Fri.Jan 12, 2024

article thumbnail

Ransomware Trends: Medusa and Akira Rage; Tortilla Disrupted

Data Breach Today

Crypto-Malware Trackers Report a Surge in Known Ransomware Victims at End of 2023 Ransomware-wielding attackers show no signs of stopping, and experts report December 2023 was the second-worst month on record for known victims. Lately, Akira-wielding attackers have been hitting Finland hard, and Medusa has been behind a rising number of attacks.

article thumbnail

Researchers created a PoC for Apache OFBiz flaw CVE-2023-51467

Security Affairs

Researchers published a proof-of-concept (PoC) code for the recently disclosed critical flaw CVE-2023-51467 in the Apache OfBiz. Researchers from cybersecurity firm VulnCheck have created a proof-of-concept (PoC) exploit code for the recently disclosed critical flaw CVE-2023-51467 (CVSS score: 9.8) in the Apache OfBiz. In December, experts warned of an authentication bypass zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system.

Honeypots 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Nation-State Hacker Is Exploiting Cisco Routers

Data Breach Today

'Volt Typhoon' Could Be Preparing for Renewed Burst of Activity A Chinese state hacking group is attacking superseded Cisco routers to target government entities in the United States, the United Kingdom and Australia. Beijing cyberespionage hackers dubbed "Volt Typhoon" are using vulnerabilities that were first disclosed in early 2019.

article thumbnail

News alert: Trimarc launches Active Directory security posture tool for enterprise, M&A

The Last Watchdog

Washington, DC, Jan. 12, 2024 – Trimarc Security , the professional services company with extensive expertise in securing Active Directory for enterprise organizations, today announced the early access availability of its new product, Trimarc Vision. Trimarc Vision is a powerful security posture analysis product that provides visibility into the most important security components of Active Directory.

Security 100
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Amazon Appeals Privacy Fine of 746 Million Euros

Data Breach Today

E-Commerce Giant Accuses Luxembourg Regulators of Attacking the Company Amazon in a Luxembourg court Tuesday contested a once-record privacy fine levied against the e-commerce giant for its advertising practices by the diminutive country's data protection authority. The fine of 746 million euros stems from a 2018 complaint by French privacy group La Quadrature du Net.

Privacy 300

More Trending

article thumbnail

ISMG Editors: Will We Ever Get a Handle on API Security?

Data Breach Today

Also: Why We Should Care About the New York Times' Copyright Lawsuit Against OpenAI In the latest weekly update, ISMG editors discussed how the surge in API usage poses challenges for organizations, why good governance is so crucial to solving API issues and how The New York Times' legal action against OpenAI and Microsoft highlights copyright concerns.

Security 293
article thumbnail

Juniper Networks fixed a critical RCE bug in its firewalls and switches

Security Affairs

Juniper Networks fixed a critical pre-auth remote code execution (RCE) flaw, tracked as CVE-2024-21591, in its SRX Series firewalls and EX Series switches. Juniper Networks released security updates to address a critical pre-auth remote code execution (RCE) vulnerability, tracked as CVE-2024-21591, that resides in SRX Series firewalls and EX Series switches.

IT 117
article thumbnail

US CISA Must Improve Water Sector Assistance, Says Watchdog

Data Breach Today

DHS Office of Inspector General Finds Lack of Coordination With EPA A U.S. federal watchdog said government agencies could better synchronize efforts to improve water and wastewater sector cybersecurity efforts and faulted the Cybersecurity and Infrastructure Security Agency for not coordinating well with the Environmental Protection Agency.

article thumbnail

How Jamworks protects confidentiality while integrating AI advantages

IBM Big Data Hub

The integration of artificial intelligence (AI) has ushered in a new era of technological progress, offering a spectrum of benefits across industries. AI’s potential to revolutionize operations, enhance decision-making and drive innovation is undeniable. The advantages of AI are numerous and impactful, from predictive analytics that refine strategies, to natural language processing that fuels customer interactions and assists users in their daily tasks, to assistive tools that enhance acce

Cloud 101
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Fertility Test Lab Will Pay $1.25M to Settle Breach Lawsuit

Data Breach Today

ReproSource Also Agrees to Beef Up Security in Wake of 2021 Ransomware Attack A fertility testing laboratory has agreed to improve its data security practices and pay up to $1.25 million to settle a consolidated class action lawsuit filed in the wake of a 2021 ransomware attack that compromised sensitive health information of about 350,000 patients.

article thumbnail

On IoT Devices and Software Liability

Schneier on Security

New law journal article : Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims Abstract: Smart devices are used to facilitate cyberattacks against both their users and third parties. While users are generally able to seek redress following a cyberattack via data protection legislation, there is no equivalent pathway available to third-party victims who suffer harm at the hands of a cyberattacker.

