Sat.Jul 01, 2023 - Fri.Jul 07, 2023

article thumbnail

Why Has Digital Transformation Stalled?

AIIM

Research Indicates Digital Transformation Has Stalled After we received the survey responses for the AIIM 2023 State of the Intelligent Information Management Industry Report , I spoke to the report’s authors, Dave Jones and Theresa Resek, about a concerning statistic. Enterprise digital transformation (DT) efforts have stalled. Dave later wrote in the report “ over 65% of organizations have achieved significant successes with DT, but that still leaves at least a third who have not.

article thumbnail

Ransomware Continues to Plague European Healthcare Sector

Data Breach Today

Hacktivist-Led DDoS Attacks Also on the Rise, ENISA Says Ransomware continues to be the biggest threat to the European healthcare sector, but the region also is experiencing an uptick in distributed denial-of-service attacks tied to hacktivist groups, the European Union Agency for Cybersecurity warned.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threads: We Don’t Want to “Hang Out With Everybody.” Sometimes, We Want To Leave.

John Battelle's Searchblog

(AP Photo/Richard Drew) Apparently the open web has finally died. This the very same week Meta launches Threads , which, if its first day is any indication, seems to be thriving (10 million sign ups in its first few hours, likely 50 million by the time this publishes…). But before Threads’ apparent success, most writers covering tech had decided that the era of free, open-to-the-public, at scale services like Twitter, Reddit, and even Facebook/Insta is over.

IT 141
article thumbnail

Microsoft Teams Exploit Tool Auto-Delivers Malware

Dark Reading

The "TeamsPhisher" cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.

145
145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Admin SSO now available for Jamf Account

Jamf

Learn how to seamlessly set up an identity provider (IdP) in your Jamf Account with our step-by-step guide, and take advantage of single sign-on authentication at the admin level.

More Trending

article thumbnail

Self-Driving Cars Are Surveillance Cameras on Wheels

Schneier on Security

Police are already using self-driving car footage as video evidence: While security cameras are commonplace in American cities, self-driving cars represent a new level of access for law enforcement ­ and a new method for encroachment on privacy, advocates say. Crisscrossing the city on their routes, self-driving cars capture a wider swath of footage.

Privacy 122
article thumbnail

U.S. Announces Fulfillment of EU-U.S. Data Privacy Framework Requirements

Hunton Privacy

On July 3, 2023, U.S. Secretary of Commerce Gina Raimondo issued a statement confirming that the U.S. has fulfilled its commitments for implementing the EU-U.S. Data Privacy Framework (the “Framework”). In the statement, it was confirmed that the EU, Iceland, Liechtenstein and Norway, have been designated as “qualifying states” for purposes of implementing the redress mechanism established under Executive Order 14086, such designation to be become effective upon the adoption of an adequacy decis

article thumbnail

Google Searches for 'USPS Package Tracking' Lead to Banking Theft

Dark Reading

Attackers are leveraging well-executed brand impersonation in a Google ads malvertising effort that collects both credit card and bank details from victims.

127
127
article thumbnail

Banking Tech Forecast: Cloudy, With a Chance of Cyber Risk

Data Breach Today

Cloud Adoption in Financial Services has Soared - as Has Security Risk Financial services organizations face unique cloud security challenges, due to special regulatory, data security and privacy considerations that don't necessarily apply to other industries. Security and payments experts with overlapping skillsets unpack the challenges and how to deal with them.

Risk 265
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Report Shows Social Engineering and Business Email Compromise Attacks Have Drastically Increased in 2023

KnowBe4

Email-based social engineering attacks have risen by 464% this year compared to the first half of 2022, according to a report by Acronis. Business email compromise (BEC) attacks have also increased significantly.

98
article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

On June 28, 2023, the New York Department of Financial Services (“NYDFS”) published an updated proposed Second Amendment (“Amendment”) to its Cybersecurity Regulation, 23 NYCRR Part 500. On November 9, 2022, NYDFS published a first draft of the proposed Amendment and received comments from stakeholders over a 60-day period. The updated proposed Amendment will be subject to an additional 45-day comment period.

article thumbnail

Shell Becomes Latest Cl0p MOVEit Victim

Dark Reading

In another MOVEit attack, oil and gas giant Shell saw the release of the private information of its employees.

IT 134
article thumbnail

Midyear Health Data Breach Analysis: The Top Culprits

Data Breach Today

Latest Hacking, Vendor Incident Trends Emerging From the Federal Tally Hacking incidents, including those involving ransomware attacks or vendors, that affect tens of millions of individuals, continue to account for the majority of health data breaches reported to federal regulators so far this year. What are the other emerging breach trends?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bangladesh government website leaked data of millions of citizens

Security Affairs

A researcher recently discovered that a Bangladesh government website leaks the personal data of citizens. The researcher Viktor Markopoulos discovered a Bangladeshi government website that was leaking the personal information of millions of Bangladesh citizens. According to TechCrunch, which first reported the news, the leaked data included full names, phone numbers, email addresses, and national ID numbers.

article thumbnail

UK ICO Encourages Use of Privacy Enhancing Technologies

Hunton Privacy

On June 19, 2023, the UK Information Commissioner’s Office (“ICO”) recommended that organizations start using privacy enhancing technologies (“PETs”) to share personal information safely, securely and anonymously. The ICO also has issued new guidance on PETs which is aimed at those using large data sets in finance, healthcare, money laundering and cybercrime.

