Thu.Jul 06, 2023

article thumbnail

Ransomware Continues to Plague European Healthcare Sector

Data Breach Today

Hacktivist-Led DDoS Attacks Also on the Rise, ENISA Says Ransomware continues to be the biggest threat to the European healthcare sector, but the region also is experiencing an uptick in distributed denial-of-service attacks tied to hacktivist groups, the European Union Agency for Cybersecurity warned.

article thumbnail

Threads: We Don’t Want to “Hang Out With Everybody.” Sometimes, We Want To Leave.

John Battelle's Searchblog

(AP Photo/Richard Drew) Apparently the open web has finally died. This the very same week Meta launches Threads , which, if its first day is any indication, seems to be thriving (10 million sign ups in its first few hours, likely 50 million by the time this publishes…). But before Threads’ apparent success, most writers covering tech had decided that the era of free, open-to-the-public, at scale services like Twitter, Reddit, and even Facebook/Insta is over.

IT 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Iranian Group Targets Nuclear Experts

Data Breach Today

Also: MOVEit Victims Confirm Attack, Ukrainian Government FB Page Hacked This week, Charming Kitten targeted nuclear experts; over 130,000 solar energy monitoring systems are exposed; organizations confirmed a breach due to the MOVEit zero-day; Russian hackers took over a Ukrainian government agency's Facebook page; and a WordPress plug-in gave admin privileges to users.

article thumbnail

Why Has Digital Transformation Stalled?

AIIM

Research Indicates Digital Transformation Has Stalled After we received the survey responses for the AIIM 2023 State of the Intelligent Information Management Industry Report , I spoke to the report’s authors, Dave Jones and Theresa Resek, about a concerning statistic. Enterprise digital transformation (DT) efforts have stalled. Dave later wrote in the report “ over 65% of organizations have achieved significant successes with DT, but that still leaves at least a third who have not.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Security Tool Consolidation: How to Plan, What to Avoid

Data Breach Today

Dionisio Zumerle of Gartner on Impact of XDR and SASE, Consolidation Misconceptions A growing number of security teams are looking to consolidate tools to simplify operations, said Gartner analyst Dionisio Zumerle. "When you have the complexity, it's very hard to identify misconfigurations between the different overlapping tools, and it's also hard to identify security gaps.

Security 144

More Trending

article thumbnail

Real Estate Firm Faces 3 Lawsuits in Addiction Center Breach

Data Breach Today

Proposed Class Actions Allege Negligence in Securing Addiction Treatment Data A ransomware attack in May that and compromised the sensitive information of 319,500 individuals, including addiction treatment center patient data, has so far generated three proposed federal class action lawsuits against the Pennsylvania real estate firm that owns the medical group.

article thumbnail

UK ICO Encourages Use of Privacy Enhancing Technologies

Hunton Privacy

On June 19, 2023, the UK Information Commissioner’s Office (“ICO”) recommended that organizations start using privacy enhancing technologies (“PETs”) to share personal information safely, securely and anonymously. The ICO also has issued new guidance on PETs which is aimed at those using large data sets in finance, healthcare, money laundering and cybercrime.

Privacy 107
article thumbnail

Shell Becomes Latest Cl0p MOVEit Victim

Dark Reading

In another MOVEit attack, oil and gas giant Shell saw the release of the private information of its employees.

IT 134
article thumbnail

New Report Shows Social Engineering and Business Email Compromise Attacks Have Drastically Increased in 2023

KnowBe4

Email-based social engineering attacks have risen by 464% this year compared to the first half of 2022, according to a report by Acronis. Business email compromise (BEC) attacks have also increased significantly.

98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Catches of the Month: Phishing Scams for July 2023

IT Governance

Welcome to our July 2023 catches of the month feature, in which we explore the latest phishing scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at the increase in a new form of phishing that uses QR codes, plus we discuss the latest the staggering findings of PhishLabs’ latest report.

article thumbnail

Cisco warns of a flaw in Nexus 9000 series switches that allows modifying encrypted traffic

Security Affairs

Cisco warns of a high-severity vulnerability in Nexus 9000 series switches that can allow attackers to read or modify encrypted traffic. Cisco disclosed a high-severity vulnerability, tracked as CVE-2023-20185 (CVSS Score 7.4), in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode. An unauthenticated, remote attacker can exploit the flaw to read or modify encrypted traffic. “This vulnerability is due to an issue with the implementati

article thumbnail

StackRot Linux Kernel Bug Has Exploit Code on the Way

Dark Reading

Linus Torvalds led a Linux kernel team in developing a set of patches for the privilege escalation flaw.

