Wed.Dec 13, 2023

article thumbnail

Ransomware Groups' Latest Tactic: Weaponized Marketing

Data Breach Today

'Oxygen of Publicity' Helps Intimidate Victims and Recruit Affiliates, Experts Warn Seeking to maximize profits no matter the cost, ransomware groups have been bolstering their technical prowess and psychological shakedowns with a fresh strategy: attempting to control the narrative. Experts are warning security researchers and journalists to beware being co-opted.

article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

Notable progress was made in 2023 in the quest to elevate Digital Trust. Related: Why IoT standards matter Digital Trust refers to the level of confidence both businesses and consumers hold in digital products and services – not just that they are suitably reliable, but also that they are as private and secure as they need to be. We’re not yet at a level of Digital Trust needed to bring the next generation of connected IT into full fruition – and the target keeps moving.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FCC Approves Major Updates to Data Breach Notification Rules

Data Breach Today

New FCC Disclosure Rules Cover All Personal Information of Telecom Customers The FCC approved new guidelines that note how data breaches "have only grown in frequency and severity" since the commission adopted its privacy protection policies 16 years ago. The new rules aim to provide customers and law enforcement with real-time information about critical security incidents.

article thumbnail

EU Reaches Historical Agreement on AI Act

Data Matters

On 8 December 2023 — following three days of lengthy and intensive negotiations — EU legislators reached political agreement on the world’s first stand-alone law regulating AI: the EU’s AI Act. The EU considers the AI Act as one of its key pieces of legislation and fundamental to ensuring the EU becomes the world’s leading digital economy. The EU aims for the AI Act to have the same ‘Brussels effect’ as the GDPR — in other words, to have a significant impact on global markets and practices.

GDPR 166
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK in No Rush to Legislate AI, Technology Secretary Says

Data Breach Today

Government Currently Focused on Assessing AI Risks, Fostering Innovation The U.K. government is in no rush to legislate artificial intelligence, Secretary of State for Science, Innovation and Technology Michelle Donelan said on Wednesday, warning that a hard regulatory approach to AI could risk stifling innovation in this emerging sector of the economy.

More Trending

article thumbnail

Congressional Watchdog Finds Gaps in US Federal AI Efforts

Data Breach Today

Agencies Plan More than 1,200 AI Use Cases Major government agencies in the United States intend to apply artificial intelligence, but the majority of planned use cases are still at the planning stage, a congressional watchdog said. Missing from those efforts is governmentwide guidance on the acquisition and use of AI technologies.

article thumbnail

December 2023 Microsoft Patch Tuesday fixed 4 critical flaws

Security Affairs

Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products, including a zero-day. Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products. The vulnerabilities addressed by the company impact Microsoft Windows and Windows Components; Office and Office Components; Azure, Microsoft Edge (Chromium-based); Windows Defender; Windows DNS and DHCP server; and Microsoft Dynamic.

Security 116
article thumbnail

Harry Coker to Serve as Second National Cyber Director

Data Breach Today

Senate Confirms Career Naval Officer, Former Head of NSA to Serve in Critical Role Harry Coker is now the second permanent national cyber director after the Senate voted 59-40 to confirm President Joe Biden’s pick to lead the Office of the National Cyber Director. In his new role, Coker will be tasked with implementing the administration’s national cybersecurity strategy.

article thumbnail

Phishing Remains the Most Common Attack Technique, With Malicious URL Use Increasing 144%

KnowBe4

Analysis of nearly a year’s worth of emails brings insight into exactly what kinds of malicious content are being used, who’s being impersonated, and who’s being targeted.

Phishing 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Warns of OAuth Attacks Tied to Cryptomining

Data Breach Today

Microsoft Details OAuth Tactics, Says Losses Reached Up to $1.5M Per Victim Hackers are exploiting OAuth applications to compromise user accounts, manipulate and confer elevated privileges, and set up cryptomining operations, which has cost some organizations up to $1.5 million in losses, according to Microsoft's Threat Intelligence team.

272
272
article thumbnail

UK Home Office is ignoring the risk of ‘catastrophic ransomware attacks,’ report warns

Security Affairs

A Joint Committee on the National Security Strategy (JCNSS) warns of the high risk of a catastrophic ransomware attack on the UK government. The British government is accused of failing to mitigate the risk of ransomware attacks. According to a parliamentary report published by the Joint Committee on the National Security Strategy (JCNSS) the UK government can face a ‘catastrophic ransomware attack at any moment.’ The report highlighted the superficial approach to cyber security of S

article thumbnail

Ukraine Fingers Russian Military Hackers for Kyivstar Outage

Data Breach Today

Telecom Operator Slowly Restores Voice Service Ukraine's domestic security agency on Wednesday fingered Russian military hackers as being responsible for hacking Kyivstar, in a statement acknowledging damage to the telecom operator's digital infrastructure. Ukraine's top telecom operator was the target of a Tuesday cyberattack.

Military 269
article thumbnail

Hacker Group Linked to Russian Military Claims Credit for Cyberattack on Kyivstar

WIRED Threat Level

A hacker group calling itself Solntsepek—previously linked to Russia’s notorious Sandworm hackers—says it carried out a disruptive breach of Kyivstar, a major Ukrainian mobile and internet provider.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Lawmakers Urge HHS to Shield Pharmacy Records From Police

Data Breach Today

Regulators Advised to Protect Patients From 'Warrantless' Requests on Prescriptions Three members of Congress are urging the Department of Health and Human Services to improve HIPAA privacy protections around pharmacy information. The request comes after the lawmakers asked major pharmacy companies how they handle law enforcement requests for patient records.

