Fri.Nov 17, 2023

article thumbnail

Security Firm COO Hacked Hospitals to Drum Up Business

Data Breach Today

Atlanta Man Pleads Guilty, Is Ordered to Pay $818,000 Restitution, May Avoid Prison The chief operating officer of an Atlanta-based cybersecurity firm has pleaded guilty and agreed to pay restitution of more than $818,000 in a federal criminal case in which he admitted hacking a Georgia medical center in 2018 in an effort to drum up business for his company.

Security 331
article thumbnail

Medusa ransomware gang claims the hack of Toyota Financial Services

Security Affairs

Toyota Financial Services discloses unauthorized activity on systems after the Medusa ransomware gang claimed to have hacked the company. Toyota Financial Services confirmed the discovery of unauthorized activity on systems in a limited number of its locations. “Toyota Financial Services Europe & Africa recently identified unauthorised activity on systems in a limited number of its locations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AT&T Forms Joint Venture for Managed Cybersecurity Business

Data Breach Today

WillJam Ventures Standing Up Joint Venture With AT&T for Managed Cybersecurity Unit AT&T will split its managed cybersecurity services practice from its core connectivity business by standing up a joint venture with Chicago-area investor WillJam Ventures. AT&T will move its security software, managed security operations and cyber consulting into an entity owned by WillJam and AT&T.

article thumbnail

A critical OS command injection flaw affects Fortinet FortiSIEM

Security Affairs

Fortinet warns of a critical OS command injection vulnerability in FortiSIEM report server that could be exploited to execute arbitrary commands. Fortinet is warning customers of a critical OS command injection vulnerability, tracked as CVE-2023-36553 (CVSS score 9.3), in FortiSIEM report server. A remote, unauthenticated attacker can exploit the flaw to execute commands by sending specially crafted API requests. “An improper neutralization of special elements used in an OS Command vulnera

Security 126
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK Privacy Watchdog Pursues Clearview AI Fine After Reversal

Data Breach Today

ICO Seeks Permission to Challenge Ruling Vacating 7.5 Million-Pound Fine Britain's privacy watchdog on Friday said it will continue fighting to impose a fine on Clearview AI for allegedly violating the privacy rights of Britons after a tribunal sided with the facial recognition company by vacating a 7.5 million-pound penalty.

Privacy 288

More Trending

article thumbnail

OpenAI Fires CEO Sam Altman for Lying to Board of Directors

Data Breach Today

CTO Mira Murati Becomes Interim CEO; President Greg Brockman Ousted as Chairman The organization behind ChatGPT carried out a shocking firing of its high-profile chief executive for being "not consistently candid in his communications with the board." OpenAI's board said Friday that it "no longer had confidence" in Sam Altman's ability to continue leading the AI juggernaut.

article thumbnail

Artificial Intelligence in education

Jamf

We use artificial intelligence in our every day lives — so why not take advantage of it in schools? In this blog, we discuss the benefits, drawbacks and the future of artificial intelligence in education.

article thumbnail

The board of directors of OpenAI fired Sam Altman

Security Affairs

OpenAI fired its CEO Sam Altman, and the Chief technology officer Mira Murati appointed interim CEO to lead the company. Sam Altman has been removed as CEO of OpenAI. The company announced that Mira Murati, the Chief Technology Officer, has been appointed as interim CEO. He was distrusted by the board for his behavior, for this reason, it is believed that he is no longer fit to lead the company. “Mr.

article thumbnail

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

Dark Reading

For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enforcement, and others.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Johnny Jet's $3,000 Podcast Scam Nightmare – Unveiling the Elaborate Con that Hijacked his Facebook Kingdom

KnowBe4

Travel influencer Johnny Jet has disclosed that he fell victim to a scam that caused him to lose access to his Facebook account, which has tens of thousands of followers. The scammers began by contacting him and asking if he would be a guest on their podcast.

Access 104
article thumbnail

Scattered Spider Casino Hackers Evade Arrest in Plain Sight

Dark Reading

The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes?

