Tue.Sep 26, 2023

article thumbnail

Sony Investigating Potential Data Breach

Data Breach Today

Two Online Threat Actors Claim Responsibility Sony is investigating an apparent leak of internal data posted onto the dark web and a criminal hacking board by separate criminal actors. Sony is saying little other than "we are currently investigating the situation, and we have no further comment at this time.

article thumbnail

New EU FIDA Proposal: How Does This Affect GDPR?

Data Matters

The European Commission issued the Financial Data Access Act (FIDA) proposal in June this year. FIDA will create a legislative framework that aims to "bring payments and the wider financial sector into the digital age" by facilitating the sharing of and access to customer financial data (whether of businesses or consumers). The post New EU FIDA Proposal: How Does This Affect GDPR?

GDPR 158
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Urges Americans to Apply MFA, 'Think Before They Click'

Data Breach Today

Director Jen Easterly: Password Managers, Automatic Software Updates Key to Defense CISA Director Jen Easterly urged citizens to boost their defenses by choosing strong passwords, opting for multi-factor authentication, reporting phishing and enabling automatic software updates. Easterly said users should choose passwords that are complex and unique to each sensitive account.

Passwords 295
article thumbnail

Canadian Flair Airlines left user data leaking for months

Security Affairs

Researchers discovered that Canadian Flair Airlines left credentials to sensitive databases and email addresses open for at least seven months Canadian Flair Airlines left credentials to sensitive databases and email addresses open for at least seven months, the Cybernews research team has discovered. This increases the risk of passengers’ personal information, such as emails, names, or addresses, ending up in the wrong hands.

Phishing 124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

London Cybersecurity Summit Spotlights AI and Ransomware

Data Breach Today

Experts Emphasize Proactive Security Measures and Resilience to Mitigate Threats Information Security Media Group recently concluded its Cybersecurity Summit: London, which brought together industry leaders for a day of informative sessions covering a diverse range of critical cybersecurity topics, including CISOs' vulnerability to liability, ransomware threats and burnout.

More Trending

article thumbnail

Xenomorph Android Malware Campaign Targets US Banks

Data Breach Today

Enhanced Malware Exerts Even More Control Over Mobile Devices Android banking Trojan Xenomorph has resurfaced in a new campaign targeting cryptocurrency wallets and various financial institutions. The malware has been actively targeting users in Europe for more and is now focused on institutions in the United States, Canada, Spain, Italy, Portugal and Belgium.

271
271
article thumbnail

Signal Will Leave the UK Rather Than Add a Backdoor

Schneier on Security

Totally expected, but still good to hear : Onstage at TechCrunch Disrupt 2023, Meredith Whittaker, the president of the Signal Foundation, which maintains the nonprofit Signal messaging app, reaffirmed that Signal would leave the U.K. if the country’s recently passed Online Safety Bill forced Signal to build “backdoors” into its end-to-end encryption. “We would leave the U.K. or any jurisdiction if it came down to the choice between backdooring our encryption and betrayin

article thumbnail

US, South Korea Pledge Strengthened Tech Collaboration

Data Breach Today

Officials Discuss Governance for AI, 5G, Cloud Computing The United States and South Korea reaffirmed a commitment to mitigate the risks in technologies including AI, 5G networks and cloud computing, while developing an "inclusive approach" to govern their use. The two countries said governance must support the development of trustworthy AI.

Cloud 265
article thumbnail

Amidst MGM, Caesar's Incidents, Attackers Focus on Luxury Hotels

Dark Reading

A fast-growing cyber campaign solely takes aim at luxury hotel and resort chains, using security-disruptive tactics to spread info-stealing malware.

Security 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Coding the Future: A DevOps Odyssey – Pioneering Automation, Innovation, and Collaboration

Data Breach Today

Discover the power of JFrog Curation's features and benefits in securing and auditing developers open source and third-party package downloads.

Security 271
article thumbnail

Threat actors claim the hack of Sony, and the company investigates

Security Affairs

Sony launched an investigation into an alleged data breach after the RansomedVC group claimed the hack of the company. Sony announced it is investigating allegations of a data breach after the RansomedVC extortion group claimed to have hacked the company and added the company to its Tor leak site. “We are currently investigating the situation, and we have no further comment at this time.

article thumbnail

Live Webinar I Breaking Barriers: Transforming Threat Detection and Response

Data Breach Today

Join Simon Perry, Senior Product Marketing Manager & Security Evangelist, VMware Carbon Black to discover unparalleled data insights with the latest groundbreaking extended detection and response solution (XDR) from VMware Carbon Black.

