Fri.Nov 03, 2023

article thumbnail

How the Healthcare Sector Can Boost Credential Management

Data Breach Today

Stolen and compromised credentials continue to be the crux of major health data security incidents involving cloud environments. But stronger credential management practices and a focused approach to "least privilege engineering" would help, said Taylor Lehmann of Google Cloud.

Cloud 282
article thumbnail

Takeaways from the Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence

AIIM

In the U.S., President Joe Biden’s administration issued an executive order on artificial intelligence, which “establishes new standards for AI security.” The Executive Order issued on October 30, 2023 directs several actions designed to “protect Americans from the potential risks of AI systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Examining the Record Surge in Ransomware

Data Breach Today

Also: Insights From Israel; Costco's Web Tracker Problem In the latest weekly update, ISMG editors discuss how Israeli tech companies are supporting the war effort, how the volume of ransomware attacks reached a record high in September and why retailer Costco faces privacy claims for its use of website tracking tools for online pharmacy customers.

article thumbnail

Russian FSB arrested Russian hackers who supported Ukrainian cyber operations

Security Affairs

The FSB arrested two Russian hackers who are accused of having helped Ukrainian entities carry out cyberattacks on critical infrastructure targets. The Russian intelligence agency Federal Security Service (FSB) arrested two individuals who are suspected of supporting Ukrainian entities to carry out cyberattacks to disrupt Russian critical infrastructure.

Security 131
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FusionAuth Receives $65M to Safeguard New Identity Domains

Data Breach Today

First-Ever Outside Investment Will Allow CIAM Provider to Better Authenticate Users A Colorado-based customer identity platform hauled in $65 million to effectively identify and authenticate users with government IDs or mobile phones. The growth equity investment from Updata Partners will allow FusionAuth to better serve businesses in regions other than the U.S. and Europe.

More Trending

article thumbnail

Atlassian Urges Patching Against Data Loss Vulnerability

Data Breach Today

Exploit Goes Public But No Sign of Active Exploitation Atlassian added new urgency Thursday to a warning that customers with on-premises Confluence servers should patch immediately to protect against a vulnerability that attackers could exploit to destroy data. A publicly available exploit now exists for the vulnerability, tracked as CVE-2023-22518.

266
266
article thumbnail

ZDI discloses four zero-day flaws in Microsoft Exchange

Security Affairs

Researchers disclosed four zero-day flaws in Microsoft Exchange that can be remotely exploited to execute arbitrary code or disclose sensitive information on vulnerable installs. Trend Micro’s Zero Day Initiative (ZDI) disclosed four zero-day vulnerabilities in Microsoft Exchange that can be remotely exploited by an authenticated attacker to execute arbitrary code or disclose sensitive information on vulnerable installs.

article thumbnail

Convicted: 'King of Crypto' Bankman-Fried Now King of Fraud

Data Breach Today

Jury Convicts Sam Bankman-Fried of All 7 Fraud and Money Laundering Charges The guilty verdicts returned by a jury against Sam Bankman-Fried confirmed that the one-time cryptocurrency wunderkind now stands as one of America's biggest fraudsters. His sentencing is scheduled for March 28, 2024. The statutory maximum sentences for his crimes total over 100 years in prison.

257
257
article thumbnail

Ace Hardware Still Reeling From Weeklong Cyberattack

Dark Reading

Cyberattackers downed a quarter of the hardware giant's entire IT apparatus. Now, before the company can recover, they're going after individual branches.

IT 127
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Iranian Hackers Spying on Israeli Organizations

Data Breach Today

Espionage Group Uses Legitimate Tools, Lures on Victims During Israel-Hamas War Security researchers say an Iranian state hacking group is likely using spearfishing and a legitimate content hosting service in a cyberespionage campaign targeted against Israel. The hacker group, tracked as MuddyWater, likely mounted a new campaign after the onset of the Israel-Hamas war.

Security 246
article thumbnail

Multiple WhatsApp mods spotted containing the CanesSpy Spyware

Security Affairs

Kaspersky researchers are warning of multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. Kaspersky researchers discovered multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. mods are modifications or alterations made to an application, often by third-party developers or users. These modifications can serve various purposes, such as adding new features, customizing the app’s behavior, or enhancing its performance.

article thumbnail

ICE Employees Downloaded Banned Apps on Government Devices

Data Breach Today

New Report Identifies ‘Risky’ Unauthorized Apps That Pose National Security Risks The Department of Homeland Security inspector general found U.S. Immigration and Customs Enforcement employees had downloaded "risky user-installed mobile applications" onto government devices despite the devices being banned from federal information systems for posing national security risks.