Privacy 268
article thumbnail

Sophos backports fix for CVE-2022-3236 for EOL firewall firmware versions due to ongoing attacks

Security Affairs

Sophos backports the patch for CVE-2022-3236 for end-of-life (EOL) firewall firmware versions due to ongoing attacks exploiting the issue. Sophos backports the fix for the critical code injection vulnerability CVE-2022-3236 for end-of-life (EOL) firewall firmware versions after discovering that threat actors are actively exploiting the flaw in attacks in the wild.

article thumbnail

2023 Fraud Highlights: Check Fraud, Scams, Account Takeover

Data Breach Today

Jack Henry's Rene Perez on How to Tackle Check Fraud as Tactics Change Check fraud, scams and account takeovers dominated the fraud landscape in 2023. Banks and other financial institutions are expected to continue to struggle with account takeovers as fraudsters have changed their modus operandi, making it difficult to track fraudulent proceeds.

IT 261
article thumbnail

Surveillance by the US Postal Service

Schneier on Security

This is not about mass surveillance of mail , this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves : To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, hid a camera inside one of the targeted blue post boxes which captured the suspect’s full face as they allegedly helped themselves to swathes of peoples’ mail.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty

Thales Cloud Protection & Licensing

Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty madhav Thu, 12/14/2023 - 05:18 Earlier this year, Oracle launched its External Key Management Service with Hold Your Own Key (HYOK) functionality from Thales. Oracle’s initiatives include the EU Sovereign Cloud service as well as Distributed Cloud Services such as Oracle Alloy and Dedicated Region – Cloud at Customer solutions.

Cloud 83
article thumbnail

Undercover Threat: North Korean Operatives Infiltrate U.S. Companies Through Job Platforms

KnowBe4

Researchers at Nisos warn that North Korean threat actors are impersonating skilled job seekers in order to obtain remote employment at US companies.

article thumbnail

Ransomware Sanctions: Do They Have Any Impact?

Thales Cloud Protection & Licensing

Ransomware Sanctions: Do They Have Any Impact? madhav Thu, 12/14/2023 - 05:37 Ransomware is one of the most high-profile and high-value cybercrimes that organizations need to watch out for. These attacks have the potential to cause significant financial, operational, and reputational damage to a company: bad actors cut off access to vital systems, ransoms demanded can be in the millions of dollars, and paying the ransom doesn’t guarantee a resolution.

article thumbnail

How To Fight Long-Game Social Engineering

KnowBe4

CISA sent out a warning about a Russian advanced persistent threat (APT) called Star Blizzard warning about their long-game social engineering tactics.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Seven customer service types that organizations should provide

IBM Big Data Hub

Conducting the best customer service strategy today requires organizations to invest in several customer service types. This way, organizations can ensure their customer base receives answers to their problems in the format they prefer. Customer service is an integral part of the customer experience. It has increasingly become an omnichannel discipline where every customer prefers to communicate on varying channels.

article thumbnail

Better data drives better AI results

OpenText Information Management

You: Ice, as an expert AI guide, what do you believe is the most important thing to do to prepare for AI? Ice: If I had to name one thing it would be to get your data ready. The expression “Garbage in, garbage out” applies here—if your data hasn’t been well managed to ensure it’s … The post Better data drives better AI results appeared first on OpenText Blogs.

IT 67
article thumbnail

How to build a successful procurement strategy

IBM Big Data Hub

The role of procurement extends beyond transactional activities. A procurement strategy allows an organization to navigate an increasingly complex global supply chain, adapt swiftly to market fluctuations, and achieve cost optimization, operational efficiency and growth. By assessing and proactively managing risks inherent in the supply chain , organizations can shield themselves from disruptions and strengthen the resilience of their operations.

article thumbnail

Top 6 predictions for the Public Sector in 2024

OpenText Information Management

In many ways, the year 2023 seems like a table-setter for a seismic 2024. We have two escalating regional wars with global impact, an economy that can’t seem to find its footing, and a looming U.S. presidential election that seems inevitably headed toward a rematch of two leaders with historically low levels of popularity. Added … The post Top 6 predictions for the Public Sector in 2024 appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

10 reasons you should adopt reliability centered maintenance (RCM) today

IBM Big Data Hub

There are many articles on equipment failure patterns that infer that a majority of all equipment fails at random , regardless of how much preventive maintenance was done. This claim is often used to encourage asset-intensive industries to evolve their maintenance strategies, invest in instrument equipment and leverage analytics to adopt predictive maintenance approaches.

CMS 67
article thumbnail

FCC Adopts Updated Data Breach Notification Rules

Hunton Privacy

On December 13, 2023, the Federal Communications Commission (FCC) voted to update its 16-year old data breach notification rules (the “Rules”). Pursuant to the FCC update, providers of telecommunications, Voice over Internet Protocol (VoIP) and telecommunications relay services (TRS) are now required to notify the FCC of a data breach, in addition to existing obligations to notify affected customers, the FBI and the U.S.

article thumbnail

Jamf After Dark: Microsoft Ignite

Jamf

Get an update on how the Microsoft Ignite conference was an opportunity to showcase how Jamf and MIcrosoft integrations can help your business in this Jamf After Dark podcast.

52