Marketing 232
article thumbnail

The Rhysida ransomware group hit the Kuwait Ministry of Finance

Security Affairs

This week the Rhysida ransomware group claimed the hack of the Kuwait Ministry of Finance and added it to its Tor leak site. Last week a ransomware attack hit the Government of Kuwait, the attack took place on September 18 and the government experts immediately started the incident response procedures to block the threat. Below is the message published on Twitter by the official X account of Kuwait’s Ministry of Finance.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC Publishes Staff Paper on the Harm of Blurred Advertising

Hunton Privacy

On September 14, 2023, the Federal Trade Commission issued a press release announcing the publication of a staff paper about blurred advertising. In the staff paper, the FTC describes blurred advertising as the blending of ads with digital media content ( e.g., displaying ads within online games and virtual reality worlds). The FTC warns that these ads are not readily identifiable as marketing by consumers and pose a significant threat to young children who do not have the skills or cognitive de

Paper 111
article thumbnail

Xenomorph malware is back after months of hiatus and expands the list of targets

Security Affairs

A new campaign is spreading Xenomorph malware to Android users in the United States, Spain, Portugal, Italy, Canada, and Belgium. Researchers from ThreatFabric uncovered a new campaign spreading Xenomorph malware to Android users in the United States and all over the world. In February 2022, researchers from ThreatFabric first spotted the Xenomorph malware, which was distributed via the official Google Play Store reaching over 50,000 installations.

Phishing 114
article thumbnail

Researchers Uncover RaaS Affiliate Distributing Multiple Ransomware Strains

Dark Reading

Ransomware-as-a-service affiliate ShadowSyndicate is unusual for the size of its malicious infrastructure and the fact that it's distributing seven different ransomware strains.

article thumbnail

Top 5 Problems Solved by Data Lineage

Security Affairs

Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle. In an age where data drives decisions and fuels innovation, understanding the journey of data from its inception to its final destination is paramount. Data lineage provides this understanding. Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle, and it offers a host of benefits in solving critical data management challenges.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Spatial computing is the next frontier in airline flight safety

IBM Big Data Hub

Flight delays are a frustrating aspect of flying. It’s a situation most can relate to: sitting in the terminal or on the tarmac wondering why your flight is delayed, with no answers or information. There are dozens of reasons why an aircraft could be delayed with safety being the underpinning reason for many of them. Suppose an aircraft incurs minor damage from a lightning strike or by coming into contact with ground equipment as it’s being towed or refueled, or it sustains damage fr

Paper 101
article thumbnail

BORN Ontario data breach impacted 3.4 million newborns and pregnancy care patients

Security Affairs

The Better Outcomes Registry & Network (BORN), the Ontario birth registry disclosed a data breach affecting some 3.4 million people. The Better Outcomes Registry & Network (BORN) is a program and database used in the healthcare sector, particularly in maternal and child health, to collect, manage, and analyze health information for the purpose of improving patient outcomes and healthcare services.

article thumbnail

Proactive Security: What It Means for Enterprise Security Strategy

Dark Reading

Proactive Security holds the elusive promise of helping enterprises finally get ahead of threats, but CISOs must come to grips with the technological and philosophical change that it brings.

article thumbnail

Smishing Triad Stretches Its Tentacles into the United Arab Emirates

Security Affairs

Resecurity research found that the ‘Smishing Triad’ cybercrime group has expanded its phishing campaign into the United Arab Emirates (UAE). Resecurity research recently found that ‘ Smishing Triad ,’ a group specializing in phishing scams conducted via SMS (smishing attacks), has expanded its attack campaign into the United Arab Emirates (UAE).

IT 96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Practical Insights To Improve Security Awareness in Higher Education

KnowBe4

Higher education is making important strides in improving cybersecurity readiness, but much is yet to be done. Cybersecurity awareness professionals.

Education 106
article thumbnail

4 Pillars for Building a Responsible Cybersecurity Disclosure Program

Dark Reading

Responsible disclosure must strike a balance between the immediate need to protect users and the broader security implications for the entire community.

article thumbnail

OpenText World 2023—AI and Its Forces of Change

OpenText Information Management

AI will change everything. We are in the midst of a massive shift from the cloud digital era to the AI cognitive era. Automation, data and learning models are coming together to work seamlessly. AI will require a whole new ontology, a new way of thinking, all centered on how we innovate and how we … The post OpenText World 2023—AI and Its Forces of Change appeared first on OpenText Blogs.

IT 80
article thumbnail

Chad Taps Huawei for Digital Modernization Project

Dark Reading

Fiber optic networks and better connectivity for Chad's users are part of the ICT modernization project with the Chinese networking giant.

98
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Can AI give you a new currency for delivering better experiences?

OpenText Information Management

Meet Goose, a trusted partner for your AI journey. This AI-generated wingman is our resident designer of seven-star experiences, ready to assist you in reimagining how your customer, partner, and employee experiences can transform with AI innovations. Rely on Goose’s keen sense of direction to steer you toward success. You: Why do geese fly in a … The post Can AI give you a new currency for delivering better experiences?

article thumbnail

HD Moore's Discovery Journey

Dark Reading

Metasploit creator's shift into enterprise asset discovery and passive scanning with startup runZero is a natural evolution of his exploratory cyber career.

85
article thumbnail

Top things you may have missed at Dreamforce 23!

OpenText Information Management

What an inspiring and epic Dreamforce, September 12-14, with the OpenText team! It was fantastic to connect with people and colleagues face to face to meet and learn from one another at the world’s largest IT conference. Our theme was all about making information your superpower! We help connect people, processes and documents together with … The post Top things you may have missed at Dreamforce 23!