Wed.Dec 20, 2023

article thumbnail

Comcast Ties Breach Affecting 36M Customers to Citrix Bleed

Data Breach Today

Attackers Apparently Stole Authenticated Sessions to Hit Telecommunications Giant Comcast says attackers stole personal information pertaining to 35.9 million customers of its Xfinity-branded TV, internet and home telephone services in an October attack that targeted a vulnerability - dubbed Citrix Bleed - present in NetScaler and Citrix networking equipment.

article thumbnail

Google addressed a new actively exploited Chrome zero-day

Security Affairs

Google has released emergency updates to address a new actively exploited zero-day vulnerability in the Chrome browser. Google has released emergency updates to address a new zero-day vulnerability, tracked as CVE-2023-7024, in its web browser Chrome. The flaw has been addressed with the release of version 120.0.6099.129 for Mac,Linux and 120.0.6099.129/130 for Windows which will roll out over the coming days/weeks.

Libraries 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Plans to Improve Threat Data-Sharing Approaches in 2024

Data Breach Today

US Cyber Agency to Begin 2-Year Major Overhaul of Its Legacy AIS Program The Cybersecurity and Infrastructure Security Agency announced plans to launch a two-year effort beginning in 2024 to modernize its legacy Automated Indicator Sharing program as part of an effort to enhance collaboration with the private sector and provide more actionable data to its partners.

article thumbnail

Sophisticated JaskaGO info stealer targets macOS and Windows

Security Affairs

JaskaGO is a new Go-based information stealer malware that targets both Windows and Apple macOS systems, experts warn. Researchers from AT&T Alien Labs uncovered a previously undetected Go-based information stealer dubbed JaskaGO that targets Windows and macOS systems. JaskaGO is a sophisticated malware that supports an extensive array of commands and can maintain persistence in different ways.

Passwords 117
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FTC Bans Rite Aid From Using Facial Recognition Tech

Data Breach Today

5-Year Ban Comes After Retailer Failed to Mitigate Security Surveillance Risks The Federal Trade Commission has banned Rite Aid from using AI-based facial recognition technology for security surveillance for five years after the retail drug store chain failed to implement safeguards such as mitigating risks for inaccurate outputs based on race and gender.

Retail 290

More Trending

article thumbnail

NIST Seeks Public Comment on Guidance for Trustworthy AI

Data Breach Today

Agency Calls for Information on Gen AI Risk Management, Red-Teaming Efforts The U.S. National Institute of Standards and Technology is soliciting public guidance on implementation of an October White House executive order seeking safeguards for artificial intelligence. The order directed the agency to establish guidelines for developers of AI to conduct red-teaming tests.

article thumbnail

“Mr. Anon” Infostealer Attacks Start with a Fake Hotel Booking Query Email

KnowBe4

This new attack is pretty simple to spot on the front, but should it be successful in launching its’ malicious code, it’s going to take its’ victims for everything of value they have on their computer.

IT 106
article thumbnail

UK Supreme Court Says AI Can't Patent Inventions

Data Breach Today

Court Says Only a 'Person' Can Be an Inventor The U.K.'s highest court on Wednesday affirmed that an artificial intelligence system cannot be granted ownership of patents. AI "is not a person, let alone a natural person and it did not devise any relevant invention," wrote Justice David Kitchin.

article thumbnail

Law enforcement Operation HAECHI IV led to the seizure of $300 Million

Security Affairs

An international law enforcement operation, named HAECHI IV, led to the arrest of approximately 3,500 suspects and the seizure of roughly $300 million worth of assets. Interpol this week announced that an international law enforcement operation, named HAECHI IV, led to the arrest of approximately 3,500 suspects and the seizure of roughly $300 million worth of assets.

Sales 103
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sam McNicholls-Novoa on CyberComply

IT Governance

Making compliance easy with our Cloud-based solution CyberComply is a Cloud-based, end-to-end solution that simplifies compliance with a range of cyber security and data privacy standards and laws, including ISO 27001 , the GDPR (General Data Protection Regulation), and more. This SaaS (Software as a Service) will help you manage all your cyber security and data privacy obligations in one place.

GDPR 103
article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

Attack surface management (ASM) is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation (BAS) and applies them to an organization’s entire IT environment, from networks to the cloud. That makes ASM’s ambitions much greater than legacy vulnerability management tools.

