Wed.May 01, 2024

article thumbnail

Correlating Cyber Investments With Business Outcomes

Data Breach Today

SecurityGate CEO Ted Gutierrez said the SEC's new cybersecurity mandates give "more teeth to the idea that cybersecurity is a business problem." He discussed the need for CISOs to link cyber risk and business outcomes and other ways in which the rules affect the field of cybersecurity.

article thumbnail

RSAC Fireside Chat: APIs are wondrous connectors — and the wellspring of multiplying exposures

The Last Watchdog

At the close of 2019, API security was a concern, though not necessarily a top priority for many CISOs. Related: GenAI ignites 100x innovation Then Covid 19 hit, and API growth skyrocketed, a trajectory that only steepened when Generative AI ( GenAI ) and Large Language Models ( LLMs ) burst onto the scene. As RSA Conference 2024 gets underway next week at San Francisco’s Moscone Center, dealing with the privacy and security fall out of those back-to-back disruptive developments will command a l

Cloud 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GitLab Hackers Use 'Forgot Your Password' to Hijack Accounts

Data Breach Today

US CISA Orders Federal Agencies to Apply January Patch The U.S. federal government's cybersecurity agency warned that hackers are exploiting a vulnerability in DevOps platform GitLab that was patched in January. The vulnerability allows hackers to use the "forgot your password" function to send a reset link to an attacker-controlled inbox.

Passwords 281
article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019. Infoblox researchers observed China-linked threat actors Muddling Meerkat using sophisticated DNS activities since 2019 to bypass traditional security measures and probe networks worldwide. The experts noticed a spike in activity observed in September 2023.

IT 119
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Verizon DBIR: Cyber Defenders Are Facing Exploit Fatigue

Data Breach Today

Experts Warn That Human Failures Have Led to Surge in Successful Zero-Day Exploits Verizon executives warned that cyber defenders are struggling with fatigue amid a surge in cyberattacks targeting zero-day exploits and other vulnerabilities. It takes most enterprises nearly 55 days on average to mitigate 50% of critical vulnerabilities once patches become available, the DBIR says.

IT 274

More Trending

article thumbnail

Qantas Airways Says App Showed Customers Each Other's Data

Data Breach Today

Customers Report Seeing Each Other's Bookings, Inadvertent Flight Cancellations Australian's Qantas Airways has confirmed suffering a data breach after its app began inadvertently exposing other customers' data to each other. While the airline said no financial data was exposed, customers reported seeing other people's details, as well as unexpected flight cancellations.

article thumbnail

A flaw in the R programming language could allow code execution

Security Affairs

A flaw in the R programming language enables the execution of arbitrary code when parsing specially crafted RDS and RDX files. A vulnerability, tracked as CVE-2024-27322 (CVSS v3: 8.8), in the R programming language could allow arbitrary code execution upon deserializing specially crafted R Data Serialization (RDS) or R package files (RDX). R is an open-source programming language widely used for statistical computing and graphics.

Metadata 109
article thumbnail

Corelight Gets $150M to Expand Detection, Improve Workflows

Data Breach Today

Series E Funding Round to Cover Future Operations, Enhance Product Innovation Corelight has secured $150 million on a $900 million valuation to support future growth and secure full independence. The Series E funds will be used to enhance the network detection and response vendor's product innovation, including expanded detection capabilities and improved security workflows.

Security 271
article thumbnail

[CASE STUDY] Healthcare Organization Hardens Employee Defenses Against Insidious Callback Phishing Attacks

KnowBe4

A major U.S. healthcare provider significantly reduced their employees' susceptibility to callback phishing attacks after using KnowBe4's callback phishing simulation and training capabilities.

Phishing 103
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Lawmakers Grill UnitedHealth CEO on Change Healthcare Attack

Data Breach Today

UnitedHealth Group CEO Andrew Witty Explains the Steps the Company Is Taking Lawmakers on Wednesday grilled UnitedHealth Group CEO Andrew Witty over security lapses leading up to the Change Healthcare cyberattack and the company's handling of the incident, including the sectorwide disruption it caused and the compromise of millions of individuals' sensitive data.

Security 268
article thumbnail

Navigating the Masquerade: Recognizing and Combating Impersonation Attacks

KnowBe4

With all great power, there comes an equal potential for misuse. Among the sophisticated arsenal of threat actors, impersonation attacks have surged to the forefront, which questions our sense of trust.

Security 102
article thumbnail

US and Allies Issue Cyber Alert on Threats to OT Systems

Data Breach Today

Cyber Authorities Warn Pro-Russian Hacktivists Targeting Small-Scale OT Systems U.S. and international cyber authorities issued a warning Wednesday that pro-Russian hacktivists are increasingly targeting small-scale operational technology systems throughout North America and Europe that have been left vulnerable to attacks due to internet-exposed industrial control systems.

