Tue.Oct 17, 2023

article thumbnail

Unpatched Zero-Day Being Exploited in the Wild, Cisco Warns

Data Breach Today

No Patch Available; Thousands Infected by IOS Software XE Web User Interface Flaw Cisco issued an urgent warning Monday about a critical vulnerability in one of its modular operating system's web interfaces that is designed for routers, switches and other appliances. Hackers exploited the IOS XE software UI to gain admin rights that give them full control of compromised devices.

IT 300
article thumbnail

Tech CEO Sentenced to 5 Years in IP Address Scheme

Krebs on Security

Amir Golestan , the 40-year-old CEO of the Charleston, S.C. based technology company Micfo LLC , has been sentenced to five years in prison for wire fraud. Golestan’s sentencing comes nearly two years after he pleaded guilty to using an elaborate network of phony companies to secure more than 735,000 Internet Protocol (IP) addresses from the American Registry for Internet Numbers (ARIN), the nonprofit which oversees IP addresses assigned to entities in the U.S., Canada, and parts of the Ca

Marketing 285
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukrainian Telcos Targeted by Suspected Sandworm Hackers

Data Breach Today

Attackers' MO: Data Exfiltration, Followed by Network and Hardware Disruption Amplifying kinetic attacks, Russian hackers in recent months have hit at least 11 telecommunications firms in Ukraine with a barrage of "destructive" malware designed to exfiltrate data, steal social media account credentials, destroy IT systems and disrupt operations, the Ukrainian government says.

article thumbnail

Cyber Security Awareness Month – Answering Google’s Most Commonly Asked Questions

Thales Cloud Protection & Licensing

Cyber Security Awareness Month – Answering Google’s Most Commonly Asked Questions madhav Wed, 10/18/2023 - 05:25 This month is Cyber Security Awareness Month , highlighting how far security education needs to go in order to enable a secure interconnected world. Technology continues to improve our lives – but at the same time the risks continue to grow.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Watermarking Generative AI: Hype or Cure-All?

Data Breach Today

Experts Say Technique is A Good Start, but Cannot Guarantee Safety Watermarking is a core part of a White House trustworthiness initiative to bind companies into observing steps to guarantee the safety of AI products. The problem, say AI experts, is that watermarking is as likely to fail as succeed. Watermarking removal tools are available on the open internet.

279
279

More Trending

article thumbnail

IBM Says 631K Affected in Johnson & Johnson Database Breach

Data Breach Today

IBM Blames 'Technical Method' for Allowing Unauthorized Access to Patient Info IBM says the personal information of 631,000 people was compromised by a "technical method" that allowed unauthorized access to a third-party database used by a Johnson & Johnson patient medication support platform. IBM said the problem has been fixed, but two lawsuits have already been filed.

Access 274
article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

Online voting is insecure, period. This doesn’t stop organizations and governments from using it. (And for low-stakes elections, it’s probably fine.) Switzerland—not low stakes—uses online voting for national elections. Ed Appel explains why it’s a bad idea: Last year, I published a 5-part series about Switzerland’s e-voting system.

Paper 121
article thumbnail

Five Eyes Urges Tech Startups to Protect Against IP Theft

Data Breach Today

MI5 Warns of 'Share Rise' in Cyberespionage Nation-state hacks against Western start-ups are surging in a bid by competitor nations to glean intellectual property, warns the Five Eyes intelligence alliance. The stolen data was likely used to fast-track technological and military capabilities within adversary nations, alliance members say.

Military 273
article thumbnail

Chrome support for passkeys in iCloud Keychain

Imperial Violet

Chrome 118 (which is rolling out to the Stable channel now) contains support for creating and accessing passkeys in iCloud Keychain. Firstly, I’d like to thank Apple for creating an API for this that browsers can use: it’s a bunch of work, and they didn’t have to. Chrome has long had support for creating WebAuthn credentials on macOS that were protected by the macOS Keychain and stored in the local Chrome profile.

Passwords 105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Bank Impersonation Scams Erode Customer Trust

Data Breach Today

Cybercrime Expert Al Pascual on the Types of Scams Banks Often Overlook Each year, financial scams cost banks up to $400 million in losses. Despite heavy investments in anti-fraud technology, banks are struggling to protect customers. Bank impersonation scams continue to be the most widely used approach for duping banking customers, said cybercrime expert Al Pascual.

265
265
article thumbnail

Amazon Quietly Wades Into the Passkey Waters

Dark Reading

The move by the e-commerce kahuna to offer advanced authentication to its 300+ million users has the potential to move the needle on the technology's adoption, security experts say.

article thumbnail

CVE-2023-20198 zero-day widely exploited to install implants on Cisco IOS XE systems

Security Affairs

Threat actors exploited the recently disclosed zero-day flaw (CVE-2023-20198) in a large-scale hacking campaign on Cisco IOS XE devices. Threat actors have exploited the recently disclosed critical zero-day vulnerability ( CVE-2023-20198 ) to compromise thousands of Cisco IOS XE devices, security firm VulnCheck warns. Cisco this week warned customers of a zero-day vulnerability, tracked as CVE-2023-20198 (CVSS score 10), in its IOS XE Software that is actively exploited in attacks.