Cloud 100
article thumbnail

2024 Tech and Cybersecurity Forecast: Navigating New Frontiers in Business

Thales Cloud Protection & Licensing

2024 Tech and Cybersecurity Forecast: Navigating New Frontiers in Business madhav Thu, 12/21/2023 - 05:15 People always want to comprehend what the future brings. Ancient Greeks, for example, were famous for consulting with Oracle before making a crucial decision. The same is true for today’s business leaders. In an era where technology evolves at a blistering pace, business leaders must stay ahead of the curve. 2024 promises to be a pivotal year, bringing transformative advancements and new cha

article thumbnail

ICO Publishes Response to UK Data Protection and Digital Information Bill

Hunton Privacy

On December 18, 2023, the updated response from UK Information Commissioner John Edwards to the Data Protection and Digital Information (No 2) Bill (the “Bill”) was published on the website of the Information Commissioner’s Office (ICO). The Commissioner’s original response was published in March 2023. In the latest response, the Commissioner states that he is “pleased to note that government made some changes…in response to my comments,” specifically with regards the definition of “vexatious re

GDPR 72
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to build a successful AI strategy

IBM Big Data Hub

Artificial intelligence (AI) is a transformative force. The automation of tasks that traditionally relied on human intelligence has far-reaching implications, creating new opportunities for innovation and enabling businesses to reinvent their operations. By giving machines the growing capacity to learn, reason and make decisions, AI is impacting nearly every industry, from manufacturing to hospitality, healthcare and academia.

article thumbnail

The GenAI-driven contact center revolution

OpenText Information Management

Contact center agents are the linchpin between organizations and their clientele. As the demand for exceptional customer service continues to rise in the total experience economy, managing the agent experience becomes paramount. This is where Agent Experience Management (AXM), as a discipline, steps in, employing techniques to optimize every facet of agents’ professional lives.

article thumbnail

Business strategy examples

IBM Big Data Hub

A successful business strategy dictates the allocation of resources and outlines how a company will achieve its strategic goals. Whether the organization is focused on developing new products or marketing an existing service to an under-served demographic, having a solid strategy will help an organization realize its long-term goals. Typically, a strategy will be informed by core business objectives and keep key performance indicators (KPIs) in mind.

article thumbnail

OpenText named a Leader in IDC MarketScape: Worldwide Strategic Portfolio Management and IT Project and Portfolio Management 2023-2024 Vendor Assessment

OpenText Information Management

We are excited to announce that OpenText was named a Leader in IDC MarketScape: Strategic Portfolio Management and IT Project and Portfolio Management 2023-2024 Vendor Assessment (doc # US49436523, December 2023). The IDC MarketScape evaluated Strategic Portfolio Management (SPM) and IT Project and Portfolio Management (PPM) vendors , providing expert insights into the strengths and … The post OpenText named a Leader in IDC MarketScape: Worldwide Strategic Portfolio Management and IT Proje

IT 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Unlocking success: Key components of a winning customer experience strategy

IBM Big Data Hub

Customer experience strategy (CX strategy) is when organizations optimize customer engagements to create happy customers, drive customer loyalty and help to recruit new customers. Providing a better customer experience takes into consideration the entire customer journey and every customer touch-point. It identifies new customers through awareness, consideration, and purchase, aims to retain customers, and drives word-of-mouth through the post-purchase phase.

article thumbnail

‘Twas the night before Christmas… An OpenText Voltage Poem

OpenText Information Management

‘Twas the night before Christmas, when all through the house A hacker was stirring, and clicking his mouse; The stockings were hung by the chimney with care, In hopes that St. Nicholas soon would be there. The security team were snug in their beds, While visions of SOCs and encryption danced in their heads; And the CISO in her … The post ‘Twas the night before Christmas… An OpenText Voltage Poem appeared first on OpenText Blogs.

article thumbnail

Getting the most out of IBM Cloud VPC images

IBM Big Data Hub

Images are used to create instances on IBM Cloud VPC. Depending on your needs, you can select a stock image, a custom image or a catalog image. What are stock images? A stock image is the out-of-the-box operating system customized for IBM Cloud VPC environments. It is used to deploy virtual servers or bare metal servers using different architecture types.

Cloud 66
article thumbnail

GCHQ Christmas Codebreaking Challenge

Schneier on Security

Looks like fun. Details here.

90
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Adding Structure to AI Harm via Georgetown University

IG Guru

Check out the article here. The post Adding Structure to AI Harm via Georgetown University first appeared on IG GURU.

Privacy 63
article thumbnail

IT Transformation: How to Create a Sustainable IT landscape

Docuware

IT departments are currently facing major challenges such as new market demands, new regulations and an unpredictable economy. The result: overworked employees with ever-lengthening to-do lists, a lack of effective prioritization, an inability to respond quickly to new user requirements and outdated software. So, it's high time for an IT transformation -- because only those companies that consistently implement innovative solutions will be able to keep up with the competition in the long term.

IT 26
article thumbnail

Five machine learning types to know

IBM Big Data Hub

Machine learning (ML) technologies can drive decision-making in virtually all industries, from healthcare to human resources to finance and in myriad use cases, like computer vision , large language models (LLMs), speech recognition, self-driving cars and more. However, the growing influence of ML isn’t without complications. The validation and training datasets that undergird ML technology are often aggregated by human beings, and humans are susceptible to bias and prone to error.

Retail 79
article thumbnail

How to build a successful hybrid cloud strategy

IBM Big Data Hub

Hybrid cloud has become the IT infrastructure of choice, providing the interoperability and portability organizations need to access data where and when they need it. Yet navigating the complexities of building and managing a hybrid environment poses unique challenges. To capture the most value from hybrid cloud, business and IT leaders must develop a solid hybrid cloud strategy supporting their core business objectives.

Cloud 101
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.