Fri.May 12, 2023

article thumbnail

Toyota Exposed Auto Location of 2M Japanese Customers

Data Breach Today

Undetected Cloud Misconfiguration Exposed Vehicle Information for Over Ten Years Toyota on Friday disclosed that it exposed online for a decade car location data belonging to more than two million Japanese customers. The data by itself cannot be used to identify individual car owners, the carmaker said. Also exposed: video taken outside the vehicle with an onboard recorder.

Cloud 283
article thumbnail

New York Attorney General Proposes Crypto Regulation, Protection, Transparency, and Oversight (CRPTO) Act

Hunton Privacy

On May 5, 2023, New York Attorney General Letitia James released proposed legislation that seeks to regulate all facets of the cryptocurrency industry. Entitled the “Crypto Regulation, Protection, Transparency, and Oversight (CRPTO) Act,” if enacted the bill would substantially expand New York’s oversight of crypto enterprises conducting business in the Empire State, including as to matters involving privacy and cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Enigmatic Hacking Group Operating in Ukraine

Data Breach Today

Attackers Target both Ukraine and pro-Russian Actors A newly uncovered hacking group with a string of cyberespionage successes is targeting Ukrainian and pro-Russian targets alike. Malwarebytes in a Wednesday dubs the threat actor "Red Stinger," saying the group is the same as the "Bad Magic" threat actor revealed by Kaspersky in March.

189
189
article thumbnail

Biden-Harris Administration Announces New Actions to Promote Responsible Artificial Intelligence Innovation

Hunton Privacy

On May 4, 2023, the Biden-Harris Administration announced new actions to promote responsible American innovation in artificial intelligence (“AI”). The Administration also met with the CEOs of Alphabet, Anthropic, Microsoft and OpenAI as part of the Administration’s broader, ongoing effort to engage with advocates, companies, researchers, civil right organizations, not-for-profit organizations, communities, international partners, and others on critical AI issues.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Editors' Panel: How Feds Hacked Russia's 'Snake' Operation

Data Breach Today

Also: APAC Privacy Law Trends; Another Company Bans ChatGPT In the latest weekly update, ISMG editors discuss how the Feds have dismembered Russia's 'Snake' cyberespionage operation; the ongoing debate over privacy laws and regulations in the APAC region; and why more companies are banning the use of generative AI tool ChatGPT.

Privacy 162

More Trending

article thumbnail

Building True Cyber Resilience in 2023

Data Breach Today

CISO Amit Basu Shares Practical Steps to Test Cyber Resilience Cyber resilience is "even more critical in the post pandemic world," said Amit Basu, CISO of International Seaways. The NIST framework is a useful tool for developing, testing and maintaining cyber resilience, but too often security teams neglect the "detect" and "respond" functions, he added.

Security 147
article thumbnail

Ted Chiang on the Risks of AI

Schneier on Security

Ted Chiang has an excellent essay in the New Yorker : “Will A.I. Become the New McKinsey?” The question we should be asking is: as A.I. becomes more powerful and flexible, is there any way to keep it from being another version of McKinsey? The question is worth considering across different meanings of the term “A.I.” If you think of A.I. as a broad set of technologies being marketed to companies to help them cut their costs, the question becomes: how do we keep those technologies fro

Risk 96
article thumbnail

Closing Privacy 'Loopholes' in Reproductive Healthcare Data

Data Breach Today

A recently proposed federal rule would prohibit healthcare organizations from disclosing to law enforcement patient information related to obtaining or providing an abortion. If enacted, it will address longstanding loopholes in healthcare privacy, said attorney Kathleen McGee.

Privacy 147
article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

eSecurity Planet may receive a commission from vendor links. Our recommendations are independent of any commissions, and we only recommend solutions we have personally used or researched and meet our standards for inclusion. How to use this template: Comments intended to guide understanding and use of this template will be enclosed in brackets “[…]” and the ‘company’ will be listed as [eSecurity Planet] throughout the document.

Risk 95
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crosspoint Capital to Purchase Absolute Software for $657M

Data Breach Today

Crosspoint's $11.50-Per-Share Bid Comes 31 Months After Endpoint Vendor Went Public Crosspoint Capital Partners has joined Thoma Bravo and others in the take-private cybersecurity spree, agreeing to buy endpoint security vendor Absolute Software for $657 million. The deal will allow Absolute Software to expand from asset visibility and control to endpoint resilience and access.

article thumbnail

Leaked source code of Babuk ransomware used by 10 different ransomware families targeting VMware ESXi

Security Affairs

The leak of the source code of the Babuk ransomware allowed 9 ransomware gangs to create their own ransomware targeting VMware ESXi systems. SentinelLabs researchers have identified 10 ransomware families using VMware ESXi lockers based on the source code of the Babuk ransomware that was leaked in 2021. The experts pointed out that these ransomware families were detected through H2 2022 and H1 2023, a circumstance that suggests that an increasing number of threat actors is using the source code

article thumbnail

Safeguarding Cyberspace: Unleashing Mainframe's Fortified Digital Trust through Advanced Authentication

