Wed.Nov 29, 2023

article thumbnail

Rhysida ransomware group hacked King Edward VII’s Hospital in London

Security Affairs

The Rhysida ransomware group claimed to have hacked King Edward VII’s Hospital in London. King Edward VII’s Hospital is a private hospital located on Beaumont Street in the Marylebone district of central London. It is a leading provider of acute and specialist medical care, with a focus on musculoskeletal health, urology, women’s health, and digestive health.

article thumbnail

OpenAI’s Custom Chatbots Are Leaking Their Secrets

WIRED Threat Level

Released earlier this month, OpenAI’s GPTs let anyone create custom chatbots. But some of the data they’re built on is easily exposed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thousands of secrets lurk in app images on Docker Hub

Security Affairs

Thousands of secrets have been left exposed on Docker Hub, a platform where web developers collaborate on their code for web applications. While some are harmless API keys, others could lead to unauthorized access, data breaches, or identity theft, the latest Cybernews research reveals. The Docker Hub store has at least 5,493 container images that contain secrets and could be considered as exposing sensitive information.

Analytics 340
article thumbnail

Okta: Breach Affected All Customer Support Users

Krebs on Security

When KrebsOnSecurity broke the news on Oct. 20, 2023 that identity and authentication giant Okta had suffered a breach in its customer support department, Okta said the intrusion allowed hackers to steal sensitive data from fewer than one percent of its 18,000+ customers. But today, Okta revised that impact statement, saying the attackers also stole the name and email address for nearly all of its customer support users.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Google addressed the sixth Chrome Zero-Day vulnerability in 2023

Security Affairs

Google released security updates to address a new actively exploited zero-day vulnerability, tracked as CVE-2023-6345, in the Chrome browser. Google on Wednesday released security updates to address a new actively exploited zero-day, tracked as CVE-2023-6345, in the Chrome browser. The CVE-2023-5217 is a high-severity integer overflow in Skia. Skia is an open-source 2D graphics library that provides common APIs that work across a variety of hardware and software platforms.

Libraries 336

More Trending

article thumbnail

Okta reveals additional attackers’ activities in October 2023 Breach

Security Affairs

Cloud identity and access management solutions provider Okta revealed additional threat actor activity linked to the October 2023 breach. Okta provided additional details about the October 2023 breach and revealed additional threat actor malicious activities. In October, the Cloud identity and access management solutions provider said that threat actors broke into its support case management system and stole authentication data, including cookies and session tokens, that can be abused in future

article thumbnail

Attackers Actively Target Critical ownCloud Vulnerability

Data Breach Today

Content Collaboration Platform Sent Updates and Alert Directly to Users Last Month Security researchers say attackers are actively attempting to exploit a critical vulnerability in unpatched ownCloud implementations, which they can use to steal credentials and other secret information. Last month, ownCloud said it had sent all users a security alert and updates to fix the flaws.

Security 279
article thumbnail

Okta Breach Impacted All Customer Support Users—Not 1 Percent

WIRED Threat Level

Okta upped its original estimate of customer support users affected by a recent breach from 1 percent to 100 percent, citing a “discrepancy.

IT 212
article thumbnail

Okta Says Hacker Stole Every Customer Support User's Details

Data Breach Today

Beware Phishing and Social Engineering Attacks Targeting Passwords, Vendor Warns Identity and authentication giant Okta said the attacker behind its September data breach stole usernames and contact details for all users of its primary customer support system, and warned customers to beware potential follow-on phishing and social engineering attacks.

Phishing 277
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Public AI: Bad. Internal AI: Good. With Information Governance: Great!

Weissman's World

We’ve talked a lot about the perils of using generative AI, which while improving is still prone to making stuff up and exposes our data to privacy problems if used as engine fodder. But I don’t know that I’ve properly distinguished between the “bad” public technologies and the possible “good” of those installed internally –… Read More » Public AI: Bad.

article thumbnail

Demystifying Vulnerability Management: Cutting Through the Noise

Data Breach Today

Vulnerability Management is a well-known cybersecurity essential. However the lines have blurred over the years regarding which vital practices fall under the VM classification.

article thumbnail

Breaking Laptop Fingerprint Sensors

Schneier on Security

They’re not that good : Security researchers Jesse D’Aguanno and Timo Teräs write that, with varying degrees of reverse-engineering and using some external hardware, they were able to fool the Goodix fingerprint sensor in a Dell Inspiron 15, the Synaptic sensor in a Lenovo ThinkPad T14, and the ELAN sensor in one of Microsoft’s own Surface Pro Type Covers.

Security 135
article thumbnail

US House Members Eye Potential Regulations in Healthcare AI

Data Breach Today

Industry Experts Share Concerns Over Misuse, Privacy and Security With Committee As Congress weighs potential legislative and regulatory guardrails for the use of AI in healthcare, issues such as human oversight, privacy and security risk need close attention, said healthcare industry experts who testified during a House Energy and Commerce subcommittee hearing on Wednesday.

