Mon.Jun 12, 2023

article thumbnail

Another Healthcare Vendor Reports Big Forta GoAnywhere Hack

Data Breach Today

Debt Collection Software Firm Intellihartx Says Nearly 490,000 Affected by Breach A company that makes patient debt collection software is the latest healthcare sector entity to report a hacking breach related to a flaw in Fortra's GoAnywhere secure file transfer software. To date, the GoAnywhere vulnerability has affected the health information of 4.4 million individuals.

Security 271
article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy is the ability to control who (or what) can view or access information that is collected about you or your customers. Privacy controls allow you to say who or what can access a database of customer data or employee data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK Takes the First Step to Stop Authorized Payment Scams

Data Breach Today

The Cost of Reimbursing Scam Victims Will Be Split Between Sending, Receiving Banks U.K. banks will soon have to reimburse customers who fall prey to authorized push payment scams. The U.K.'s Payment Systems Regulator recently released a policy that would split the reimbursement cost between sending and receiving banks and incentivize the industry to invest in fraud prevention.

184
184
article thumbnail

The US Is Openly Stockpiling Dirt on All Its Citizens

WIRED Threat Level

A newly declassified report from the Office of the Director of National Intelligence reveals that the federal government is buying troves of data about Americans.

IT 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Expel Lays Off 10% of Workers 8 Months After Hauling in $31M

Data Breach Today

60 Staffers Axed Months After Expel Slowed Hiring to Reduce Likelihood of Layoffs Expel has axed 60 workers just eight months after hauling in $31 million to provide the managed detection and response vendor with a financial cushion. The company will reduce its 600-person staff by 10% - or 60 people - in response to "many shifts in the market," the co-founders wrote in a blog.

Marketing 157

More Trending

article thumbnail

Fortinet Fixes Critical Remote Code Flaw

Data Breach Today

Fortinet's Second VPN Vulnerability of 2023 Affects Fortigate VPN-SSL Protocol Fortinet has patched a critical vulnerability affecting Fortigate Secure Sockets Layer network VPN devices that allow remote network access. French security firm Olympe uncovered the vulnerability and said the flaw can be exploited without credentials and can bypass multifactor authentication.

article thumbnail

Digitizing Records: Understanding Metadata Requirements

National Archives Records Express

This is the next post in a series supporting the publication of 36 CFR section 1236 subpart E – Digitizing Permanent Records. All of the posts have been collected under the 36 CFR Section 1236 category. S49-07-001 – STS-049 – In cabin view of crewmember at the forward flight deck with laptop terminal National Archives Identifier: 22702275 In this blog post, we will explore the key aspects of metadata requirements and their significance in recordkeeping.

Metadata 109
article thumbnail

New OnDemand Webinar: Taking Insider Risk Management to the Next Level

Data Breach Today

Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially.

Risk 144
article thumbnail

Researchers Report First Instance of Automated SaaS Ransomware Extortion

Dark Reading

The attack highlights growing interest among threat actors to target data from software-as-a-service providers.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What You See Helps What You Get

RFID Global Solution, Inc.

WYSIWYG (“What You See Is What You Get”) is very common terminology used in software. In the asset management arena, this should be changed to, ‘What You See Helps What You Get’, meaning, the more visibility you have about your assets, the better accuracy, insights, and utilization you will achieve. Data is an integral part … What You See Helps What You Get Read More » The post What You See Helps What You Get appeared first on RFID Global Solution.

article thumbnail

Experts released PoC exploit for MOVEit Transfer CVE-2023-34362 flaw

Security Affairs

Security firm Horizon3 released proof-of-concept (PoC) exploit code for the remote code execution (RCE) flaw CVE-2023-34362 in the MOVEit Transfer MFT. MOVEit Transfer is a managed file transfer that is used by enterprises to securely transfer files using SFTP, SCP, and HTTP-based uploads. The vulnerability is a SQL injection vulnerability, it can be exploited by an unauthenticated attacker to gain unauthorized access to MOVEit Transfer’s database.

article thumbnail

RomCom Threat Actor Targets Ukrainian Politicians, US Healthcare

Dark Reading

The group appears to be targeting victims based on their proximity and involvement to and within pro-Ukraine organizations.

116
116
article thumbnail

FUD Malware obfuscation engine BatCloak continues to evolve

Security Affairs

Researchers detailed a fully undetectable (FUD) malware obfuscation engine named BatCloak that is used by threat actors. Researchers from Trend Micro have analyzed the BatCloak, a fully undetectable (FUD) malware obfuscation engine used by threat actors to stealthily deliver their malware since September 2022. The samples analyzed by the experts demonstrated a remarkable ability to persistently evade anti-malware solutions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Is there a “right” cloud strategy for banking?

