Mon.Jul 24, 2023

article thumbnail

OneTrust Raises $150M From Al Gore's Firm Following Layoffs

Data Breach Today

Vendor Cuts Valuation by $800M to Get Funding From Generation Investment Management OneTrust hauled in $150 million a year after laying off 950 employees but had to slash its valuation by $800 million to seal the deal. The Atlanta-based company intends to use the proceeds to accelerate its growth and fulfill customer demand for trust intelligence software.

IT 246
article thumbnail

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

The Last Watchdog

Accessing vital information to complete day-to-day tasks at our jobs still requires using a password-based system at most companies. Related: Satya Nadella calls for facial recognition regulations Historically, this relationship has been effective from both the user experience and host perspectives; passwords unlocked a world of possibilities, acted as an effective security measure, and were simple to remember.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gamification Can Make Security Training Fun

Data Breach Today

Webhelp CISO on Interactive Tools for Cybersecurity Awareness Training In a bid to revolutionize information security training and make it more engaging and memorable for employees, Ivan Milenkovic, group CISO at WebHelp, advises firms to adopt gamification and interactive content in corporate training to make it more accessible and memorable for employees.

Security 245
article thumbnail

TETRA Radio Code Encryption Has a Flaw: A Backdoor

WIRED Threat Level

A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is finally seeing sunlight. Researchers say it isn’t pretty.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

As Ransomware Monetization Hits Record Low, Groups Innovate

Data Breach Today

Clop's Zero-Day Mass Exploitation and Extortion is Apogee of High Impact Innovation The Russian-language Clop crime group's mass exploitation of MOVEit file-transfer software demonstrates how criminals continue to seek fresh ways to maximize their illicit profits with minimal effort. Ransomware response firm Coveware says Clop may clear over $75 million from this campaign.

More Trending

article thumbnail

Smishing Campaign Impersonates Japanese Utilities

Data Breach Today

Attackers Targeted Electric and Water Public Utility Users Hackers are targeting Japanese Android users with a new smishing campaign to employ a new version of SpyNote malware. The attackers impersonate a Japanese public utilities company putatively concerned about payment problems to lure victims onto rogue website and infect their devices.

237
237
article thumbnail

Key Takeaways from the NARA Digitizing Permanent Records Webinar

National Archives Records Express

Digital scanning operations, Preservation Labs, Archives 2: Jerry Thompson. National Archives Identifier 184341178 On June 7, 2023, the National Archives and Records Administration (NARA) conducted a webinar on digitizing permanent records to comply with the requirements in 36 CFR 1236 Subpart E, providing valuable insights into best practices and guidelines.

article thumbnail

Will FedNow Truly Rewire the US Payments Landscape?

Data Breach Today

Experts Discuss Fraud, Security, Implementation Hurdles With Fast Payment Program Now that the long-awaited FedNow faster-payment program is operating, experts debate whether U.S. financial institutions will embrace the payment ecosystem and whether the Federal Reserve and the banking industry can overcome implementation challenges and mitigate cybersecurity and fraud issues.

article thumbnail

A flaw in OpenSSH forwarded ssh-agent allows remote code execution

Security Affairs

A new flaw in OpenSSH could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions. Researchers from the Qualys Threat Research Unit (TRU) have discovered a remote code execution vulnerability in OpenSSH ’s forwarded ssh-agent. OpenSSH (Open Secure Shell) is a set of open-source tools and utilities that provide secure encrypted communication over a network.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What Generative AI Means for Security

Data Breach Today

Hacker One Co-Founder Michiel Prins on the Opportunities and Risks of GAI What does generative AI mean for security? In the short term, and possibly indefinitely, we will see offensive or malicious AI applications outpace defensive ones that use AI for security. We also will see an outsized explosion in new attack surfaces. HackerOne can help you prepare your defenses.

Security 236
article thumbnail

Experts warn of OSS supply chain attacks against the banking sector

Security Affairs

Checkmark researchers have uncovered the first known targeted OSS supply chain attacks against the banking sector. In the first half of 2023, Checkmarx researchers detected multiple open-source software supply chain attacks aimed at the banking sector. These attacks targeted specific components in web assets used by banks, according to the experts the attackers used advanced techniques. “On the 5 th and 7 th of April, a threat actor leveraged the NPM platform to upload a couple of packag

IT 96
article thumbnail

Service Provider's Probe Counts More Victims of MOVEit Hacks

Data Breach Today

2.6 Million Individuals Notified by TIAA Due to Clop Group's Hack of PBI Research The count of organizations and individuals affected by Clop's attack on MOVEit file-transfer users has increased, with the Teachers Insurance and Annuity Association of America reporting that 2.6 million members' personal details were exposed when Clop hit service provider PBI Research.

Insurance 233
article thumbnail

Unlock smarter analytics by analyzing any data anywhere 

OpenText Information Management

In today’s data-driven world, organizations are continuously seeking innovative ways to extract valuable insights from vast amounts of information. Gone are the days when a company could get by with waiting hours or even days for ETL processes to move and transform carefully chosen data into ideal structured forms to answer already known questions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Law Firm Hack Affects Victims of an Earlier Breach Again

Data Breach Today

Client Files Breached Included Data of Vision Benefits Plan Members A global law firm is notifying nearly 153,000 individuals of a hacking incident that compromised several client files. The files contained sensitive personal information and affects vision care patients who had been victims of a breach three years ago.