Data Breach Today

Broadcom's Mary Ann Furno on Authentication Changes, How Orgs Adapt to Challenges Network boundaries have dissipated while changes in regulation and customer approaches to trust now require more advanced authentication and the ability to treat each authentication in relation to its specific risk level. Broadcom's Mary Ann Furno discusses these issues.

article thumbnail

What the Email Security Landscape Looks Like in 2023

Security Affairs

Email-based threats have become increasingly sophisticated, how is changing the Email Security Landscape? For over a decade, email has been a common source of cybersecurity threats. During that time, email-based threats have become increasingly sophisticated. What started as notes from Nigerian princes that needed large sums of money to help them get home has evolved into bad actors that use refined social engineering tactics to convince the receiver to unknowingly share important information.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Malicious Chatbots Target Casinos in Southeast Asia

Dark Reading

Dubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies.

108
108
article thumbnail

The Black Basta ransomware gang hit multinational company ABB

Security Affairs

Swiss electrification and automation technology giant ABB suffered a Black Basta ransomware attack that impacted its business operations. Swiss multinational company ABB, a leading electrification and automation technology provider, it the last victim of the notorious Black Basta ransomware group. The company has more than 105,000 employees and has $29.4 billion in revenue for 2022.

article thumbnail

WordPress Plugin Used in 1M+ Websites Patched to Close Critical Bug

Dark Reading

The privilege escalation flaw is one in thousands that researchers have disclosed in recent years.

110
110
article thumbnail

Bl00dy Ransomware Gang actively targets the education sector exploiting PaperCut RCE

Security Affairs

U.S. CISA and FBI warned of attacks conducted by the Bl00dy Ransomware Gang against the education sector in the country. The FBI and CISA issued a joint advisory warning that the Bl00dy Ransomware group is actively targeting the education sector by exploiting the PaperCut remote-code execution vulnerability CVE-2023-27350. The Bl00dy ransomware has been active since May 2022, it has been the first group that started using the leaked LockBit ransomware builder in attacks in the wild.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How Cybercriminals Adapted to Microsoft Blocking Macros by Default

Dark Reading

One long-awaited security move caused a ripple effect in the cybercrime ecosystem.

Security 116
article thumbnail

IBM and Microsoft partnership accelerates sustainable cloud modernization

IBM Big Data Hub

A global fast-moving consumer goods (FMCG) enterprise needed to modernize its product portfolio, focusing on high-growth categories like pet care, coffee and consumer health. Its aggressive sustainability goals included achieving net zero emissions by 2050, making all packaging reusable or recyclable by 2025 and investing more than USD 3 billion globally over several years to drive momentum.

Cloud 77
article thumbnail

AI Is About to Be Everywhere: Where Will Regulators Be?

Dark Reading

Regulators should apply a healthy skepticism to generative AI developments to guarantee a competitive marketplace.

99
article thumbnail

What does “Trusted Access for the physical workplace” mean?

Jamf

Jamf support for digital employee badges is now available via SwiftConnect, integrated with Jamf Trust, for iOS and coming soon for Android

Access 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Making Sure Lost Data Stays Lost

Dark Reading

Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.

Cloud 86
article thumbnail

The Value of Subcontracting with NAID AAA Certified Companies via i-SIGMA

IG Guru

Check out the article here.

70
article thumbnail

New Competition Focuses on Hardening Cryptosystems

Dark Reading

The Technology Innovation Institute’s year-long cryptographic challenge invites participants to assess concrete hardness of McEliece public-key encryption scheme.

article thumbnail

API-driven data quality: Supercharging modern data pipelines for scalability and efficiency

Collibra

After speaking with over 20 clients about data quality in modern data pipelines, I am eager to share my insights on the pros and cons of internal (in-memory) processing versus external (API-based) DQ engine integration. Organizations are increasingly adopting diverse technologies to maintain data quality, making it difficult to choose the most effective strategy.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

'Very Noisy:' For the Black Hat NOC, It's All Malicious Traffic All the Time

Dark Reading

Black Hat Asia's NOC team gives a look inside what's really happening on the cyber front during these events.

IT 82
article thumbnail

Managing AWS S3 pricing and costs with IBM Turbonomic

IBM Big Data Hub

Amazon Simple Storage Service (Amazon S3) is an object storage service that provides organizations with scalability, security, availability and performance while keeping their IT infrastructure management needs at bay. It was launched in 2006 as the first AWS service and manages data as objects instead of a file hierarchy or blocks within sectors and tracks.

article thumbnail

An Analyst View of XM Cyber’s Acquisition of Confluera

Dark Reading

The deal will enhance the capabilities of both companies and provide customers with a more comprehensive way to protect their digital assets.

69