article thumbnail

Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind

Lenny Zeltser

The notion that security is everyone’s responsibility in computer systems dates back to at least the early 1980s when it was included in a US Navy training manual and hearings in the US House of Representatives. Behind the pithy slogan is the idea that every person in the organization contributes to its security program. Even if the company has employees with “security” in their title, they cannot safeguard information assets on their own.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Election Officials Plead for Federal Cybersecurity Funding

Data Breach Today

Local Election Offices Face Critical Lack of Cyber Resources, Officials Warn Secretaries of state and election administrators told the Senate Committee on Rules and Administration that local election offices are facing a critical lack of resources and funding to support essential cybersecurity measures ahead of the upcoming voting cycle.

article thumbnail

New York Increases Cybersecurity Rules for Financial Companies

Schneier on Security

Another example of a large and influential state doing things the federal government won’t: Boards of directors, or other senior committees, are charged with overseeing cybersecurity risk management, and must retain an appropriate level of expertise to understand cyber issues, the rules say. Directors must sign off on cybersecurity programs, and ensure that any security program has “sufficient resources” to function.

article thumbnail

Europe Clamps Down on Meta Ad Personalization

Data Breach Today

Company Rolls Out a Paid Subscription for Ad-Free Use Social media giant Meta faces a possible ban within the next 10 days across Europe on the consent-free use of personal data for ad personalization. A Meta spokesperson said the company does not face a "blanket ban" on the use of personal data and is introducing a subscription option.

article thumbnail

Critical Atlassian Bug Exploit Now Available; Immediate Patching Needed

Dark Reading

In-the-wild exploit activity from dozens of cyberattacker networks is ramping up for the security vulnerability in Confluence, tracked as CVE-2023-22518.

Security 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Data Breaches and Cyber Attacks in October 2023 – 867,072,315 Records Breached

IT Governance

IT Governance’s research has discovered the following for October 2023: 114 publicly disclosed security incidents. 867,072,315 records known to be breached. Introducing our Data Breach Dashboard We’re excited to introduce our new monthly Data Breach Dashboard – a one-page overview of this month’s key findings that you can download for free. Our first downloadable Dashboard is going live next week.

article thumbnail

To Improve Cyber Defenses, Practice for Disaster

Dark Reading

Trained teams can implement and test security measures and protocols to prevent and mitigate cyber breaches.

Security 122
article thumbnail

Friday Squid Blogging: Eating Dancing Squid

Schneier on Security

It’s not actually alive, but it twitches in response to soy sauce. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

'KandyKorn' macOS Malware Lures Crypto Engineers

Dark Reading

Posing as fellow engineers, the North Korean state-sponsored cybercrime group Lazarus tricked crypto-exchange developers into downloading the hard-to-detect malware.

95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apache Kafka and Apache Flink: An open-source match made in heaven

IBM Big Data Hub

In the age of constant digital transformation, organizations should strategize ways to increase their pace of business to keep up with — and ideally surpass — their competition. Customers are moving quickly, and it is becoming difficult to keep up with their dynamic demands. As a result, I see access to real-time data as a necessary foundation for building business agility and enhancing decision making.

article thumbnail

Okta Customer Support Breach Exposed Data on 134 Companies

Dark Reading

1Password, BeyondTrust, and Cloudflare were among five customers directly targeted with stolen Okta session tokens, the company's CSO says.

102
102
article thumbnail

Seiko watches 60K personal data records tick away in BlackCat ransomware heist via TheRegister

IG Guru

Check out the article here. The post Seiko watches 60K personal data records tick away in BlackCat ransomware heist via TheRegister first appeared on IG GURU.

article thumbnail

Ransomware Readiness Assessments: One Size Doesn't Fit All

Dark Reading

Tailored ransomware readiness assessments help organizations develop comprehensive response plans that minimize damage and restore operations quickly.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mastering Ingress in the UI: Elevating your app visibility

IBM Big Data Hub

When scaling up the number of applications you manage, it can feel like there are a lot of moving parts to ensure that your APIs are going through to the right applications in a secure manner. To make this easier, IBM Cloud® Kubernetes exposes various API integrations, which are already available through the command line interface (CLI) and Terraform.

Cloud 75
article thumbnail

Considerations for Managing Digital Sovereignty: The Executive Perspective

Dark Reading

Business leaders must frequently balance the advantages of cloud computing and the free flow of data across geographic borders with the need to abide by local laws and regulations.

Cloud 81
article thumbnail

Why Prime Time TV Might Make a Comeback

John Battelle's Searchblog

I hate to admit it, but I miss prime time. For those of you born after Seinfeld went off the air, “prime time” dominated an era when television viewers only had three or four choices at any given time. Before streaming took over our devices, before cable devolved to 500 channels with nothing to see, there was “prime time television.” If you’re old enough to remember when Friends ruled “Must-See TV,” you (and tens of millions of others) likely spent a fai