Mon.Oct 09, 2023

article thumbnail

Credentials Hard-Coded in Cisco Emergency Location Tracker

Data Breach Today

Emergency Responder Among Several Recent Cisco Product Vulnerability Advisories Cisco has released urgent fixes to a critical vulnerability affecting an emergency communication system used to track callers' location in real time. A developer inadvertently hard-coded credentials in Cisco Emergency Responder software, opening a permanent backdoor for unauthenticated attackers.

article thumbnail

Phishers Spoof USPS, 12 Other Natl’ Postal Services

Krebs on Security

The fake USPS phishing page. Recent weeks have seen a sizable uptick in the number of phishing scams targeting U.S. Postal Service (USPS) customers. Here’s a look at an extensive SMS phishing operation that tries to steal personal and financial data by spoofing the USPS, as well as postal services in at least a dozen other countries. KrebsOnSecurity recently heard from a reader who received an SMS purporting to have been sent by the USPS, saying there was a problem with a package destined

Phishing 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

cURL Maintainers Fixing 'Worst Curl Security Flaw'

Data Breach Today

Updates Expected Wednesday for Open-Source Command-Line Tool, Library Maintainers of the widely used open-source command-line tool cURL and libcurl library that supports key network protocols said two upcoming vulnerabilities are set to be disclosed this week. One flaw is probably "the worst curl security flaw in a long time," said curl founder Daniel Stenberg.

Libraries 292
article thumbnail

Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development

The Last Watchdog

Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: Setting IoT security standards At Black Hat 2023 , I had the chance to visit with Olivier Gaudin , founder and co-CEO, and Johannes Dahse , head of R&D, at SonarSource , a Geneva, Switzerland-based supplier of systems to achieve Clean Code.

IoT 180
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

23andMe Investigating Apparent Credential Stuffing Hack

Data Breach Today

Hackers Claim to Have 20 Million Pieces of Code; Ancestry Data Leaked on Dark Web Genetics testing firm 23andMe is investigating a data leak of ancestry DNA information for certain customers whose usernames and passwords were previously hacked on other websites. The company suspects a massive credential stuffing attack on individual accounts using recycled passwords and no MFA.

Passwords 285

More Trending

article thumbnail

Get Ready for AI as a Service in the Cloud - and Everywhere

Data Breach Today

Cloud Security Alliance's Troy Leach on AI in Cloud, Fintech Industry Firms using large language models that power gen AI-powered tools must consider security and privacy aspects such as data access, output monitoring and model security before jumping on the bandwagon, said Troy Leach of Cloud Security Alliance. "Everything is going to be AI as a service," Leach predicted.

Cloud 268
article thumbnail

News alert: Georgia State receives a $10 million grant to research AI, robotics and edge computing

The Last Watchdog

Atlanta, GA, Oct. 9, 2023 — Jonathan Shihao Ji, a computer science professor at Georgia State University, has received a $10 million grant from the Department of Defense (DoD) to address critical problems in artificial intelligence (AI) and robotics with a focus on human-robot interaction, 3D virtual environment reconstruction, edge computing and trustworthy AI In recent years, AI has become more and more prevalent in our world, powering search engines, voice assistants and self-driving c

article thumbnail

UK Lawmakers Call for Halt to Live Facial Recognition

Data Breach Today

Petition Signed by 65 Parliamentarians and 31 Civil Society Organizations More than five dozen British lawmakers across political parties and privacy organizations called for an "immediate stop" to real-time facial recognition in the United Kingdom. Live facial recognition faces a ban in Europe and its use by police is banned in a handful of U.S. jurisdictions.

Privacy 268
article thumbnail

CIPL Releases Paper on Ten Recommendations for Global AI Regulation

Hunton Privacy

On September 29, 2023, the Centre for Information Policy Leadership at Hunton Andrews Kurth (“CIPL”) released a new paper on its Ten Recommendations for Global AI Regulation. The paper is part of CIPL’s Accountable AI project and follows several earlier contributions including Artificial Intelligence and Data Protection in Tension (October 2018), Hard Issues and Practical Solutions (February 2020), and Artificial Intelligence and Data Protection: How the GDPR Regulates AI (March 2020).

Paper 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Flagstar Bank suffered a data breach once again

Security Affairs

Flagstar Bank announced a data breach suffered by a third-party service provider exposed the personal information of over 800,000 US customers. Flagstar Bank is warning 837,390 US customers that their personal information was exposed after threat actors breached the third-party service provider Fiserv. Flagstar Bank is an American commercial bank headquartered in Troy, Michigan , it is a wholly owned subsidiary of New York Community Bank.

article thumbnail

Patch Now: Massive RCE Campaign Wrangles Routers Into Botnet

Dark Reading

Thousands of devices, including D-Link and Zyxel gear, remain vulnerable to takeover despite the availability of patches for the several bugs being exploited by IZ1H9 campaign.

116
116
article thumbnail

Large-scale Citrix NetScaler Gateway credential harvesting campaign exploits CVE-2023-3519

Security Affairs

IBM observed a credential harvesting campaign that is targeting Citrix NetScaler gateways affected by the CVE-2023-3519 vulnerability. IBM’s X-Force researchers reported that threat actors are conducting a large-scale credential harvesting campaign exploiting the recent CVE-2023-3519 vulnerability (CVSS score: 9.8) in Citrix NetScaler Gateways.

article thumbnail

Cybersecurity Talent in America: Bridging the Gap

Dark Reading

It's past time to reimagine how to best nurture talent and expand recruiting and training to alleviate the shortage of trained cybersecurity staff. We need a diverse talent pool trained for tomorrow's challenges.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Inside FTX’s All-Night Race to Stop a $1 Billion Crypto Heist

WIRED Threat Level

The same chaotic day FTX declared bankruptcy, someone began stealing hundreds of millions of dollars from its coffers. A WIRED investigation reveals the company’s “very crazy night” trying to stop them.