124
124
article thumbnail

StackRot, a new Linux Kernel privilege escalation vulnerability

Security Affairs

StackRot is s new security vulnerability in the Linux kernel that could be exploited to gain elevated privileges on a target system. A security vulnerability, dubbed StackRot was found impacting Linux versions 6.1 through 6.4. The issue, tracked as CVE-2023-3269 , (CVSS score: 7.8), is a privilege escalation issue that resides in the memory management subsystem.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Threads' Privacy Policy Compares to Twitter's (and Its Rivals')

WIRED Threat Level

Want to try out Meta’s new social media app? Here’s more context on what personal data is collected by Threads and similar social media apps.

Privacy 102
article thumbnail

CISA and FBI warn of Truebot infecting US and Canada based organizations

Security Affairs

CISA and the FBI warned today of a new Truebot variant employed in attacks against organizations in the United States and Canada. A new variant of the Truebot malware was used in attacks against organizations in the United States and Canada. Threat actors compromised target networks by exploiting a critical remote code execution (RCE) vulnerability in the Netwrix Auditor software tracked as CVE-2022-31199.

article thumbnail

Startup Spotlight: Endor Labs Focuses on Reachability

Dark Reading

The company, one of four finalists in Black Hat USA's 2023 startup competition, looks to find the vulnerabilities an attacker could actually access.

Access 96
article thumbnail

Belgian Tax Hack

Schneier on Security

Here’s a fascinating tax hack from Belgium (listen to the details here , episode #484 of “No Such Thing as a Fish,” at 28:00). Basically, it’s about a music festival on the border between Belgium and Holland. The stage was in Holland, but the crowd was in Belgium. When the copyright collector came around, they argued that they didn’t have to pay any tax because the audience was in a different country.

IT 86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft and Collibra: New integrations drive trusted data-driven decisions

Collibra

Microsoft Azure is a comprehensive cloud computing platform that is relied upon by more than 95 percent of the Fortune 500 and millions of companies around the world. We’re excited to continue to extend our support of the Microsoft ecosystem with our new Azure Data Factory (ADF) and Azure Data Lake Storage integrations, as well as significant enhancements to our Power BI integration.

article thumbnail

Cybersecurity's Future Hinges on Stronger Public-Private Partnerships

Dark Reading

Public and private sector organizations must collaborate on a shared cybersecurity agenda to protect and benefit society at large.

article thumbnail

Nerve Center: Protect Your Network Against New Ransomware Strains with Our Latest RanSim Update

KnowBe4

Ransomware continues to be a major threat for all organizations and, according to the Verizon 2023 Data Breach Investigations Report , is still present in 24% of breaches.

article thumbnail

Privacy Woes Hold Up Global Instagram Threads Launch

Dark Reading

Meta's answer to Twitter went live and quickly racked up millions of members — but the social media app's privacy practices are under the microscope.

Privacy 84
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Don't Join Threads—Make Instagram's 'Twitter Killer' Join You

WIRED Threat Level

Meta’s Twitter alternative promises that it will work with decentralized platforms, giving you greater control of your data. You can hold the company to that—if you don't sign up.

IT 73
article thumbnail

Patchless Cisco Flaw Breaks Cloud Encryption for ACI Traffic

Dark Reading

Vulnerable Nexus 9000 Series Fabric Switches in ACI mode should be disabled, Cisco advises.

article thumbnail

New Washington State Geofencing Ban Set to Take Effect in July

Hunton Privacy

On April 27, 2023, Washington adopted the My Health My Data Act (“WMHMDA”). Most of the law’s provisions are not effective until March 31, 2024 (or June 30, 2024 for small businesses). The law’s geofencing prohibition, however, is set to take effect on July 23, 2023. The prohibition is part of stringent requirements that Washington added when it became the first state to enact a comprehensive consumer health information privacy law in the United States.

Privacy 64
article thumbnail

6 Steps To Outsmart Business Email Compromise Scammers

Dark Reading

Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance.

84
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Florida updates their General Record Schedules

IG Guru

Check out the post here. The post Florida updates their General Record Schedules first appeared on IG GURU.

article thumbnail

CISOs Find 'Business as Usual' Shows the Harsh Realities of Cyber-Risk

Dark Reading

C-suite security leaders are feeling less prepared to cope with cyberattacks and more at risk than last year.

Risk 82
article thumbnail

Threat Actors are Using Image-Based Phishing Emails to Lure Victims

KnowBe4

Attackers are increasingly using images in phishing to evade text-based security filters, according to researchers at INKY.