Fri.Mar 01, 2024

article thumbnail

Alert: Info Stealers Target Stored Browser Credentials

Data Breach Today

Calls Grow to Block Browser-Based Password Storage as Malware Comes Calling Saving passwords in browser-based password managers or via "remember my details" website options might make for simple and fast log-ins for employees, but they also give attackers an easy way to lift legitimate credentials, oftentimes via highly automated, information-stealing malware, experts warn.

Passwords 332
article thumbnail

Information Management During Mergers & Acquisitions

AIIM

In January, I served as a panelist during a three-part series on mergers and acquisitions in the association space. Hosted by the ASAE Executive Management Advisory Council, the series explored what non-profit organizations need to consider before, during, and after mergers and acquisitions. The panelists were mainly executives and legal professionals, so the fascinating conversations focused very much on strategy, governance, finances, and human capital.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zscaler CEO: Palo Alto Playing Defense as Firewall Sales Ebb

Data Breach Today

Jay Chaudhry Says Palo Alto Offering Free Products to New Platform Users Won't Work Zscaler CEO Jay Chaudhry said Palo Alto Networks' strategy of offering free products to new platform customers will "unravel over time" as firewalls become shelfware. Legacy vendors find themselves "in a defensive position" as the role of firewalls shrinks and demand for zero trust security grows.

Sales 288
article thumbnail

Here Come the AI Worms

WIRED Threat Level

Security researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.

Security 141
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Widespread Effect of the Change Healthcare Mega Hack

Data Breach Today

The Change Healthcare mega hack has taken nearly 120 of the company's IT products and services offline since Feb. 21, and that cyber disruption is having serious, widespread impact on the entire healthcare industry including major players, said attorney Sara Goldstein of the law firm BakerHostetler.

IT 278

More Trending

article thumbnail

ISMG Editors: OpenAI's Response to The New York Times Case

Data Breach Today

Also: Addressing Scotland's Cybercrime Surge; NOC and SOC Convergence In the latest weekly update, ISMG editors discussed the convergence of the NOC and SOC functions, Scottish Police efforts to address the escalating challenge of cybercrime in Scotland, and why OpenAI is pushing to dismiss certain aspects of The New York Times lawsuit.

277
277
article thumbnail

Police seized Crimemarket, the largest German-speaking cybercrime marketplace

Security Affairs

German police seized the largest German-speaking cybercrime marketplace Crimemarket and arrested one of its operators. The Düsseldorf Police announced that a large-scale international law enforcement operation led to the seizure of the largest German-speaking cybercrime marketplace. “Under the direction of the North Rhine-Westphalia Cybercrime Central and Contact Office (ZAC NRW), an investigative commission at the Düsseldorf Police Headquarters has been collecting evidence for years about

Access 121
article thumbnail

Ivanti Disputes CISA Findings of Post-Factory Reset Hacking

Data Breach Today

Gateway Maker Says Technique Won't Succeed in Live Customer Environment Corporate VPN maker Ivanti disputed findings by the U.S. cybersecurity agency that said hackers can establish persistence on rooted appliances through a factory reset but nonetheless released an updated integrity checking tool Tuesday. Ivanti has been in emergency response mode since early January.

article thumbnail

Crooks stole €15 Million from European retail company Pepco

Security Affairs

Crooks stole €15.5 million from the European variety retail and discount company Pepco through a phishing attack. The Hungarian business of the European discount retailer Pepco Group has been the victim of a phishing attack, crooks stole about 15 million euros ($16.3 million). The group operates three distribution lines: Poundland in the United Kingdom, Dealz in the Republic of Ireland and Spain, and Pepco in various European countries. “Pepco Group (“Pepco” or the “Group”) has been the ta

Retail 103
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Strengthening OT Defense, Zero Trust: SSH's Strategic Vision

Data Breach Today

Rami Raulas on Why SSH Plans to Invest in Zero Trust, OT Defense and Quantum Safety In his first week in his new role as interim CEO of SSH Communications Security, Rami Raulas shares insights on the company’s strategic focus on zero trust, operational technology security, and quantum-safe cryptography to address evolving cybersecurity challenges.

