Tue.Jan 30, 2024

article thumbnail

Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider

Krebs on Security

On Jan. 9, 2024, U.S. authorities arrested a 19-year-old Florida man charged with wire fraud, aggravated identity theft, and conspiring with others to use SIM-swapping to steal cryptocurrency. Sources close to the investigation tell KrebsOnSecurity the accused was a key member of a criminal hacking group blamed for a string of cyber intrusions at major U.S. technology companies during the summer of 2022.

Passwords 305
article thumbnail

Ransomware Attack Hits Schneider Electric Sustainability Unit

Data Breach Today

Manufacturer Confirms Systems Down, Data on Energy Consumption, Emission Accessed Schneider Electric confirmed a ransomware attack has locked up corporate systems of its Schneider Electric Sustainability Business division and accessed data. The company said it plans to resume operations in two business days after remediation is complete.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Empowering Progress: How AIIM's Certification Transformed IsDB's Approach to Intelligent Information Management

AIIM

I am so honored that nine of my colleagues at Islamic Development Bank (IsDB) have successfully been Certified as “Certified Information Professional” (CIPs) by AIIM.

175
175
article thumbnail

Weaponized Lying: Unraveling RansomedVC's Business Strategy

Data Breach Today

Group Fakes Stolen Data, Has Ties to Ragnar Locker, Says Researcher Jon DiMaggio While ransomware groups rightly have a reputation for being morally and ethically bankrupt, many do play things straight with their victims. But RansomedVC is a notable exception. In some ways, it is "more dangerous" because of its expert ability to lie, according to researcher Jon DiMaggio.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

News alert: Aembit, Crowdstrike partner to help companies tighten security of IAM workload access

The Last Watchdog

Silver Spring, Maryland, Jan. 30, 2024 — Aembit , the Workload Identity and Access Management (IAM) platform that enables DevOps and security teams to discover, manage, enforce and audit access between workloads, today announced the availability of a new integration with the industry-leading CrowdStrike Falcon® platform to give enterprises the ability to dynamically manage and enforce conditional access policies based on the real-time security posture of their applications and services.

Access 130

More Trending

article thumbnail

Cactus ransomware gang claims the Schneider Electric hack

Security Affairs

Energy management and industrial automation firm Schneider Electric suffered a data breach after a Cactus ransomware attack. Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. BleepingComputer first reported the attack that hit the Sustainability Business division of the company on January 17th.

article thumbnail

US IaaS Providers Face 'Know Your Customer' Regulation

Data Breach Today

Rule Is a Bid to Deter Malicious Foreign Use of US IaaS Providers Cloud providers told the government they aren't very happy about a proposed regulation requiring them to verify the identity of foreign customers, but their complaints are unlikely to stop the U.S. Department of Commerce from proceeding with the rule.

Cloud 261
article thumbnail

GUEST ESSAY: Leveraging real-time visibility to quell persistent ‘take-a-USB-stick-home’ attacks

The Last Watchdog

Each of us has probably sat through some level of cybersecurity awareness training during our professional lives. Related: Dangers of spoofed QR codes Stop and think before you click on a link within an email from an unexpected source. Don’t re-use a password across multiple sites. Beware over-sharing personal information online, especially on social media platforms.

Passwords 104
article thumbnail

Judge Denies Meta's 2nd Try to Dismiss Pixel Privacy Case

Data Breach Today

Litigation Alleges the Web Tracker Scraped Sensitive Patient Information A federal judge has again given the green light for a proposed consolidated class action lawsuit against Meta to proceed. The litigation claims the firm unlawfully collected patient data from the websites of hospitals and other providers through the use of its Pixel tracking tool.

Privacy 261
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hundreds of network operators’ credentials found circulating in Dark Web

Security Affairs

Hundreds of compromised credentials of customers of RIPE, APNIC, AFRINIC, and LACNIC are available on the dark web, Resecurity warns. Resecurity conducted a thorough scan of the Dark Web and identified over 1,572 compromised customers of RIPE, Asia-Pacific Network Information Centre (APNIC), the African Network Information Centre (AFRINIC), and the Latin America and Caribbean Network Information Center (LACNIC), resulting from infostealer infections.

Passwords 127
article thumbnail

New York AG Sues Citibank for Poor Phishing Protections

Data Breach Today

State Attorney Alleges Lack of Layered Security to Stop Fraudulent Wire Tranfers The New York attorney general sued the third-largest bank in the United States over its alleged failure to protect consumers from scammers. "If a bank cannot secure its customers' accounts, they are failing in their most basic duty," said Attorney General Letitia James.

Phishing 259
article thumbnail

750 million Indian mobile subscribers’ data offered for sale on dark web

Security Affairs

Data of 750 million Indian mobile subscribers was offered for sale on dark web hacker forums earlier in January. CloudSEK researchers warned that a database containing data of 750 million Indian mobile subscribers was offered for sale on dark web hacker forums earlier in January. According to the researchers, at least two cybercrime gangs, CYBO CREW affiliates known as CyboDevil and UNIT8200, were offering the database for $3,000.

Sales 125
article thumbnail

Italian Data Regulator Slams EU-Funded AI Projects

Data Breach Today

City of Trento Must Pay Regulators 50,000 Euros The Italian data protection regulator fined a midsize northern city 50,000 euros for deploying a pilot artificial intelligence public safety project financed by the European Union. Trento was a partner in three pilots that planned to use AI to detect threats.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Root access vulnerability in GNU Library C (glibc) impacts many Linux distros

Security Affairs

Qualys researchers discovered a root access flaw, tracked as CVE-2023-6246, in GNU Library C (glibc) affecting multiple Linux distributions. The Qualys Threat Research Unit discovered four security vulnerabilities in the GNU Library C (glibc) , including a heap-based buffer overflow tracked as CVE-2023-6246. GNU C Library (glibc) is a free software library that provides essential system services for Linux and other Unix-like operating systems.