Privacy 275
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

No One Knows How Online Pharmacy Company was Hit with a Data Breach Impacting 2.3 Million Customers

KnowBe4

This is a cautionary tale of both how your data can legally end up in the hands of an organization you never intended and how victims can be largely left in the dark post-breach.

article thumbnail

US Sanctions, Seizes Sinbad Cryptomixer

Data Breach Today

Sinbad Was the 'Preferred Mixing Service' of North Korean Hackers The U.S. federal government Wednesday added cryptocurrency mixer Sinbad.io to a growing blacklist of virtual asset platforms under sanctions that prevent Americans from doing business with them. The FBI seized the Sinbad website in an international operation.

article thumbnail

QR Code Phishing Campaigns on the Rise

KnowBe4

There’s been a “precipitous rise” in QR code phishing (quishing) campaigns in 2023, according to Matthew Tyson at CSO.

Phishing 124
article thumbnail

Experts Urge Congress to Establish Clear SBOM Guidance

Data Breach Today

Federal Agencies Lack Comprehensive Guidelines For Developing SBOMs, Experts Say Procurement experts testified to the House subcommittee on cybersecurity, information technology and government innovation Wednesday that government requirements leave too many unanswered questions and ambiguities for federal agencies when it comes to implementing SBOMs.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

Stopping Cloud Workload Attacks

Data Breach Today

In this episode of "Cybersecurity Insights," Eyal Fisher discussed Sweet Security's Cloud Runtime Security Suite, which helps CISOS and security teams defend against all stages of a cyberattack by gathering data, generating insights, baselining the normal environment and looking for deviations.

Cloud 268
article thumbnail

NHS England faces lawsuit over patient privacy fears linked to new data platform

The Guardian Data Protection

Four groups claim no legal basis exists for setting up the Federated Data Platform which facilitates information sharing The NHS has been accused of “breaking the law” by creating a massive data platform that will share information about patients. Four organisations are bringing a lawsuit against NHS England claiming that there is no legal basis for its setting up of the Federated Data Platform (FDP).

Privacy 111
article thumbnail

BlueVoyant Raises $140M, Buys Resilience Firm Conquest Cyber

Data Breach Today

Deal Will Expand BlueVoyant's Footprint in US Government, Defense Industrial Base BlueVoyant purchased a risk management vendor led by an Army veteran to expand its SaaS footprint with U.S. government and defense industrial organizations. Buying Conquest Cyber will allow BlueVoyant to provide cyber risk maturity and compliance assessments to both federal and commercial customers.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

I tested Doritos Silent and the AI-powered app did indeed cancel all my crunches

Collaboration 2.0

While Doritos' snack-silencing app is intended for gamers, it works with any program that needs a microphone, including Zoom and Google Voice.

IT 100
article thumbnail

News alert: Kiteworks forecast lays out risk predictions, strategies for sensitive content in 2024

The Last Watchdog

San Mateo, Calif., November 29, 2023 – Kiteworks , which delivers data privacy and compliance for sensitive content communications through its Private Content Network (PCN), released today its Sensitive Content Communications 2024 Forecast Report. The report outlines 12 predictions and strategies to help IT, security, risk management, and compliance leaders tackle data privacy and cyber-risk challenges for the coming year.

Risk 100
article thumbnail

Best practices for hybrid cloud banking applications secure and compliant deployment across IBM Cloud and Satellite

IBM Big Data Hub

Financial Services clients are increasingly looking to modernize their applications. This includes modernization of code development and maintenance (helping with scarce skills and allowing innovation and new technologies required by end users) as well as improvement of deployment and operations, using agile techniques and DevSecOps. As part of their modernization journey, clients want to have flexibility to determine what is the best “fit for purpose” deployment location for their a

Cloud 89
article thumbnail

FIDO, Biometry and Contactless: Enhancing End User Adoption of Phishing-Resistant MFA

Thales Cloud Protection & Licensing

FIDO, Biometry and Contactless: Enhancing End User Adoption of Phishing-Resistant MFA madhav Thu, 11/30/2023 - 04:52 The surge in social engineering and phishing attacks seeking to bypass established multi-factor authentication (MFA) methods indicates that organizations must move to phishing-resistant MFA. In their report “ Avoid the Top 9 Pitfalls of Implementing MFA ,” Gartner makes several recommendations for careful consideration by security professionals responsible for the successful deplo

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Real-time artificial intelligence and event processing  

IBM Big Data Hub

By leveraging AI for real-time event processing, businesses can connect the dots between disparate events to detect and respond to new trends, threats and opportunities. In 2023, the IBM® Institute for Business Value (IBV) surveyed 2,500 global executives and found that best-in-class companies are reaping a 13% ROI from their AI projects—more than twice the average ROI of 5.9%.

article thumbnail

Partnership to Campaign: Green Libraries is growing

CILIP

Partnership to Campaign: Green Libraries is growing Global leaders, thinkers, and activists from industry and politics will gather this weekend in Dubai for the first day of COP28 to rethink, reboot, and refocus the climate agenda. Meanwhile libraries across the UK and beyond have been working hard to bring climate action and awareness to their communities as part of the Green Libraries Partnership.

article thumbnail

Australian privacy watchdog refuses to investigate employer that allegedly accessed worker’s personal emails

The Guardian Data Protection

Legal expert says court ruling in case where information accessed on work laptop at Mecrus confirms ‘Australians still don’t have a right to privacy’ Follow our Australia news live blog for latest updates Get our morning and afternoon news emails , free app or daily news podcast The Australian information commissioner refused to investigate an employer that allegedly accessed an employee’s personal emails, on the grounds the information was accessed on the employee’s work laptop.

Access 82