Thu.Dec 21, 2023

article thumbnail

Breach Roundup: MongoDB Blames Phishing Email for Breach

Data Breach Today

Also: Hackers Scrooge The North Face Holiday Shipments This week, MongoDB blamed a phishing email for causing unauthorized access to its corporate environment, hackers interrupted VF Corp. holiday shipping, Britain electrical grid operator National Grid dropped a Chinese supplier, German authorities shut down an online criminal bazaar, and more.

Phishing 310
article thumbnail

The Future of Collaboration Is Today

AIIM

As organizations have settled into the business of the business, one thing seems clear: the new workplace is much different than the one we were used to. Remote work and virtual teams are now a prevalent way of working, with on-site employees often the exception rather than the rule. Now that work-from-home has proven to be a viable alternative, C-Suite executives and business owners are less likely to invest in the resources, infrastructure, and space needed for all of their workers to return t

150
150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cryptohack Roundup: Ledger to Reimburse Hack Victims

Data Breach Today

Also: $3M NFT Trader Theft; Binance's CTFC Settlement This week, Ledger looked to reimburse hack victims, NFT Trader suffered a $3 million theft, the U.S. DOJ announced the first criminal case involving a DeFi smart contract, a court approved Binance's settlement with the U.S. CFTC and a Nigerian court sentenced a pig -butchering scammer.

284
284
article thumbnail

Real estate agency exposes details of 690k customers

Security Affairs

An exposed instance contained information for a customer relationship management (CRM) system that likely belongs to Goyzer, a real estate property management software maker, the Cybernews research team has discovered. The data was leaked via a publicly exposed and passwordless MongoDB database, which has since been closed. Businesses employ MongoDB to organize and store large swaths of document-oriented information.

Archiving 114
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cisco Announces Isovalent Acquisition to Boost Security

Data Breach Today

Cisco Continues Investments in New Cloud Security Offerings With Isovalent Deal Cisco announced plans to acquire another cloud security startup as part of a series of recent acquisitions and investments in the company’s multi-cloud networking capabilities and security offerings, including the major $28 billion acquisition of Splunk.

Security 278

More Trending

article thumbnail

NIST Report Spotlights Cyber, Privacy Risks in Genomic Data

Data Breach Today

A Multitude of Considerations for Entities As Use of Genomic Data Advances The explosion in applications using genomic data - from drug and vaccine development and consumer ancestry testing to law enforcement work - is heightening the need to carefully address critical privacy and security concerns around this sensitive data, government authorities say in a new report.

Privacy 271
article thumbnail

Phishing attacks use an old Microsoft Office flaw to spread Agent Tesla malware

Security Affairs

Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882, to spread the Agent Tesla malware. Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882 (CVSS score: 7.8), as part of phishing campaigns to spread the Agent Tesla malware. Agent Tesla is a spyware that is used to spy on the victims by collecting keystrokes, system clipboard, screenshots, and credentials from the infected system.

Phishing 103
article thumbnail

Senate Confirms Biden's Pick to Lead NSA and CYBERCOM

Data Breach Today

Senate Approves Pentagon Nominees After Republican Lawmaker Drops 10-Month Blockade Air Force Lt. Gen. Timothy Haugh has been confirmed as the next head of the NSA and U.S. Cyber Command after Sen. Tommy Tuberville, R-Ala., ended a 10-month protest over a Pentagon policy allowing service members to seek travel reimbursement and paid time off when in need of an abortion.

271
271
article thumbnail

ESET fixed a high-severity bug in the Secure Traffic Scanning Feature of several products

Security Affairs

ESET fixes a high-severity flaw in Secure Traffic Scanning Feature that could have been exploited to cause web browsers to trust sites that should not be trusted. ESET has addressed a vulnerability (CVE-2023-5594, CVSS score 7.5) in the Secure Traffic Scanning Feature, preventing potential exploitation that could lead web browsers to trust websites using certificates signed with outdated and insecure algorithms.

Security 102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google Flags 8th Chrome Zero-Day of the Year

Data Breach Today

Exploit for WebRTC Exists in the Wild Google rolled out security updates Wednesday for its Chrome web browser to fix a critical vulnerability exploited in the wild. The zero-day vulnerability is a heap-based buffer overflow bug in the WebRTC framework that allows real-time communication between different browsers and devices.

article thumbnail

Cancer Center Patients Become Attempted Victims of Data Extortion

KnowBe4

Cybercriminals of the lowest kind breached as many as 800,000 patients and then sent emails threatening to sell their data if they didn’t pay a fee to block it from selling.