Libraries 120
article thumbnail

FBI and DOJ Disrupt Chinese Hacking Operation

Data Breach Today

Cyberespionage Hacking Group Volt Typhoon Targeting US Critical Infrastructure The FBI and the U.S. Department of Justice used a court order to disrupt a Chinese hacking operation that compromised thousands of internet-connected devices and targeted sensitive areas of U.S. critical infrastructure, according to media reports.

257
257
article thumbnail

10 must-have data intelligence capabilities for your data cloud migration

Collibra

Everyone knows: The cloud is the norm for companies that seek more scale, more savings, and better performance from their technology stack, especially as leveraging AI becomes more widespread. Your cloud journey is also an opportunity for your organization to redefine your approach to data. To accelerate the time-to-value of your cloud investment, drive data quality across your data ecosystem, and lay a solid foundation for trusted data (especially if you’re building generative AI applications

Cloud 102
article thumbnail

Juniper Networks released out-of-band updates to fix high-severity flaws

Security Affairs

Juniper Networks released out-of-band updates to fix high-severity flaws in SRX Series and EX Series that can allow attackers to take over unpatched systems. Juniper Networks has released out-of-band updates to address two high-severity flaws , tracked as CVE-2024-21619 and CVE-2024-21620, in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NSA Buying Bulk Surveillance Data on Americans without a Warrant

Schneier on Security

It finally admitted to buying bulk data on Americans from data brokers, in response to a query by Senator Weyden. This is almost certainly illegal, although the NSA maintains that it is legal until it’s told otherwise. Some news articles.

IT 99
article thumbnail

Italian data protection authority said that ChatGPT violated EU privacy laws

Security Affairs

Italian data protection authority regulator authority Garante said that ChatGPT violated European Union data privacy regulations. The Italian data protection authority regulator authority, known as “Garante per la protezione dei dati personali”, announced it has notified OpenAI that ChatGPT violated the EU data protection regulation GDPR.

Privacy 97
article thumbnail

The Percentage of Organizations Globally Struck by Ransomware Hits an All-Time High

KnowBe4

Check Point’s review of ransomware shows that the percent of organizations worldwide hit by this greatest of cyberthreats rose by a whopping 33% in 2023.

article thumbnail

New Images of Colossus Released

Schneier on Security

GCHQ has released new images of the WWII Colossus code-breaking computer, celebrating the machine’s eightieth anniversary (birthday?). News article.

94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Open Redirects Used to Disguise Phishing Links

KnowBe4

Phishing attacks are increasingly using open redirects to evade detection by security filters, according to researchers at Trustwave.

Phishing 107
article thumbnail

Preparing for the EU AI Act: Part 2

Data Matters

Join Sidley and OneTrust DataGuidance for a reactionary webinar on the recently published, near-final text of the EU AI Act on February 5, 2024. This discussion with industry panelists will cover initial reactions to the text of the EU AI Act following finalization by EU legislators and examine the key points in the AI Act that businesses need to understand.

Privacy 97
article thumbnail

Robots Are Fighting Robots in Russia's War in Ukraine

WIRED Threat Level

Aerial drones have changed the war in Ukraine. Now, both Russia's and Ukraine's militaries are deploying more unmanned ground robots—and the two are colliding.

article thumbnail

Achieve Data Center Excellence with IBM and VMware

IBM Big Data Hub

In the last post , we looked at creating a blueprint for a sustainable data center. Now we’ll look at how to get the most out of a modern data center. We don’t need to re-create the wheel all the time. Sometimes, we can look to others who have gone before us for inspiration and examples to help shape our vision for success. And, when we work with partners that have “been there, done that,” we can accelerate our success, taking our vision to a mission to reality.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ISO Draft International Standard 9706, focusing on the requirements for permanent paper intended for documents, has been canceled and has moved to stage 40.98 via LinkedIn

IG Guru

Check out the post here. The post ISO Draft International Standard 9706, focusing on the requirements for permanent paper intended for documents, has been canceled and has moved to stage 40.98 via LinkedIn first appeared on IG GURU.

Paper 63
article thumbnail

Haleon harnesses automated data capture to keep shelves stocked at pharmacies across Hong Kong

OpenText Information Management

Here in Hong Kong, space is at an ultimate premium. At Haleon, we ensure that more than 200 pharmacies don’t waste shelf space by supplying a wide range of products, including oral health, vitamins, minerals and supplements, and over-the-counter medications such as pain relief, respiratory and digestive products, and more. We target 99% on time in … The post Haleon harnesses automated data capture to keep shelves stocked at pharmacies across Hong Kong appeared first on OpenText Blogs.

Cloud 62
article thumbnail

Explosive New Memoir, “The Bastard of Beverly Hills,” Sends Shivers Through Entertainment Biz

Information Governance Perspectives

A controversial new book reveals scandalous details behind a secret adoption arranged for the celebrated composer of The Addams Family by infamous attorney and former LA Clippers owner Donald Sterling in the 1970s. The poignant memoir features intimate stories about Hollywood luminaries from Michael Landon to Frank Sinatra and a behind-the-scenes peek at Tinseltown’s most legendary studio, Paramount Pictures.