IBM Big Data Hub

As public cloud technology and hybrid multicloud architectures are being adopted in financial institutions at an increasing rate, we’re observing that their counterparts in the public sector— central banks—are a long way behind, due at least in part to a profoundly risk-averse approach. While central banks have a very different mission from commercial banks, what they do have in common is the need to modernize their IT operations to support digital transformation, contain costs

Cloud 92
article thumbnail

Intellihartx data breach exposed the personal and health info of 490,000 individuals

Security Affairs

Intellihartx is notifying about 490,000 individuals that their personal information was compromised in the GoAnywhere zero-day attack in January. The Clop ransomware group has stolen stole personal and health information of 489,830 individuals as a result of a ransomware attack on the technology firm Intellihartx. The attack took place earlier this year, the attackers have exploited the GoAnywhere zero-day vulnerability tracked as CVE-2023-0669.

article thumbnail

OnDemand Webinar: Start Gathering Your Own Threat Intelligence

Data Breach Today

Traditional threat intel is broken.

130
130
article thumbnail

Fortinet urges to patch a critical RCE flaw in Fortigate firewalls

Security Affairs

Fortinet released security updates to fix a critical security flaw in its FortiGate firewalls that lead to remote code execution. Fortinet has released security patches to address a critical security vulnerability, tracked as CVE-2023-27997, in its FortiGate firewalls. An attacker can exploit the vulnerability to achieve remote code execution on vulnerable network equipment.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

10 Important Security Tasks You Shouldn't Skip

Dark Reading

Time and money are valuable and finite, but some actions are well worth spending those resources on.

Security 121
article thumbnail

IBM Tech Now: June 12, 2023

IBM Big Data Hub

​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 78 On this episode, we’re covering the following topics: The 2023 X-Force Definitive Guide to Ransomware IBM Consulting’s Center of Excellence for Generative AI Stay plugged in You can check out the IBM Blog Announcemen

article thumbnail

'Stealth Soldier' Attacks Target Libyan Government Entities With Surveillance Malware

Dark Reading

Surveillance malware targets Libyan government entities, with possible links to a 2019 Egypt attack campaign.

article thumbnail

Forrester: AI, Cloud Computing, and Geopolitics are Emerging Cyberthreats in 2023

KnowBe4

Wouldn’t it be great if your cybersecurity strategy only had to focus on just a few threats? Sigh… if only life were that easy. But new predictions for this year’s most prevalent cyber threats from analyst firm Forrester should help focus your efforts.

Cloud 73
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Supply Chain Attack Defense Demands Mature Threat Hunting

Dark Reading

Active threat hunting is the best protection against supply chain attacks like MOVEit and 3CX, experts say.

106
106
article thumbnail

Half of U.K. Companies Have Been a Cyber Attack Victim in the Last Three Years

KnowBe4

New data puts the spotlight on the human factor in U.K. cyber attacks, where users continue to be susceptible to social engineering , creating the so-called “Human Risk.

Risk 72
article thumbnail

Doing Less With Less: Focusing on Value

Dark Reading

Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.

article thumbnail

Using the metadata service to identify disks in your VSI with IBM Cloud VPC

IBM Big Data Hub

A common use case in the cloud is attaching/removing volumes dynamically. Identifying the attached disk device in the operating system of the VSI is not always obvious. In IBM Cloud Virtual Server for VPC , the disk that is attached to the VSI is identified by the volume attachment identifier. Every volume has a UUID, but the attachment between the volume and the VSI also has a UUID.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Loader Delivering Spyware via Image Steals Cryptocurrency Info

Dark Reading

Sophisticated attackers are lacing malware into PNG image files in order to steal cryptocurrency and business information.

90
article thumbnail

5G network rollout using DevOps: Myth or reality?

IBM Big Data Hub

The deployment of Telecommunication Network Functions had always been a largely manual process until the advent of 5 th Generation Technology ( 5G ). 5G requires that network functions be moved from a monolithic architecture toward modularized and containerized patterns. This opened up the possibility of introducing Dev Ops-based deployment principles (which are well-established and adopted in the IT world) to the network domain.

Cloud 69
article thumbnail

Organizations Take 43 Hours to Detect an Spear Phishing Cyber Attack

KnowBe4

New data makes it crystal clear that spear phishing is a real problem… and organizations may not properly be prepared to detect and address it.