Privacy 107
article thumbnail

Microsoft Can Fix Ransomware Tomorrow

Dark Reading

You can't encrypt a file you can't open — Microsoft could dramatically impact ransomware by slowing it down.

article thumbnail

Russian Ransomware Group Shuts Down Major Japanese Port

Data Breach Today

Reported LockBit 3.0 Attack Locks Up Systems, Delays Shipping of Toyota Auto Parts Ransomware believed to originate from the Russian LockBit 3.0 group has locked up computer systems for the Port of Nagoya, Japan's largest cargo hub. The attack held up shipments of Toyota auto parts containers starting Tuesday, but port authorities expect to resume operations Thursday morning.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Catches of the Month: Phishing Scams for July 2023

IT Governance

Welcome to our July 2023 catches of the month feature, in which we explore the latest phishing scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at the increase in a new form of phishing that uses QR codes, plus we discuss the latest the staggering findings of PhishLabs’ latest report.

article thumbnail

Avast released a free decryptor for the Windows version of the Akira ransomware

Security Affairs

Avast released a free decryptor for the Akira ransomware that can allow victims to recover their data without paying the ransom. Cybersecurity firm Avast released a free decryptor for the Akira ransomware that can allow victims to recover their data without paying the ransom. The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple organizations in multiple industries, including education, finance, and real estate, Akira is

article thumbnail

Researchers Develop Exploit Code for Critical Fortinet VPN Bug

Dark Reading

Some 340,000 FortiGate SSL VPN appliances remain exposed to the threat more than three weeks after Fortinet released firmware updates to address the issue.

109
109
article thumbnail

Cloudy, With a Chance of Cyber Risk

Data Breach Today

Cloud Adoption in Financial Services has Soared - as Has Security Risk Financial services organizations face unique cloud security challenges, due to special regulatory, data security and privacy considerations that don't necessarily apply to other industries. Security and payments experts with overlapping skillsets unpack the challenges and how to deal with them.

Risk 240
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

List of Data Breaches and Cyber Attacks – June 2023

IT Governance

IT Governance found 79 publicly disclosed security incidents in June 2023, accounting for 14,353,113 breached records. You can find the full list below, divided into four categories: cyber attacks, ransomware, data breaches, and malicious insiders and miscellaneous incidents. Also be sure to check out our new page, which provides a complete list of data breaches and cyber attacks for 2023.

article thumbnail

Cisco warns of a flaw in Nexus 9000 series switches that allows modifying encrypted traffic

Security Affairs

Cisco warns of a high-severity vulnerability in Nexus 9000 series switches that can allow attackers to read or modify encrypted traffic. Cisco disclosed a high-severity vulnerability, tracked as CVE-2023-20185 (CVSS Score 7.4), in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode. An unauthenticated, remote attacker can exploit the flaw to read or modify encrypted traffic. “This vulnerability is due to an issue with the implementati

article thumbnail

Russian Satellite Internet Downed via Attackers Claiming Ties to Wagner Group

Dark Reading

Attribution for the cyberattack on Dozor-Teleport remains murky, but the effects are real — downed communications and compromised data.

article thumbnail

Breach Roundup: Iranian Group Targets Nuclear Experts

Data Breach Today

Also: MOVEit Victims Confirm Attack, Ukrainian Government FB Page Hacked This week, Charming Kitten targeted nuclear experts; over 130,000 solar energy monitoring systems are exposed; organizations confirmed a breach due to the MOVEit zero-day; Russian hackers took over a Ukrainian government agency's Facebook page; and a WordPress plug-in gave admin privileges to users.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The AI Dividend

Schneier on Security

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent Fund, funded by the state’s oil revenues and paid to every Alaskan each year. We’re now in a different sort of resource rush, with companies peddling bits instead of oil: generative AI.

IT 95
article thumbnail

StackRot, a new Linux Kernel privilege escalation vulnerability

Security Affairs

StackRot is s new security vulnerability in the Linux kernel that could be exploited to gain elevated privileges on a target system. A security vulnerability, dubbed StackRot was found impacting Linux versions 6.1 through 6.4. The issue, tracked as CVE-2023-3269 , (CVSS score: 7.8), is a privilege escalation issue that resides in the memory management subsystem.

article thumbnail

Spyware Gamed 1.5M Users of Google Play Store

Dark Reading

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find.

103
103