228
228
article thumbnail

Twelve Norwegian ministries were hacked using a zero-day vulnerability

Security Affairs

Threat actors exploited a zero-day flaw in third-party software in attacks against the ICT platform used by 12 Norwegian ministries. The ICT platform used by twelve ministries of the Norwegian government was hacked, and threat actors have exploited a zero-day vulnerability in an unnamed third-party software. Local authorities launched an investigation into the attack that was reported by the Norwegian Security and Service Organization (DSS) to the National Security Authority (NSM).

article thumbnail

12 Norwegian Ministries Impacted in ICT Platform Hack

Data Breach Today

Zero-Day In Third-Party Software Reason for the Hack, Says Security Agency Head Unknown hackers attacked a dozen Norwegian government ministries through a zero day vulnerability present in a shared digital platform, the Oslo government disclosed Monday. The prime minister's office and the ministries of defense, justice and foreign affairs were unaffected.

article thumbnail

China Propaganda Spreads via US News Sites, Freelancers, Times Square

Dark Reading

A widespread disinformation campaign aimed at Americans wasn't that effective, but it was certainly creative, even slipping in influence articles to legitimate news outlets like AZCentral.com.

IT 89
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FBI Warns of Increased Tech Support Scams Using Snail Mail

KnowBe4

The US Federal Bureau of Investigation ( FBI ) has warned of an increase in tech support scams that attempt to trick users into sending cash via snail mail.

article thumbnail

ICRM Announces Candidates for 2023 Election

IG Guru

The ICRM is pleased to announce the following candidates for the ICRM 2023 Elections: President-Elect/Treasurer (2024-2026) Tim O’Toole, CRM, IGP Regent, Exam Administration and Member Relations (2024-2025) Jeremy Bolton, CRM, IGP Dr. Todd D. Kleine, CRM Regent, Legislation and Appeals (2024-2025) Brent Gatewood, CRM Elections will be open July 26 – August 18.

79
article thumbnail

Google Reportedly Disconnecting Employees from the Internet

Schneier on Security

Supposedly Google is starting a pilot program of disabling Internet connectivity from employee computers: The company will disable internet access on the select desktops, with the exception of internal web-based tools and Google-owned websites like Google Drive and Gmail. Some workers who need the internet to do their job will get exceptions, the company stated in materials.

Access 78
article thumbnail

Orgs Face Record $4.5M Per Data Breach Incident

Dark Reading

Cl0p stands to make $100M on the MOVEit campaign, and according to a just-released survey, more than half of businesses are willing to pass data breach costs onto customers.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Singapore PDPC Consultation on New Guidance for Use of Personal Data in AI Systems

Data Matters

On July 18, 2023, Singapore’s data protection authority published proposed guidelines on the use of personal data in artificial intelligence (AI) systems. The guidelines will be up for public consultation until August 31, 2023, and aim to address how Singapore’s privacy laws will apply to organizations which develop or deploy AI systems. The draft guidelines underscore the significance placed by the privacy regulator on the need to ensure personal data protection, without discouraging organizati

article thumbnail

North Korean Cyberspies Target GitHub Developers

Dark Reading

The North Korean APT is setting up legitimate accounts on GitHub and social media platforms to pose as developers or recruiters — ultimately to fool targets into loading npm repositories with malicious code.

74
article thumbnail

Norwegian Government Hit by Widespread Cyber Attack

IT Governance

Twelve Norwegian government ministries have fallen victim to a cyber attack, according to a press release issued on Monday. It’s the latest in a series of attacks against the country, with some reports suggesting that it could be linked to Russian state-sponsored attackers. Norway is Europe’s largest gas supplier, and it borders Russia along its northernmost tip.

article thumbnail

KillNet's Kremlin Connection Unclear as the Cybercrime Collective Grows

Dark Reading

KillNet is amassing members, capabilities, and know-how, as it looks to consolidate cybercrime power under its own umbrella.

IT 74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Deliver smarter patient care with integrated patient records  

OpenText Information Management

One of the biggest challenges facing the healthcare industry today is the sheer volume of data and patient information that needs to be processed to ensure the right outcomes for every patient. According to the University of Pittsburgh Medical Center, “unstructured data can account for up to 80 percent of a patient’s medical record. That … The post Deliver smarter patient care with integrated patient records appeared first on OpenText Blogs.

article thumbnail

Zero-Day Vulnerabilities Discovered in Global Emergency Services Communications Protocol

Dark Reading

Weak encryption algorithms leave radio communications open to attack and abuse.

article thumbnail

Get insights across all your software delivery environments on a single platform

OpenText Information Management

Software development is a complex, multi-stage process that spans many teams, tools, and methods of working. To manage this complicated process, those teams need a reliable, connected way to track progress, identify defects, and pinpoint where to improve. The OpenText™ ValueEdge platform helps today’s enterprises do this with the latest release, Cloud Editions (CE) 23.3. … The post Get insights across all your software delivery environments on a single platform appeared first on Open

Cloud 52