Wed.Nov 22, 2023

article thumbnail

Election Integrity Fears in Europe Provoke Joint Exercise

Data Breach Today

Cybersecurity and Deepfakes Are Major Concerns European electoral and cybersecurity authorities on Tuesday held a joint exercise assessing plans to hold an incident-free election, weeks after trading bloc cybersecurity agency ENISA said the election is at risk from deepfake images and videos.

article thumbnail

10 cybersecurity questions for elected officials

CGI

Founded in 1976, CGI is among the largest IT and business consulting services firms in the world. We are insights-driven and outcomes-based to help accelerate returns on your investments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia Unveils AU$587M Strategy to Defeat Cybercrime

Data Breach Today

Australia Envisions Cybersecurity Leadership in the Pacific With New Strategy The Australian government says it will mandate ransomware reporting by businesses, boost law enforcement capacity and fund startups with innovative cybersecurity solutions under a strategy unveiled Monday. "We cannot continue as we have," said Cyber Security and Home Affairs Minister Clare O'Neil.

article thumbnail

New InfectedSlurs Mirai-based botnet exploits two zero-days

Security Affairs

Mirai-based botnet InfectedSlurs has been spotted exploiting two zero-day RCE flaws to compromise routers and video recorder (NVR) devices. Akamai discovered a new Mirai-based DDoS botnet, named InfectedSlurs, actively exploiting two zero-day vulnerabilities to infect routers and video recorder (NVR) devices. The researchers discovered the botnet in October 2023, but they believe it has been active since at least 2022.

Honeypots 122
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Founder Sam Altman Back as OpenAI CEO Under Revamped Board

Data Breach Today

Ex-Salesforce CEO Taylor to Chair Initial 3-Member Board; Altman, Brockman Kept Off The nonprofit behind ChatGPT reinstated co-founder Sam Altman as its chief executive following a tumultuous 106 hours that saw OpenAI burn through two interim CEOs. Most of the board members responsible for firing Altman Friday gave up their director positions to get him back.

IT 277

More Trending

article thumbnail

CISA Urges Patching as Hackers Exploit 'Looney Tunables' Bug

Data Breach Today

Kinsing Threat Actor Observed Targeting Vulnerable Cloud Environments With New Flaw The Cybersecurity and Infrastructure Security Agency is requiring federal agencies to patch Linux devices on their networks and urging private sector organizations to do the same after security researchers observed threat actors exploiting a new vulnerability on many major Linux distributions.

Cloud 271
article thumbnail

Phishing Attacks Expected to More Than Double During the Black Friday and Cyber Monday Shopping Week

KnowBe4

Another day, another warning about holiday scams! Lookout Inc., a data-centric cloud security company, is warning employees and businesses that phishing attacks are expected to more than double this week , based on historical data. With more corporate data residing in the cloud and a massive amount of employees still working remotely, mobile has become the endpoint of choice for the modern workforce.

Phishing 115
article thumbnail

Scattered Spider Hops Nimbly From Cloud to On-Prem in Complex Attack

Dark Reading

The actor behind the high-profile MGM incident jumps across segmentations in under an hour, in a ransomware attack spanning Okta, Citrix, Azure, SharePoint, and more.

Cloud 117
article thumbnail

CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA adds Looney Tunables Linux flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Looney Tunables Linux vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability CVE-2023-4911 (CVSS score 7.8), aka Looney Tunables , is a buffer overflow issue that resides in the GNU C Library’s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable.

IT 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Visa Warns of Increased Phishing Scams During Holiday Season

KnowBe4

Visa Payment Fraud Disruption (PFD) expects phishing attacks to increase between November 2023 and January 2024. Findings in its Holiday Edition Threats Report outline the popular fraud tactics predicted this holiday season.

Phishing 105
article thumbnail

Citrix provides additional measures to address Citrix Bleed

Security Affairs

Citrix urges admins to kill NetScaler user sessions after patching their appliances against the CVE-2023-4966 Citrix Bleed vulnerability. Citrix is providing additional measures to admins who are patching their NetScaler appliances against the CVE-2023-4966 ‘ Citrix Bleed ‘ vulnerability. The company is urging admins to drop all active user sessions and terminate all persistent ones. “If you are using any of the affected builds listed in the security bulletin , you should upg

article thumbnail

Apple to Add Manual Authentication to iMessage

Schneier on Security

Signal has had the ability to manually authenticate another account for years. iMessage is getting it : The feature is called Contact Key Verification, and it does just what its name says: it lets you add a manual verification step in an iMessage conversation to confirm that the other person is who their device says they are. (SMS conversations lack any reliable method for verification­—sorry, green-bubble friends.

article thumbnail

New Data Covers How the Retail Market is at Greater Risk of Industry-Specific Cyberthreats

KnowBe4

A new analysis of the retail market’s threat landscape discusses the challenges faced by this industry and what threat tactics are being used to take advantage of retail’s cyber weaknesses.