Access 119
article thumbnail

Insiders Say X’s Crowdsourced Anti-Disinformation Tool Is Making the Problem Worse

WIRED Threat Level

X is promoting Community Notes to solve its disinformation problems, but some former employees and people who currently contribute notes say it’s not fit for that purpose.

IT 116
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware realities in 2023: one employee mistake can cost a company millions

Security Affairs

What is the impact of ransomware on organizations? One employee’s mistake can cost a company millions of dollars. Studies show that human error is the root cause of more than 80% of all cyber breaches, whether malicious or unintended. The recent debilitating cyberattacks on casino and resort giants MGM and Caesars are no exception. How can just one employee mishap cost a company millions?

article thumbnail

Watch Out: Attackers Are Hiding Malware in 'Browser Updates'

Dark Reading

Updating your browser when prompted is a good practice, just make sure the notification comes from the vendor themselves.

134
134
article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

Russia-linked APT group Sandworm has hacked eleven telecommunication service providers in Ukraine between since May 2023. The Russia-linked APT group Sandworm (UAC-0165) has compromised eleven telecommunication service providers in Ukraine between May and September 2023, reported the Ukraine’s Computer Emergency Response Team (CERT-UA). According to public sources, the threat actors targeted ICS of at least 11 Ukrainian telecommunications providers leading to the disruption of their servic

article thumbnail

How foundation models can help make steel and cement production more sustainable

IBM Big Data Hub

Heavy industries, particularly cement, steel and chemicals, are the top greenhouse gas emitting industries, contributing 25% of global CO2 emission. They use high temperature heat in many of their processes that is primarily driven by fossil fuel. Fighting climate change requires lowering heavy industry emissions. However, these industries face tremendous challenges to reduce greenhouse gas emissions.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Summit Sabotage: Malicious Phishing Campaign Hits Female Political Leaders Using Social Engineering

KnowBe4

A threat actor dubbed “Void Rabisu” used social engineering to target attendees of the Women Political Leaders (WPL) Summit that was held in Brussels from June 7 to 8, 2023, Trend Micro has found.

article thumbnail

Chatbot Offers Roadmap for How to Conduct a Bio Weapons Attack

Dark Reading

Once ethics guardrails are breached, generative AI and LLMs could become nearly unlimited in its capacity to enable evil acts, researchers warn.

IT 103
article thumbnail

Phishing Tests Start The Virtuous Cycle Of A Strong Security Culture

KnowBe4

Phishing tests are the catalyst to achieve a sustainable security culture within your organization. They are actually the start of a virtuous cycle that helps you move up to the highest maturity level.

article thumbnail

‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites

Dark Reading

The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma stealers.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Paradata: Documentation for Responsible Artificial Intelligence

AIIM

Learn about paradata and how it can be used for documenting AI processes.

article thumbnail

Cyber Insurers Notes Ransomware Claims Rose Significantly in the First Half of 2023

KnowBe4

Popular cyber insurers are claiming that cybercriminals made ransomware attacks popular again in 2023 after a slight break in 2022.

article thumbnail

They Supported Air Strike Victims. Then They Were Doxed and Arrested

WIRED Threat Level

Myanmar’s military junta is increasing surveillance and violating basic human rights. The combination of physical and digital surveillance is reaching dangerous new levels.

article thumbnail

Three Easy Ways to Improve DevSecOps with Thales and Red Hat

Thales Cloud Protection & Licensing

Three Easy Ways to Improve DevSecOps with Thales and Red Hat divya Tue, 10/17/2023 - 14:47 For many DevOps enthusiasts, the need to insert security considerations directly into the development cycle was often overlooked. After all, DevOps arose and gained popularity with its ability to empower developers to deliver software faster. Putting security into the forefront of the DevOps process is not always straightforward at first and can be something DevOps teams struggle to get off the ground.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

3 reasons why business and data analysts need to work with real-time events

IBM Big Data Hub

In a research brief defining “5 trends for 2023,” the IBM Institute for Business Value reports, “In 2023, rapid response is the new baseline. Uncertainty is expected and complexity is compounding. As threats materialize on multiple fronts, organizations must reduce the time from insight to action.” 1 Business and data analysts are intimately familiar with the growing business need for precise, real-time intelligence.

article thumbnail

UAE, US Partner to Bolster Financial Services Cybersecurity

Dark Reading

The two countries agree to share financial services information and provide cross-border training and best practices.

article thumbnail

Half a million of us want to donate our data to British science, but it’s languishing unused because of privacy fears | Polly Toynbee

The Guardian Data Protection

Data supplied to Biobank is not for sale, it’s not for trivial or suspect use, it’s for the good of humankind – and yet I had to jump through hoops to offer it I delight in messages from UK Biobank , making me feel useful for minimal effort. Back in 2006, with half a million others aged between 40 and 69, I signed up to this magnificent project, the world’s most advanced genetic database.

Sales 75