Fri.Oct 27, 2023

article thumbnail

CISA Launches Logging Tool For Resource-Poor Organizations

Data Breach Today

'Logging Made Easy' Provides Organizations With Critical Cybersecurity Insights The U.S. Cybersecurity and Infrastructure Security Agency launched a security tool intended to help organizations with limited resources better protect their Windows-based devices and sensitive data. Logging Made Easy is meant to serve as a turnkey log management tool.

article thumbnail

Lockbit ransomware gang claims to have stolen data from Boeing

Security Affairs

The Lockbit ransomware gang claims to have hacked the aerospace manufacturer and defense contractor Boeing and threatened to leak the stolen data. The Boeing Company, commonly known as Boeing, is one of the world’s largest aerospace manufacturers and defense contractors. In 2022, Boeing recorded $66.61 billion in sales, the aerospace giant has 156,000 (2022).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exabeam Lays Off 20% of Staff, F-Secure to Ax Up to 70 Staff

Data Breach Today

Economic Headwinds, High Inflation, Ukraine War Cited as Major Reasons For Job Cuts Two cybersecurity vendors are laying off a sizable chunk of their staff, with Exabeam axing 20% of its workforce and F-Secure cutting up to 70 employees. Exabeam eliminated roughly 134 positions this week, while F-Secure wants to shrink its workforce by nearly 14%.

Security 285
article thumbnail

News alert: Massachusetts awards $2.3 million grant to strengthen cybersecurity ecosystem statewide

The Last Watchdog

Boston, Mass., Oct. 27, 2023 – Today, the Healey-Driscoll Administration announced a $2.3 million grant through the MassTech Collaborative’s MassCyberCenter to CyberTrust Massachusetts, a nonprofit dedicated to strengthening the cybersecurity ecosystem, to support cybersecurity resiliency for Massachusetts communities and help develop a talent pipeline at Masschusetts colleges and universities to encourage students to enter the field.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK's Ofcom Prepares to Enforce Online Safety Bill

Data Breach Today

Controversial Proposal Formally Adopted Into Law on Thursday The U.K. communication regulator laid down plans to implement a controversial regulation intended to prevent online child sexual abuse material after it officially became law. The Online Safety Bill received royal assent on Thursday after it was cleared by the parliament in September.

More Trending

article thumbnail

United Nations AI Body to Advise on Risks, Global Governance

Data Breach Today

The 38-Member Body Comprises Government, Private, Civil Society Representatives The United Nations unveiled Thursday an AI advisory body that looks to analyze risks and make recommendations on international governance for the technology. The body comprises 38 experts across geographies and industries, including from government, the private sector and civil society.

article thumbnail

France agency ANSSI warns of Russia-linked APT28 attacks on French entities

Security Affairs

France National Agency for the Security of Information Systems warns that the Russia-linked APT28 group has breached several critical networks. The French National Agency for the Security of Information Systems ANSSI (Agence Nationale de la sécurité des systèmes d’information) warns that the Russia-linked APT28 group has been targeting multiple French organizations, including government entities, businesses, universities, and research institutes and think tanks.

Military 116
article thumbnail

FTC Expands Financial Data Breach Reporting Requirements

Data Breach Today

Non-Banking Institutions Will Be Required to Report Breaches Under Revised Rule. Consumer lenders such as mortgage brokers, auto dealers and payday lenders must soon report data breaches to the Federal Trade Commission under a revised regulation that mandates public disclosure. The new disclosure requirement will become effective in six months.

article thumbnail

Octo Tempest Group Threatens Physical Violence as Social Engineering Tactic

Dark Reading

The financially motivated English-speaking threat actors use advanced social engineering techniques, SIM swapping, and even threats of violence to breach targets.

122
122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hello Alfred app exposes user data

Security Affairs

Hello Alfred, an in-home hospitality app, left a database accessible without password protection, exposing almost 170,000 records containing private user data. Hello Alfred is a one-stop application allowing real estate developers and property managers to provide in-home services and maintenance to residents. It also enables landlords to collect rent in-app.

article thumbnail

Safari Side-Channel Attack Enables Browser Theft

Dark Reading

The "iLeakage" attack affects all recent iPhone, iPad, and MacBook models, allowing attackers to peruse your Gmail inbox, steal your Instagram password, or scrutinize your YouTube history.

Passwords 103
article thumbnail

Coming soon: Jamf Remote Assist

Jamf

Discover Jamf Remote Assist, a game-changing feature in Jamf Pro that allows admins to launch secure remote desktop sessions effortlessly

Security 116
article thumbnail

Weekly Update 371

Troy Hunt

So I wrapped up this week's live stream then promptly blew hours mucking around with Zigbee on Home Assistant. Is it worth it, as someone asked in the chat? Uh, yeah, kinda, mostly. But seriously, having a highly automated house is awesome and I suggest that most people watching these vids harbour the same basic instinct as I do to try and improve our lives through technology.