IoT 95
article thumbnail

How to Stop Your X Account From Getting Hacked Like the SEC's

WIRED Threat Level

The US Securities and Exchange Commission and security firm Mandiant both had their X accounts breached, possibly due to changes to X’s two-factor authentication settings. Here’s how to fix yours.

article thumbnail

Webianr: HOW TO BUILD AND SUSTAIN YOUR RECORDS MANAGEMENT PROGRAM WITH A RECORDS MANAGEMENT PLAYBOOK via the St. Louis ARMA Chapter on January 18 at 1:30 Central

IG Guru

REGISTER HERE The post Webianr: HOW TO BUILD AND SUSTAIN YOUR RECORDS MANAGEMENT PROGRAM WITH A RECORDS MANAGEMENT PLAYBOOK via the St. Louis ARMA Chapter on January 18 at 1:30 Central first appeared on IG GURU.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

4 reasons information management is at the heart of Formula E racing

OpenText Information Management

Some of you may wonder why OpenText, a software company focused on information management, is involved with ABB FIA Formula E World Championship, and Jaguar TCS Racing in particular. It’s not the unlikely pairing you might think. The heartbeat of Gen3: Information If you don’t already know, Formula E was created as a testbed of … The post 4 reasons information management is at the heart of Formula E racing appeared first on OpenText Blogs.

article thumbnail

IBM Cloud patterns: Private wireless network on IBM Cloud Satellite 

IBM Big Data Hub

Communication service providers (CSPs) are teaming up with hyperscalers to offer private wireless networks that are owned and fully managed by whoever builds them. A private wireless network (PWN) provides the same kind of connectivity as public wireless networks, and enterprises must weigh the pros and cons of private wireless networks using 5G technology.

Cloud 62
article thumbnail

VAI Forges AI Partnership to Boost ERP Offerings

Information Matters

US enterprise software developer VAI has kickstarted 2024 by joining forces with Proton, an AI-powered customer relationship management (CRM) specialist, in a move that promises to strengthen its offerings for Read more The post VAI Forges AI Partnership to Boost ERP Offerings appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52
article thumbnail

Webinar: Versatile 2023 Records Management Reveal on Tue, Jan 16, 2024 11:00 AM – 11:30 AM EST

IG Guru

Zasio is kicking off its 2024 webinar schedule with an important software demonstration! We are thrilled for our next release of Versatile 2023, which showcases a preview of our basic and standard physical records management features. Physical records management is one of the available feature packs that can be included in Versatile 2023. If […] The post Webinar: Versatile 2023 Records Management Reveal on Tue, Jan 16, 2024 11:00 AM – 11:30 AM EST first appeared on IG GURU.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Calabrio Snaps Up AI Specialist in Customer Service Tech Push

Information Matters

US call centre software developer Calabrio has moved to tap into the growth in artificial intelligence-enabled customer service solutions by acquiring Toronto-based analytics specialist Wysdom. The purchase, for an undisclosed Read more The post Calabrio Snaps Up AI Specialist in Customer Service Tech Push appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Breaking Down Data Silos: How to Achieve Data Efficiency

Docuware

In an increasingly digitalized world, data is a company's most valuable asset. However, it is all too often trapped in data silos, stand-alone systems, that are an obstacle to efficient data management. These isolated areas in a company's IT infrastructure make it difficult to smoothly exchange and integrate information between different departments and systems.

IT 29
article thumbnail

LexisNexis Launches AI-Powered Legal Research Tool in Canada and UK

Information Matters

LexisNexis Legal & Professional has announced the launch of a new artificial intelligence-powered legal research solution, Lexis+ AI, in Canada and the UK. The tool aims to streamline legal work Read more The post LexisNexis Launches AI-Powered Legal Research Tool in Canada and UK appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

6 Best Cloud Log Management Services in 2024 Reviewed

eSecurity Planet

Cloud log management is the comprehensive processing of log data, including generation, aggregation, storage, analysis, archive, and disposal. The top log management services offer troubleshooting and operational efficiency through seamless integration, secure log handling, advanced security analytics, and more. To help you select an ideal cloud log management solution, we’ve evaluated the top options and their use cases.

Cloud 105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

PubHive Unveils New AI-Powered Research Platform

Information Matters

PubHive, a provider of scientific literature analysis tools, has launched a new platform called PubHive Navigator Enterprise Portal aimed at streamlining research and collaboration for life sciences companies. The cloud-based Read more The post PubHive Unveils New AI-Powered Research Platform appeared first on Information Matters - Where AI Meets Knowledge Management.

Cloud 52
article thumbnail

Vast Voter Data Leaks Cast Shadow Over Indonesia ’s 2024 Presidential Election

Security Affairs

Investigators from Resecurity’s HUNTER (HUMINT) warn that Indonesia is increasingly being targeted by cyber-threat actors. Investigators from Resecurity’s HUNTER (HUMINT) have found that Indonesia is increasingly being targeted by cyber-threat actors who have staged attacks that pose significant long-term risks to the integrity of the country’s elections.

Sales 106
article thumbnail

Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s

Schneier on Security

Interesting article , with photographs. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.