Retail 99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

3 Ways to Stop Unauthorized Code From Running in Your Network

Dark Reading

As organizations increasingly rely on AI-developed code, they must put guardrails in place to prevent major cybersecurity risks related to malicious code.

article thumbnail

Digital Skimming Increases by 50%, Just in Time for the Holiday Season

KnowBe4

Security researchers identify growth in the use of an ongoing cyberskimming campaign that involves compromising legitimate website checkout code.

Security 103
article thumbnail

Fake Browser Updates Targeting Mac Systems With Infostealer

Dark Reading

A pervasive ClearFake campaign targeting Windows systems with Atomic Stealer has expanded its social engineering scams to MacOS users, analysts warn.

IT 106
article thumbnail

What Is Cloud Configuration Management? Complete Guide

eSecurity Planet

Cloud configuration management runs and regulates cloud configuration settings, parameters, and policies to streamline cloud services and assure security. This includes maintaining changes in virtual machines, storage resources, networks, and applications. Configuration management guarantees that enterprises maintain security and compliance while streamlining operations via automation and centralized control of their whole infrastructure environment.

Cloud 86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs

Dark Reading

Biometric security on PCs isn't quite as bulletproof as you might think, as the line between sensors and host computers can be tampered with.

article thumbnail

Enterprise software provider TmaxSoft leaks 2TB of data

Security Affairs

TmaxSoft, a Korean IT company developing and selling enterprise software has leaked over 50 million sensitive records. The 2 TB-strong Kibana dashboard has been exposed for over two years. Cybernews researchers discovered it back in January 2023, noting the set of data was first spotted in June 2021. Our team attributed the dashboard to tmax.co.kr – a website owned by TmaxSoft, one of the Tmax brand companies.

Metadata 114
article thumbnail

Idaho National Nuclear Lab Targeted in Major Data Breach

Dark Reading

The laboratory operates a major test reactor, tests advanced nuclear energy concepts, and conducts research involving hydrogen production and bioenergy.

article thumbnail

Thanksgiving Ode to Spotlight AI

Hanzo Learning Center

Recently, the team at Hanzo announced Spotlight AI , the first automated relevance assessment engine for eDiscovery. We’re delighted by its reception. Hanzo even won an award. As Thanksgiving approaches, we extend our warmest wishes to everyone celebrating this special occasion. May your day be filled with joy, surrounded by family and friends. In the spirit of gratitude and innovation, we present to you an "Ode to Spotlight AI.

IT 67
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Persian Gulf's March to the Cloud Presents Global Opportunities

Dark Reading

Loosening attitudes about cloud security are expected to create a nearly $10 billion public cloud market in the Middle East by 2027.

Cloud 97
article thumbnail

The top 5 insights into post-pandemic digital supply chains

OpenText Information Management

As vital engines of the world economy, supply chains profoundly impact our daily lives as consumers. They are also an area of business operations full of intriguing contrasts and innovation. On the one hand, the fundamental problems that supply chain professionals are battling have changed little over time. The profession is still about managing and … The post The top 5 insights into post-pandemic digital supply chains appeared first on OpenText Blogs.

article thumbnail

Web Shells Gain Sophistication for Stealth, Persistence

Dark Reading

A favorite post-exploitation tool continues to gain sophistication, with one recent example adding disguised log-in pages, credential stealing, and information gathering via services such as VirusTotal.

110
110
article thumbnail

In an FTC First, Proposed Order Requires Global Tel*Link Corp. to Notify Users and Facilities of Future Breaches

Hunton Privacy

On November 16, 2023, the Federal Trade Commission released a proposed order in connection with a complaint filed in August of 2020 against Global Tel*Link Corp. (“GTL”) and its subsidiaries, Telmate and TouchPay, which offers communication and payment services for incarcerated individuals. The complaint centered around a security breach where a technician for a vendor of GTL placed unencrypted, personally identifiable information in a test environment to test a new search and storage software.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Qatar Cyber Agency Runs National Cyber Drills

Dark Reading

Qatari organizations participate in cybersecurity exercises to hone their incident response plans and processes.

article thumbnail

Predictions for the financial services industry in 2024

OpenText Information Management

The word ‘rollercoaster’ best sums up 2023. We’ve experienced economic, geopolitical, technological, and societal challenges over recent months with the ongoing cost-of-living crisis, high interest rates, inflation, global conflicts, catastrophic weather events, the rise in artificial intelligence such as ChatGPT, to name only a few. All of these elements have put pressure on the financial … The post Predictions for the financial services industry in 2024 appeared first on OpenText Blogs.

article thumbnail

Rootkit Turns Kubernetes From Orchestration to Subversion

Dark Reading

Kubernetes compromises have usually led to attackers creating cryptomining containers, but the outcomes could be much worse, say researchers presenting at the Black Hat Europe conference.

97