IT 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Implementing AI in insurance: Four strategies for overcoming common roadblocks 

CGI

While AI offers significant opportunity for innovation and transformation, successful implementation requires a meaningful commitment from leaders coupled with significant investment in strategic planning.

article thumbnail

What Lurks in the Dark: Taking Aim at Shadow AI

Dark Reading

Generative artificial intelligence tools have unleashed a new era of terror to CISOs still battling longstanding shadow IT security risks.

article thumbnail

New Amazon-Themed Phishing Campaign Targets Microsoft Live Outlook Users

KnowBe4

Several months ago, Netskope Threat Labs uncovered a surge in PDF phishing attachments infiltrating Microsoft Live Outlook. These attacks were part of a larger series of phishing campaigns aimed to trick unsuspecting users.

article thumbnail

Understand the True Cost of a UEM Before Making the Switch

Dark Reading

When investing in a unified endpoint management solution, prioritize the needs of your network and users ahead of brand names. This Tech Tip focuses on questions to ask.

91
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Invitation to tender: Anti-Racist Library Collections training for Wales NEW DEADLINE

CILIP

Invitation to Tender - Anti-Racist Library Collections training for Wales Content Developers needed for the Anti-Racist Library Collections project. Deadline for application is now 20th November 2023. CILIP is looking for academics or specialists in acquisitions and community engagement to develop three further modules for the project: Preliminary module on anti-racism (£4,500 including VAT) Stock Acquisitions and Collections (£9,500 including VAT) Community Engagement and Outreach (£9,500 inclu

article thumbnail

What the Bionic Acquisition Can Bring to CrowdStrike

Dark Reading

CrowdStrike is moving deeper into application security with its agreement to acquire Bionic, provider of ASPM technology that proactively scans software in production for vulnerabilities.

article thumbnail

Your KnowBe4 Fresh Content Updates from October 2023

KnowBe4

Check out the 27 new pieces of training content added in October, alongside the always fresh content update highlights, events and new features.

article thumbnail

UK Online Safety Act Becomes Law

Hunton Privacy

On October 26, 2023, the UK Online Safety Act (the “Act”) received Royal Assent, making it law in the UK. The Act seeks to protect children from online harm and imposes obligations on relevant organizations, including social media platforms, to prevent and remove illegal and harmful content. In a press release , the UK Government stated that the Act “takes a zero-tolerance approach to protecting children from online harm, while empowering adults with more choices over what they see online.

Risk 81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

[Live Demo] Customizing Your Compliance Training to Increase Effectiveness

KnowBe4

Linking compliance training to specific outcomes is hard. Compliance training has a reputation for being challenging for organizations to offer, difficult to do right and employees are not engaged.

article thumbnail

10 Tips for Security Awareness Training That Hits the Target

Dark Reading

Try these tricks for devising an education program that gets employees invested — and stays with them after the training is over.

article thumbnail

U.S. SEC Division of Exams Announces 2024 Examination Priorities

Data Matters

On October 16, 2023, the U.S. Securities and Exchange Commission (SEC) Division of Examinations (EXAMS or Division) issued its annual examination priorities, which, for the first time, was published at the start of the SEC’s fiscal year to “better inform investors and registrants of key risks, trends, and examination topics” the Division intends to focus on in the coming year. 1 The post U.S.

Privacy 88
article thumbnail

Canadian Privacy Regulators Issue Guidance on Best Interests of Young People

Hunton Privacy

On October 17, 2023, the Office of the Privacy Commissioner of Canada (“OPC”) announced the release of two companion documents that provide further guidance on protecting the privacy of young people. This guidance follows the recently adopted resolution on young people’s privacy by federal, provincial, and territorial regulators earlier in the month.

Privacy 72
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Securing Cloud Identities to Protect Assets and Minimize Risk

Dark Reading

Preventative security should be driven by data and risk assessment, not compliance.

Risk 84
article thumbnail

HHS Office for Civil Rights Issues Resources for Health Care Providers and Patients to Help Educate Patients about Telehealth and the Privacy and Security of Protected Health Information via OCR

IG Guru

U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights _ October 18, 2023 HHS Office for Civil Rights Issues Resources for Health Care Providers and Patients to Help Educate Patients about Telehealth and the Privacy and Security of Protected Health Information Today, the Office for Civil Rights (OCR) at the U.S. Department of […] The post HHS Office for Civil Rights Issues Resources for Health Care Providers and Patients to Help Educate Patients about Telehealth and the Priva

article thumbnail

IS THE MARKET FOR FADGI-COMPLIANT SCANNERS POISED FOR SUBSTANTIAL  GROWTH?

Info Source

In 2019, the U.S. Federal Government’s National Archives and Records Administration (NARA) issued M-19-21, a Memorandum calling for the digitization of government records. One of its mandates stated that all permanent records held by Federal agencies needed to be converted to electronic files with appropriate metadata for eventual transfer to NARA. This could involve some 50 billion documents.