailed plans in place to respond to and rec

article thumbnail

CISA's Jen Easterly Confirms 'Harrowing' Swatting Attack

Data Breach Today

US Cyber Agency Director Is Latest High-Profile Target of Dangerous Swatting Attack The director of the U.S. Cybersecurity and Infrastructure Security Agency confirmed she was the apparent target of a swatting attack in which police responded to false calls of a shooting at her Virginia residence on Dec. 30, 2023. In a statement, Easterly described the experience as "harrowing.

article thumbnail

LoanDepot data breach impacted roughly 16.6 individuals

Security Affairs

Financial services company LoanDepot disclosed a data breach that impacted roughly 16.6 million individuals. LoanDepot is a financial services company that primarily operates as a mortgage lender. It is one of the largest nonbank lenders in the United States. The company provides a range of mortgage and non-mortgage loan products and services. LoanDepot disclosed this week a data breach that impacted roughly 16.6 million individuals.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hackers Used SIM Swapping to Breach US SEC X Account

Data Breach Today

Hackers Spread Fake News About SEC Approving Spot Bitcoin Exchange-Traded Fund It wasn't a sophisticated hack on Jan. 9 that allowed hackers to briefly take control of an official U.S. Securities and Exchange Commission social media account, the agency said Monday. The hackers simply scammed the account's mobile phone provider in a SIM swap attack.

Security 266
article thumbnail

Watch out, a new critical flaw affects Fortra GoAnywhere MFT

Security Affairs

Fortra addressed a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) product. Fortra warns customers of a new authentication bypass vulnerability tracked as CVE-2024-0204 (CVSS score 9.8), impacting the GoAnywhere MFT (Managed File Transfer) product. Fortra GoAnywhere Managed File Transfer is a comprehensive solution for secure file transfer, data encryption, and compliance management.

article thumbnail

Side Channels Are Common

Schneier on Security

Really interesting research: “ Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.” Abstract: We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression.

IT 96
article thumbnail

Australian government announced sanctions for Medibank hacker

Security Affairs

The Australian government announced sanctions for a member of the REvil ransomware group for the Medibank hack that occurred in 2022. The Australian government announced sanctions for Aleksandr Gennadievich Ermakov (aka GustaveDore, aiiis_ermak, blade_runner, JimJones), a Russian national who is a member of the REvil ransomware group. The man is responsible for the cyber attacks that in 2022 hit the Australian insurance provider Medibank. “This morning I can announce that Australia has use

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Unprecedented Cybersecurity Alert: 26 Billion Records Exposed in Mega Data Breach

KnowBe4

Cybernews just reported: In what appears to be a digital tsunami, a colossal data breach has surfaced, unveiling a staggering 26 billion records – a figure that's hard to even fathom.

article thumbnail

HP CEO Says They Brick Printers That Use Third-Party Ink Because of … Hackers

WIRED Threat Level

The company says it wants to protect you from “viruses.” Experts are skeptical.

IT 129
article thumbnail

Creating an IT Disaster Recovery Plan

Record Nations

Businesses of all sizes create and manage extensive amounts of electronic data. Unexpected events, ranging from natural disasters to cyberattacks, can cripple operations and jeopardize sensitive data. To safeguard your business against such threats, it is crucial to develop a well-thought-out IT disaster recovery plan. In this blog, we will guide you through the key.

IT 69
article thumbnail

Reimagine work with Cloud Editions 24.1

OpenText Information Management

We, at OpenText, are leading the charge in innovative digital transformation, equipping our customers with essential tools to tackle today’s most complex business challenges. The next generation of innovation will be driven by artificial intelligence (AI) and built on information management. We’ve already taken flight with groundbreaking AI capabilities unveiled in Cloud Editions (CE) 23.4, … The post Reimagine work with Cloud Editions 24.1 appeared first on OpenText Blogs.

Cloud 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CyberheistNews Vol 14 #04 'Swatting' Becomes the Latest Extortion Tactic in Ransomware Attacks

KnowBe4

'Swatting' Becomes the Latest Extortion Tactic in Ransomware Attacks

article thumbnail

High-volume, scalable, cloud BI service now available on OpenText Public Cloud

OpenText Information Management

Scalable cloud BI service now available In a recent release, we announced that you would soon be able to scale high-volume BI at lightning speed thanks to a new cloud BI service coming soon. Well, that time has come. With release 24.1, OpenText Magellan BI and Reporting – Public Cloud is now available as a … The post High-volume, scalable, cloud BI service now available on OpenText Public Cloud appeared first on OpenText Blogs.

Cloud 62
article thumbnail

AI set to transform business – but risks must be addressed

Information Matters

Artificial intelligence is rapidly progressing from a promising technology to an integral part of business, changing how humans and machines interact. With recent advances in AI like chatbots powered by Read more The post AI set to transform business – but risks must be addressed appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

OpenText Introduces New ‘COBOL Webinar Wednesdays’ Series 

OpenText Information Management

If mainframe and COBOL are at the heart of your operations, breaking the bounds of mainframe architecture to scale and innovate at speed can seem daunting. Fortunately, you can accelerate your digital transformation journey while staying agile in today’s fast-paced multi-cloud world.  Starting Wednesday, January 24, 2024, OpenText’s Application Modernization experts will launch the first … The post OpenText Introduces New ‘COBOL Webinar Wednesdays’ Series appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Harnessing the Potential of AI to Drive Business Growth

Information Matters

A recent BCG survey of over 1,400 C-suite executives worldwide reveals that while 89% rank AI and generative AI (GenAI) as a top-three priority for 2024, most companies have yet Read more The post Harnessing the Potential of AI to Drive Business Growth appeared first on Information Matters - Where AI Meets Knowledge Management.

52
article thumbnail

OpenText expands delivery for private generative AI

OpenText Information Management

Cloud (SaaS) and off-cloud SMAX customers can elevate user experiences and cut support costs with OpenText™ IT Operations Aviator. Generative AI Generative AI is a trending topic in ITOps. As Harvard Business Review put it, “AI won’t replace humans—but humans with AI will replace humans without AI.” This quote caught my eye because it succinctly … The post OpenText expands delivery for private generative AI appeared first on OpenText Blogs.

Cloud 57
article thumbnail

Tracking the Pulse of Generative AI Adoption: Excitement and Opportunity Tempered by Uncertainty

Information Matters

A quarterly survey of over 2,800 AI leaders by Deloitte reveals persistent excitement about generative AI’s potential paired with uncertainty on managing emerging challenges. Key insights include: High expectations for Read more The post Tracking the Pulse of Generative AI Adoption: Excitement and Opportunity Tempered by Uncertainty appeared first on Information Matters - Where AI Meets Knowledge Management.

52