Fri.Sep 29, 2023

article thumbnail

IronNet Ceases Operations, Terminates All Remaining Staffers

Data Breach Today

End Comes Just 25 Months After Threat Detection Firm Went Public At $1.2B Valuation The firm founded by retired four-star Gen. Keith Alexander and once valued at $1.2 billion has officially turned off the lights. IronNet Friday ceased business operations and terminated remaining employees after probing strategic alternatives and finding additional sources of liquidity unavailable.

289
289
article thumbnail

A still unpatched zero-day RCE impacts more than 3.5M Exim servers

Security Affairs

Experts warn of a critical zero-day vulnerability, tracked as CVE-2023-42115, in all versions of Exim mail transfer agent (MTA) software. A critical zero-day vulnerability, tracked as CVE-2023-42115 (CVSS score 9.8), affects all versions of Exim mail transfer agent (MTA) software. A remote, unauthenticated attacker, can exploit the vulnerability to gain remote code execution (RCE) on Internet-exposed servers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulns Found In Another Progress Software File Transfer App

Data Breach Today

'There's a 10-out-10 severity bug you need to patch right now!' Progress Software is again sending customers on a scramble to install emergency patches, this time for its secure FTP server software. The advisory comes months after hackers took advantage of a zero day in the company's MOVEit file transfer software in a hack affecting tens of millions.

Security 284
article thumbnail

Misconfigured WBSC server leaks thousands of passports

Security Affairs

The World Baseball Softball Confederation (WBSC) left open a data repository exposing nearly 50,000 files, some of which were highly sensitive, the Cybernews research team has discovered. On June 5th, our researchers discovered a misconfigured Amazon Web Services (AWS) bucket storing nearly 48,000 files. A bucket is a container for storing data within AWS’s cloud storage system.

Risk 121
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CrowdStrike Boosts Israeli Startup Ties With AWS Partnership

Data Breach Today

AWS & CrowdStrike Cybersecurity Startup Accelerator Will Incubate Early-Stage Firms CrowdStrike has joined forces with Amazon Web Services to familiarize themselves with more Israeli cyber startups earlier in their development lifecycle. The Cybersecurity Startup Accelerator will provide EMEA-based companies with mentorship, technical expertise and partnership opportunities.

More Trending

article thumbnail

Inside Look: FDA's Cyber Review Process for Medical Devices

Data Breach Today

Medical device makers in their premarket submissions to the Food and Drug Administration under the agency's new refuse to accept policy for cybersecurity should pay close attention to details such as a product's software bill of materials and vulnerability management, said Jessica Wilkerson of FDA.

article thumbnail

Move Over, MOVEit: Critical Progress Bug Infests WS_FTP Software

Dark Reading

In the wake of Cl0p's MOVEit rampage, Progress Software is sending file-transfer customers scrambling again — this time to patch a critical bug that is easily exploitable with a specially crafted HTTPS POST request.

110
110
article thumbnail

NSA Stands Up New Organization to Harness AI

Data Breach Today

A US Advantage on AI Should 'Not Be Taken For Granted,' Says NSA Head Paul Nakasone The NSA has set up a new organization to oversee artificial intelligence in national security systems. Dubbed the AI Security Center, the unit will consolidate the agency's AI activities and support the government's effort to "maintain its competitive edge in AI," said Army Gen.

article thumbnail

Real-time transaction data analysis with IBM Event Automation

IBM Big Data Hub

As the pace and volume of digital business continue to increase, organizations are facing mounting pressure to accelerate the speed at which they do business. The ability to quickly respond to shifting customer and market dynamics has become key for contending with today’s growing digital economy. In a survey run by IDC, a leading provider of global IT research and advice, 43% of technology leaders indicated that they were “planning to deliver innovative digital products and services

Marketing 107
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Zero Trust, Auditability and Identity Governance

Data Breach Today

Two years after President Biden's landmark cybersecurity Executive Order, the question remains: How are federal agencies adapting to the new focus on zero trust and identity governance? SailPoint's Frank Briguglio tackles this question with crucial insights into the state of cybersecurity today.

article thumbnail

People Still Matter in Cybersecurity Management

Dark Reading

Cybersecurity's constant stream of shiny new things shouldn't distract managers from their focus on the people they're protecting.

article thumbnail

Editors' Panel: What Impact Will Cisco's Splunk Acquisition Have on Industry?