article thumbnail

NIST Cybersecurity Framework 2.0

Schneier on Security

NIST has released version 2.0 of the Cybersecurity Framework: The CSF 2.0, which supports implementation of the National Cybersecurity Strategy , has an expanded scope that goes beyond protecting critical infrastructure, such as hospitals and power plants, to all organizations in any sector. It also has a new focus on governance, which encompasses how organizations make and carry out informed decisions on cybersecurity strategy.

article thumbnail

Email-Based Cyber Attacks Increase 222% as Phishing Dominates as the Top Vector

KnowBe4

Analysis of the second half of 2023 shows attackers are getting more aggressive with email-based phishing attacks in both frequency and execution.

Phishing 102
article thumbnail

Libraries in 19 councils at risk of ‘fire sale’ with new Exceptional Financial Support Framework

CILIP

Libraries in 19 councils at risk of ‘fire sale’ with new Exceptional Financial Support Framework Image of birmingham library via wikimedia commons CILIP is sounding the alarm over a potential 'fire sale' of library buildings following the Government announcement of 'exceptional financial support' to 19 Councils. The Department for Levelling Up, Housing and Communities announced yesterday that 19 councils in England will benefit from an 'Exceptional Financial Support (EFS)' framework for the fisc

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Planning with Purpose: 10 Tips to Develop a Year-Long Security and Compliance Training Program

KnowBe4

Our team at KnowBe4 recently got together to talk about planning for annual security and compliance training.

article thumbnail

Five Eyes alliance warns of attacks exploiting known Ivanti Gateway flaws

Security Affairs

The Five Eyes alliance warns of threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways. The Five Eyes intelligence alliance issued a joint cybersecurity advisory warning of threat actors exploiting known vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. The advisory provides details about the exploitation in the wild of Connect Secure and Policy Secure vulnerabilities CVE-2023-46805 , CVE-2024-21887 , and CVE-2024-2189

article thumbnail

Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered

Schneier on Security

Paleontologists have discovered a 183-million-year-old species of vampire squid. Prior research suggests that the vampyromorph lived in the shallows off an island that once existed in what is now the heart of the European mainland. The research team believes that the remarkable degree of preservation of this squid is due to unique conditions at the moment of the creature’s death.

Paper 82
article thumbnail

Cybercriminals Sent 1.76 Billion Social Media Phishing Emails in 2023

KnowBe4

As social media phishing reaches new heights, new data reviewing 2023 shows a massive effort by cybercriminals to leverage impersonation of social media brands.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Meet the shady companies helping governments hack citizens’ phones via Fast Company

IG Guru

Check out the article here. The post Meet the shady companies helping governments hack citizens’ phones via Fast Company first appeared on IG GURU.

article thumbnail

UK ICO Issues Enforcement Notice and Warning to UK Home Office

Hunton Privacy

On March 1, 2024, the UK Information Commissioner’s Office (“ICO”) announced that it had issued an enforcement notice and a warning to the UK Home Office for failing to sufficiently assess the privacy risks posed by the electronic monitoring of people arriving in the UK via unauthorized means. The Home Office is the ministerial department of the UK government responsible for immigration, security, and law and order.

Privacy 61
article thumbnail

Elevate Apple device security with Jamf Security Cloud’s new feature

Jamf

Jamf Security Cloud leverages Jamf Pro API to bring together management and security, building automatic deployment of activation profiles in a single click.

article thumbnail

EDPB Launches Coordinated Enforcement Framework on Right of Access

Hunton Privacy

On February 28, 2024, the European Data Protection Board (“EDPB”) announced the launch of its latest Coordinated Enforcement Framework action on the right of access. Through the course of 2024, 31 data protection authorities across the European Economic Area, including seven German state-level authorities, will take part in this initiative on the implementation of the right of access.

Access 61
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why You Should Integrate Your ERP with Document Management

Docuware

Although Enterprise Resource Planning (ERP) Systems promise to do it all, when it comes to incorporating documents into your workflows or archiving them for quick retrieval, ERPs can come up short. Many ERP systems seek to digitalize every process in an organization. This can create complexity that negatively affects the user experience and takes needless detours rather than following a direct path.