115
115
article thumbnail

KnowBe4 Integrates With Cisco Duo To Streamline Secure Sign Ins

KnowBe4

Social engineering remains one of the top attack vectors that cybercriminals use to execute malicious acts. KnowBe4’s security awareness training and simulated phishing platform allows workforces to make smarter decisions, strengthen an organization’s security culture and human risk by protecting their organization from phishing, social engineering and ransomware.

article thumbnail

Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

Dark Reading

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

QR Code Phishing Attacks Surging

KnowBe4

The massive uptick in QR Code phishing is an indicator that scammers are seeing success in taking victims from the initial attack medium to one under the attacker’s control.

article thumbnail

The Bin Laden Letter Is Being Weaponized by the Far Right

WIRED Threat Level

Far-right influencers and right-wing lawmakers are using the spread of Osama bin Laden’s “Letter to America” to call for a TikTok ban and boost decades old conspiracies.

Security 107
article thumbnail

Catches of the Month: Phishing Scams for November 2023

IT Governance

Welcome to our November 2023 catches of the month feature, which examines recent phishing scams and the tactics criminals use to trick people into compromising their data. This month, we look at a recent phishing attack on Booking.com, an NCSC warning about Black Friday scams, a Google Cloud report into how AI will drive phishing in the future, and a Europol and Eurojust takedown of a phishing gang.

article thumbnail

Hands Off the Security Budget! Find Efficiencies to Reduce Risk

Dark Reading

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.

Risk 96
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

[Keynote Announcement] See Rachel Tobac at KB4-CON 2024!

KnowBe4

We can’t keep this a secret any longer! Rachel Tobac will be joining us live at KB4-CON 2024, happening in Orlando, Florida March 4-6. She’s an ethical hacker and three time winner of DEF CON's Social Engineering Capture the Flag contest.

88
article thumbnail

Weekly Update 374

Troy Hunt

Think about it like this: in 2015, we all lost our proverbial minds at the idea of the Kazakhstan government mandating the installation of root certificates on their citizens' devices. We were outraged at the premise of a government mandating the implementation of a model that could, at their bequest, allow them to intercept traffic without any transparency or accountability.

article thumbnail

EU Moving Closer to an AI Act?

Data Matters

On 24 October 2023, the European Parliament and Member States concluded a fourth round of trilogue discussions on the draft Artificial Intelligence Regulation (AI Act). Policymakers agreed on provisions to classify high-risk AI systems and also developed general guidance for the use of “enhanced” foundation models. However, the negotiations did not lead to substantial progress on provisions for prohibitions in relation to the use of AI by law enforcement.

article thumbnail

British Library Confirms Ransomware Attack Caused Outages

Dark Reading

The library said that it expects many of its services to be restored in the forthcoming weeks.

Libraries 116
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Extend Enterprise IT Security to the Mainframe

OpenText Information Management

While organizations with mainframes aim to establish consistency throughout the enterprise via modernization technologies, the challenge often faced is the tools used are not suitable for both mainframe and enterprise environments. This results in disparate solutions, training methods, and user experiences – highlighting the urgent need for greater uniformity across the entire enterprise.

IT 62
article thumbnail

Actions to Take to Defeat Initial Access Brokers

Dark Reading

Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.

Access 87
article thumbnail

Spotlight AI: The story behind the feature

Hanzo Learning Center

Discover the journey behind Hanzo's Spotlight AI, from its inception to its potential to transform the legal industry with AI-powered decision-making. Learn about the key philosophies and practical features that drive Spotlight AI's innovation.

IT 62
article thumbnail

Detection & Response That Scales: A 4-Pronged Approach

Dark Reading

Building a resilient incident response team requires more than a simple combination of tools and on-call rotations.

100
100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What iPadOS 17 means for Education

Jamf

Discover the transformative impact of iPadOS and macOS Sonoma on education. Explore how Apple's latest OS updates are shaping the future of classroom learning.

article thumbnail

Data management is a must for successful AI

OpenText Information Management

In an increasingly data-driven world, organizations are constantly looking for ways to manage their information more effectively. This is where AI comes in, offering an opportunity to transform data into better decision-making tools. But, as a recent survey of IT leaders underscores, that data must be ready for AI—if it’s not accurate, accessible, and secure, … The post Data management is a must for successful AI appeared first on OpenText Blogs.

Access 57
article thumbnail

Cyber Attack Forces World’s Biggest Bank to Trade via USB Stick via TIME

IG Guru

Check out the article here. The post Cyber Attack Forces World’s Biggest Bank to Trade via USB Stick via TIME first appeared on IG GURU.