Data Breach Today

Also: OT Security Trends, Challenges; FDA Medical Device Guidance In our latest weekly update, ISMG editors discuss key takeaways from a forum on developing a strategy for OT security, guidance issued by the U.S. Food and Drug Administration on cybersecurity in medical devices, and how the acquisition of Splunk by Cisco might impact the cybersecurity industry.

article thumbnail

Cybersecurity Gaps Plague US State Department, GAO Report Warns

Dark Reading

The federal department that oversees the US diplomatic corps abroad suffers a serious lack of visibility into the cyber threats it faces and the security vulnerabilities it's harboring.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly Update 367

Troy Hunt

Ah, home 😊 It's been more than a month since I've been able to sit at this desk and stream a weekly video. And now I'm doing it with the glorious spring weather just outside my window, which I really must make more time to start enjoying. Anyway, this week is super casual due to having had zero prep time, but I hope the discussion about the ABC's piece on HIBP and I in particular is interesting.

article thumbnail

Securing AI: What You Should Know

Dark Reading

Securing AI within your organization starts with understanding how AI differs from traditional business tools. Google's Secure AI Framework provides a model for what to do next.

article thumbnail

Your KnowBe4 Fresh Content Updates from September 2023

KnowBe4

Check out the 66 new pieces of training content added in September, alongside the always fresh content update highlights, events and new features.

article thumbnail

DHS: Physical Security a Concern in Johnson Controls Cyberattack

Dark Reading

An internal memo cites DHS floor plans that could have been accessed in the breach.

Security 114
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

IBM Cloud inactive identities: Ideas for automated processing

IBM Big Data Hub

Regular cleanup is part of all account administration and security best practices, not just for cloud environments. In our blog post on identifying inactive identities , we looked at the APIs offered by IBM Cloud Identity and Access Management (IAM) and how to utilize them to obtain details on IAM identities and API keys. Some readers provided feedback and asked on how to proceed and act on identified inactive identities.

Cloud 83
article thumbnail

How can organizations approach AI ethically?

OpenText Information Management

Meet Skye, a trusted partner for your AI journey. This AI-generated and very well-dressed llama will help you make the most of AI innovations while staying true to your organization’s values. She’s bright-eyed, sure-footed, and wired up to assist you in solving your business challenges efficiently and ethically. This llama is your guide to realizing … The post How can organizations approach AI ethically?

76
article thumbnail

Security Awareness Is Dead. Long Live Security Awareness

KnowBe4

Awareness, behavior, and culture remain key pillars of any security awareness program aiming to win hearts and change behavior. Read more on our blog.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Friday Squid Blogging: Protecting Cephalopods in Medical Research

Schneier on Security

From Nature : Cephalopods such as octopuses and squid could soon receive the same legal protection as mice and monkeys do when they are used in research. On 7 September, the US National Institutes of Health (NIH) asked for feedback on proposed guidelines that, for the first time in the United States, would require research projects involving cephalopods to be approved by an ethics board before receiving federal funding.

article thumbnail

Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain

Dark Reading

The Israeli company developed highly-targeted, mobile malware that would make any APT jealous.

104
104
article thumbnail

FTC Bureau Director Outlines FTC’s Proactive Approach to AI Regulation

Hunton Privacy

On September 19, 2023, the Director of the Federal Trade Commission Bureau of Consumer Protection, Samuel Levine, delivered remarks that provided insight into the FTC’s ongoing strategy for regulating artificial intelligence (“AI”) during the National Advertising Division’s annual conference. Levine emphasized that the FTC is taking a more proactive approach to protect consumers from the harmful uses of AI, while ensuring the market remains fair, open, and competitive.

article thumbnail

Attacks on Azerbaijan Businesses Drop Malware via Fake Image Files

Dark Reading

Images purporting to be of the Armenia and Azerbaijan conflict were malware downloaders in disguise.

94
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Don’t Sleep on the EU’s Digital Markets and Digital Services Acts

John Battelle's Searchblog

(This is a preview of a piece I’m working on for Signal360 , to be published next week.) “The US litigates, the EU legislates.” That’s what one confidential source told me when I asked about the Digital Services Act and the Digital Markets Act , the European Union’s twin set of Internet regulations coming into force this year.

article thumbnail

1xBet Az?rbaycan: 100 dollar bonus, t?tbiqetm?, apk, qeydiyyat

Armstrong Archives

Content Hansı versiya daha yaxşıdır – köhnə və ya yeni? Bet tətbiqetməsindən necə pul çıxarmaq olar Yeni bahisçilər üçün xoş gəlmisiniz bonusu Bet idman mərcləri üçün mərc növləri və mövcud imkanlar Bukmeker kontorunda hesabı necə maliyyələşdirmək olar? Bet saytında qeydiyyat şərtləri və üsulları Sosial şəbəkələr vasitəsilə sürətli avtorizasiya Bet-də təhlükəsiz mərc və güvənli ortam Bet Azərbaycan – Onlayn İdman Mərcləri və Casino Saytı Bet Az Promos və Bonuslar Proqramı PlayMarket-dən yü

52
article thumbnail

New NARA Bulletin on Collaboration Platforms

National Archives Records Express

We are pleased to announce the release of NARA Bulletin 2023-04, Managing Records Created on Collaboration Platforms. We are issuing this bulletin to address agencies’ increased use of intra/inter-agency collaboration platforms to accomplish their missions. The capabilities of collaboration platforms are increasingly robust and can be used when working from any location.