268
268
article thumbnail

A Vast New Data Set Could Supercharge the AI Hunt for Crypto Money Laundering

WIRED Threat Level

Blockchain analysis firm Elliptic, MIT, and IBM have released a new AI model—and the 200-million-transaction dataset it's trained on—that aims to spot the “shape” of bitcoin money laundering.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Cuttlefish malware targets enterprise-grade SOHO routers

Security Affairs

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data. Researchers at Lumen’s Black Lotus Labs discovered a new malware family, named Cuttlefish, which targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data from internet traffic.

article thumbnail

Maximizing ROI in security investments: The financial advantages of integrated solutions

Jamf

How Jamf maximizes ROI in security investments, providing cost-effective and efficient security solutions, prioritizing financial prudence alongside robust security

Security 104
article thumbnail

AI Voice Scam

Schneier on Security

Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her.

article thumbnail

Ex-NSA employee sentenced to 262 months for attempting to transfer classified documents to Russia

Security Affairs

A former U.S. NSA employee has been sentenced to nearly 22 years in prison for attempting to sell classified documents to Russia. Jareh Sebastian Dalke (32), of Colorado Springs, is a former employee of the U.S. National Security Agency (NSA) who has been sentenced to nearly 22 years (262 months) in prison for attempting to transmit classified National Defense Information (NDI) to Russia.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

North Korean Threat Actors Target Software Developers With Phony Job Interviews

KnowBe4

Suspected North Korean threat actors are attempting to trick software developers into downloading malware during phony job interviews, according to researchers at Securonix.

86
article thumbnail

How generative AI will revolutionize supply chain 

IBM Big Data Hub

Unlocking the full potential of supply chain management has long been a goal for businesses that seek efficiency, resilience and sustainability. In the age of digital transformation, the integration of advanced technologies like generative artificial intelligence brings a new era of innovation and optimization. AI tools help users address queries and resolve alerts by using supply chain data, and natural language processing helps analysts access inventory, order and shipment data for decision-ma

article thumbnail

OpenText recognized as a leader in continuous test automation platforms

OpenText Information Management

The OpenText continuous automation testing platform, acquired as Micro Focus in August 2022, was invited to participate in The Forrester Wave™: Continuous Automation Testing Platforms, Q4 2022. Forrester released the results of their 26-criterion evaluation of the 15 most significant continuous automation testing (CAT) vendors, and we have great news to share: the report recognizes the OpenText offering as a Leader.

article thumbnail

CDAOs: The new disruptors accelerating AI maturity and adoption

Collibra

As a Chief Data and Analytics Officer (CDAO) or Chief Data Officer (CDO), you stand at the forefront of transforming data into a strategic asset. However, with an average tenure of roughly two-and-a-half years, CDAOs and CDOs have the shortest tenures of any C-suite executives, according to a 2023 Deloitte study (1). For CDAOs to truly become disruptors, you need more time in the C-suite.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Introducing Top 6 New Features for Extended ECM for SAP SuccessFactors 24.2

OpenText Information Management

Are you ready to revolutionize the way you manage HR documents and processes? We're thrilled to announce the latest update of OpenText™ Extended ECM for SAP® SuccessFactors ® 24.2. Packed with exciting features and enhancements, this release is set to elevate your HR game to new heights! 1. AI Takes Flight: Gone are the days of manual searching through endless HR documents.

ECM 62
article thumbnail

Inside Ukraine’s Killer-Drone Startup Industry

WIRED Threat Level

Ukraine needs small drones to combat Russian forces—and is bootstrapping its own industry at home.

IT 85
article thumbnail

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

OpenText Information Management

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of cybersecurity. While we don’t want to spoil the report (and strongly encourage everyone to give it a read) there are a few interesting findings that stood out. Before we delve into these findings, we want to celebrate a milestone: 2024 marks the 10th consecutive year that the OpenText ArcSight Intelligence™ team has contributed to

article thumbnail

Google’s New Privacy Plan Has Flaws, Regulator Says in Internal Documents via The WSJ

IG Guru

Check out the article here. The post Google’s New Privacy Plan Has Flaws, Regulator Says in Internal Documents via The WSJ first appeared on IG GURU.

Privacy 80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How AI is shaping the future of EDI

OpenText Information Management

Electronic Data Interchange (EDI) remains crucial to supply chain collaboration today. As with all other IT solutions, artificial intelligence (AI) developments shape the EDI world. Yet, while the technologies used for EDI connectivity continue to evolve, misconceptions and a general lack of understanding around EDI and B2B integration persist. EDI technology continues to evolve, but companies need to deal with a complex mix Over the several decades since companies implemented the first EDI con

B2B 57
article thumbnail

The US government, privacy, and security – recent developments

Data Protection Report

The United States Federal Government is turning its attention to privacy and cybersecurity laws, and the result has been several recent legal developments that may have an impact on your business. Keeping up with these developments is not easy, so we’ve created a fun way to test your knowledge of the same: True or False: There is a bipartisan bill pending that would pre-empt state breach notification laws.

Privacy 45
article thumbnail

IAM and Passkeys: 4 Steps Towards a Passwordless Future

Thales Cloud Protection & Licensing

IAM and Passkeys: 4 Steps Towards a Passwordless Future madhav Thu, 05/02/2024 - 05:07 In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) remains a vital link in the cybersecurity chain. However, with World Password Day just around the corner, there’s no time like the present to consider how relying on antiquated password systems leaves organizations exposed to vulnerabilities.