IT 108
article thumbnail

'Looney Tunables' Linux Flaw Sees Snowballing Proof-of-Concept Exploits

Dark Reading

Following the publication of the critical Linux security vulnerability, security specialists released PoC exploits to test the implications of CVE-2023-4911.

Security 114
article thumbnail

The path to targeted and sustainable generative AI

CGI

As organizations move fast toward the use of generative AI, much has been written about common considerations to keep in mind when exploring and implementing this promising technology. Yet, what is often missing in this dialogue are two important considerations in the journey to generative AI: knowledge sovereignty and sustainability.

98
article thumbnail

Stay a Step Ahead of your #1 Downtime Threat - Business Email Compromise

KnowBe4

A new report from Secureworks has found that business email compromise (BEC) remains “one of the most financially damaging online crimes overall for orgs” in 2023. The security firm’s 2023 State of the Threat report says BEC “exceeds even ransomware in aggregate, mainly because it is so prolific, even if individual financial losses from BEC may be lower than individual losses from ransomware.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Need for Speed: When Cloud Attacks Take Only 10 Minutes

Dark Reading

Security sensors are common in the home for both prevention and response in the event something goes wrong. But in the cloud, have you taken the same approach?

Cloud 98
article thumbnail

One Out of Five Organizations Must Improve Their Security Posture to be Eligible for Cyber Insurance

KnowBe4

As insurers become more educated on what a “secure organization” looks like, they are tightening their requirements that puts the onus on organizations to be more secure.

article thumbnail

Weekly Vulnerability Recap – October 9, 2023 – Zero-Days Strike Android, Microsoft, Apple, Cisco & More

eSecurity Planet

A surge of critical vulnerabilities and zero-day exploits has made for a very busy week in IT security, affecting a range of tech giants like Atlassian, Cisco, Apple, Arm, Qualcomm and Microsoft. Among the issues in the last week, Android and Arm faced actively exploited vulnerabilities in GPU drivers. Microsoft released urgent patches for Edge, Teams, and Skype.

article thumbnail

Ransomware Attack Dwell Time Drops by 77% to Under 24 Hours

KnowBe4

As attackers evolve their toolsets and processes, the significant drop in dwell time signifies a much higher risk to organizations that now have less time to detect and respond to initial attacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Operation Behind Predator Mobile Spyware Is 'Industrial Scale'

Dark Reading

The Intellexa alliance has been using a range of tools for intercepting and subverting mobile and Wi-Fi technologies to deploy its surveillance tools, according to an investigation by Amnesty International and others.

IT 91
article thumbnail

Energy Sector Experiences Three Times More Operational Technology Cybersecurity Incidents Than Any Other Industry

KnowBe4

While industries like financial services and healthcare tend to dominate in IT attacks, the tables are turned when looking at Operational Technology (OT) cyber attacks – and the energy sector is the clear “winner.

article thumbnail

Artificial intelligence and a new era of human resources

IBM Big Data Hub

Artificial intelligence (AI) can help usher in a new era of human resource management, where data analytics, machine learning and automation can work together to save people time and support higher-quality outcomes. As AI technology moves beyond automation to augmentation, companies may be looking at how AI tools can make the work of human resources (HR) better for employees and job seekers.

article thumbnail

Register for KB4-CON EMEA 2023 Now!

KnowBe4

Exciting news, registration is now open for KB4-CON EMEA! Get ready to dive into the intersection of security culture and cybersecurity at.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

??? ????????? ???? ???? ??????? ? ?????????? T?hsil Portal?

Armstrong Archives

Content Oyununun qaydaları və şərtləri Aviator-ə bənzər başqa hansı oyunları oynaya bilərəm? Lisenziyalı onlayn kazinolar: saytı necə seçmək olar in AZ bukmeker kontorunda addım-addım qeydiyyat Xaricdə təhsil haqqında bloqlar Macarıstanda magistr təhsili Xaricdə təhsil magistratura dərəcəsini hansı ölkədə almaq olar? Xaricdə təhsil arzusuna qovuşanlar Pin-Up Aviator: oyun qaydaları və strategiyaları, slotdan istifadə üçün bonuslar Çempionlar Liqasında ən çox oyun keçirən oyunçular Top Onlayn Oyu

52
article thumbnail

Healthcare Industry Witnesses 279% Increase in Business Email Compromise Attacks in 2023

KnowBe4

The massive uptick in business email compromise (BEC) is considered one of the costliest attack types, requiring organizations to put employees on notice to stay vigilant.

75
article thumbnail

Android, iOS platformas? üçün 1win proqram? yükl?m?k Pulsuz Qura?d?rma

Armstrong Archives

Content Son Yazılar in mərc tətbiqinin xüsusiyyətləri in tətbiqində mərc seçimləri Canlı Mərclər Son əlavələr Ən yaxşı e-İdman bukmekerlər-də mərc etməyin üstünlükləri Azərbaycanda ən çox baxılan 3 müsabiqə və çempionat: e-İdman canlı mərc və canlı yayım iOS üçün 1Win mərc tətbiqi Ekspress mərc edə bilərəm? in tətbiqində idman mərcləri etmək Yeni bir 1Win üzvü kimi bonus əldə edə bilərəm?