IT 102
article thumbnail

Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists

Schneier on Security

The Solntsepek group has taken credit for the attack. They’re linked to the Russian military, so it’s unclear whether the attack was government directed or freelance. This is one of the most significant cyberattacks since Russia invaded in February 2022.

article thumbnail

Underground Cyber Crime Marketplaces are Now Showing Up on the Open Web

KnowBe4

Marketplaces such as OLVX are shifting from the dark web to the open web to take advantage of traditional web services to assist in marketing to and providing access to new customers.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2023 Retrospective: One year at CILIP & 125 years of Chartership

CILIP

2023 Retrospective: One year at CILIP & 125 years of Chartership 125 years since we received our Royal Charter from Queen Victoria, 2023 has been a year of advocacy, action, and new beginnings for CILIP. To celebrate this century and a quarter of Royal Chartership, we created the CILIP 125, a group of 125 cross-sector librarians and info-pros who have shown outstanding work and talent in our field, that were announced CILIP’s leadership-focussed conference in July.

article thumbnail

Interest in AI-Generated ‘Undressing’ Increases 2000% as it Becomes a Mainstream Online Business

KnowBe4

The advent of non-consensual intimate imagery (NCII) as a monetized business on the Internet has shifted pornography into the realm of undressing anyone you like.

IT 99
article thumbnail

Mastering Data Management and Collaboration in Legal Tech - Insights from 2023

Hanzo Learning Center

The second part of our 2023 legal tech review series explores the intricate world of data management and collaboration within the legal sector. As the legal industry navigates through the digital transformation, challenges arise in effectively managing and analyzing the ever-growing volumes of collaboration data. This segment delves into how these complexities are being addressed and the role of AI in streamlining data management processes, particularly in the context of pre-litigation scenarios

article thumbnail

Missing the Lock Icon in Chrome’s Address Bar? It’s a Move to Make You More Secure

KnowBe4

In response to what Google calls “over trust” in the web address lock icon to indicate that a site is authentic and its’ communications are secure, they’ve swapped the lock out in an attempt to engage Chrome users in thinking about their own secure browsing.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FinOps and GreenOps drive efficient and green spending 

OpenText Information Management

Cloud operations are an essential part of everyday business for most companies today. And for some organizations, it can be a significant portion of the budget, which means that without proper oversight or discipline, waste and inefficiencies can cost them a lot of money. It can also result in environmentally inefficient IT operations. OpenText … The post FinOps and GreenOps drive efficient and green spending appeared first on OpenText Blogs.

Cloud 62
article thumbnail

Grading my 2023 Predictions: The Batting Average Dips

John Battelle's Searchblog

Well that was one hell of a year. As I do each December, it’s time to grade my own homework. And the past twelve months certainly started out well. But unless a certain fascistic presidential candidate has a change of heart in the next few days (he won’t), I’m afraid I didn’t break.500 this year (last year I was smokin’ hot , I must say).

article thumbnail

Artificial Intelligence: An Opportunity to Augment How Companies Manage Knowledge

Information Matters

A new study published in Business Horizons explores how emerging artificial intelligence (AI) capabilities can enhance knowledge management within enterprises. It articulates AI’s potential role across fundamental dimensions including creating, Read more The post Artificial Intelligence: An Opportunity to Augment How Companies Manage Knowledge appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Analysing Data Breaches Caused by Human Error

IT Governance

A deep dive into the ICO’s numbers We often hear the terms ‘accidental breach’ and ‘internal threat’, but how common are these phenomena? To find out, we looked at the ICO’s (Information Commissioner’s Office) public data set , specifically looking into four data breach types caused by human error: Data emailed to incorrect recipient. Data posted or faxed to incorrect recipient.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

POST-HOLIDAY NETWORKING AND CHARITY EVENT via ARMA New England

IG Guru

Register Here The post POST-HOLIDAY NETWORKING AND CHARITY EVENT via ARMA New England first appeared on IG GURU.

86
article thumbnail

Jamf to archive NoMAD open-source projects

Jamf

By the end of December 2023, multiple NoMAD projects will become read-only and will no longer be maintained.

article thumbnail

Reshoring manufacturing to the US: The role of AI, automation and digital labor

IBM Big Data Hub

Reshoring manufacturing to the US ­ has been a significant trend in recent years, driven by geopolitical tensions, supply chain disruptions, proximity to customers and markets, eco-system synergies and the need for positive impact on the domestic economy. However, reshoring presents several challenges—mainly workforce, technical and economic issues.