Fri.Mar 10, 2023

article thumbnail

ISMG Editors: Assessing the New US Cybersecurity Strategy

Data Breach Today

Also: Panel Discusses Vendor Liability, Ransomware and the Rise of Check Fraud In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues, including how the new U.S. cybersecurity strategy doubles down on hitting ransomware, how the strategy shifts liability issues to vendors, and why check fraud is on the rise and what can be done about it.

article thumbnail

Utah Legislature Passes Bills Restricting Social Media Accounts for Minors

Hunton Privacy

On March 1-3, 2023, the Utah legislature passed a series of bills, SB 152 and HB 311, regarding social media usage for minors. For social media companies with more than five million users worldwide, SB 152 would require parental permission for social media accounts for users under age 18, while HB 311 would hold social media companies liable for harm minors experience on the platforms.

Risk 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Central Bank to Hold Cyber Stress Tests for Banks

Data Breach Today

Financial Regulator Will Gauge Banks' Ability to Withstand Cyberattacks The European Central Bank will conduct cyber stress tests to determine banks' resilience against cyberattacks. The tests, which will receive a "significant amount of time and resources," are set to be completed by mid-2024, said Andrea Enria, ECB's top official for oversight.

130
130
article thumbnail

Latest version of Xenomorph Android malware targets 400 banks

Security Affairs

A new version of the Xenomorph Android malware includes a new automated transfer system framework and targets 400 banks. The author of the Xenomorph Android malware, the Hadoken Security Group, continues to improve their malicious code. In February 2022, researchers from ThreatFabric first spotted the Xenomorph malware, which was distributed via the official Google Play Store reaching over 50,000 installations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Not-So-Cerebral Sharing of Mental Health Data Hits Millions

Data Breach Today

Website Tracking Tools in Use Since 2019 Exposed Online Mental Health Assessments A provider of online mental health services is notifying nearly 3.2 million people that the company used website tracking tools to share sensitive patient information with third parties including Facebook, Google and TikTok - without the individuals' consent.

130
130

More Trending

article thumbnail

SVB Collapse Is 'Self-Inflicted Gunshot Wound' for Startups

Data Breach Today

Silicon Valley Bank Crash Will Make Getting Loans, Credit Lines Harder for Startups One top venture capitalist says the sudden downfall of Silicon Valley Bank will make it harder for cybersecurity startups to get loans and credit lines. For decades, SVB was one of the few institutions willing to extend money to early-stage firms that got the cold shoulder from traditional banks.

article thumbnail

AT&T is notifying millions of customers of data breach after a third-party vendor hack

Security Affairs

AT&T is warning some of its customers that some of their information was exposed after the hack of a third-party vendor’s system. AT&T is notifying millions of customers that some of their information was exposed after a third-party vendor was hacked. CPNI is information related to the telecommunications services purchased by the customers, including the number of lines for each account or the wireless plan to which customers are subscribed. “We recently determined that an un

article thumbnail

ChatGPT Browser Extension Hijacks Facebook Business Accounts

Dark Reading

Between March 3 and March 9, at least 2,000 people a day downloaded the malicious "Quick access to ChatGPT" Chrome extension from the Google Play app store.

Access 97
article thumbnail

BlackMamba PoC Malware Uses AI to Avoid Detection

eSecurity Planet

HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms. The malware, dubbed “BlackMamba,” is the latest example of exploits that can evade even the most sophisticated cybersecurity products.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Law enforcement seized the website selling the NetWire RAT and arrested a Croatian man

Security Affairs

An international law enforcement operation seized the infrastructure associated with the NetWire RAT and resulted in the arrest of its administrator. A coordinated international law enforcement operation resulted in the seizure of the infrastructure associated with the NetWire RAT, the police also arrested its administrator. Busted! A coordinated #lawenforcement action has taken down the #Netwire Remote Access Trojan infrastructure.

Sales 85
article thumbnail

Weekly Update 338

Troy Hunt

I'm going lead this post with where I finished the video because it brought the biggest smile to Charlotte's and my faces this week: This. Is. Amazing 😍 pic.twitter.com/wOl4kpK841 — Troy Hunt (@troyhunt) March 3, 2023 When I talked about the McLaren in this week's video, Frits made the comment "the smile on your face says it all", which absolutely nailed it.

Cloud 82
article thumbnail

One-Quarter of Users Fall for Online Scams Despite an Overconfidence in an Ability to Spot Them

KnowBe4

A new survey of individuals across seven countries shows that users may have had luck on their side, as a majority aren’t sure about their device security or how to spot malicious sites online.

article thumbnail

Legal Industry Faces Double Jeopardy as a Favorite Cybercrime Target

Dark Reading

Hackers are increasingly tantalized by the troves of sensitive data held by lightly protected law firms and legal services organizations.

81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google: Analysis of Cyberattacks Targeting Ukraine Shed Light on What a Cyberwar Strategy Looks Like

KnowBe4

A look back at the last year of attacks on Ukraine by Google’s Threat Analysis Group (TAG) provides insight into attacks on NATO countries to gain a cyberspace advantage.

article thumbnail

And the Cyberattack Goes To. Oscar-Nominated Film Fans

Dark Reading

With the rise of cybercriminals targeting online piracy, this year's Oscar-nom fans need to be especially careful not to download malicious files while attempting to watch popular films for free.

74
article thumbnail

Use of Malware Decreases in Cyber Attacks as Exploit Usage Skyrockets

KnowBe4

New data on cyberattacks from last quarter provides a lens of what kinds of attack techniques to expect to see from cyber attackers this year.

article thumbnail

BlackLotus Secure Boot Bypass Malware Set to Ramp Up

Dark Reading

BlackLotus is the first in-the-wild malware to exploit a vulnerability in the Secure Boot process on Windows, and experts expect copycats and imminent increased activity.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Convert resistance into support when implementing software

OpenText Information Management

Managing user resistance can be challenging and there can be many reasons for this resistance. However, it would be wrong to treat users as if they are the problem and then to develop a defense mechanism around their resistance. It is rather, an opportunity to help people transition through the change. It is an opportunity … The post <strong>Convert resistance into support when implementing software</strong> appeared first on OpenText Blogs.

IT 58
article thumbnail

Make Sure Your Cybersecurity Budget Stays Flexible

Dark Reading

CISOs' ability to pivot tight budgets is key to defense plans that can stand up to attackers.

article thumbnail

Everything you want to know about integrating Student Information Systems + Apple

Jamf

Managing sensitive student data shouldn’t be an exercise in reinventing the wheel or a security incident waiting to happen. With Student Information Systems, educational organizations can centrally and securely manage and update this data while connecting with Apple School Manager to extend functionality to automate essential education management processes.

article thumbnail

Pig Butchering & Investment Scams: The $3B Cybercrime Threat Overtaking BEC

Dark Reading

A novel take on investment scams mixes romance and the lure of crypto riches to con targets out of "the whole hog" of their assets.

74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Job Postings

National Archives Records Express

Our office has posted a vacancy announcement for two positions in our appraisal program. The positions will be open until Monday, March 20, 2023. Archives Specialist Agency: National Archives and Records Administration Salary: $94,199.00 to $145,617.00 /PA Series and Grade: GS-1421-12/13 Open Period: Friday March 10, 2023 to Monday, March 20, 2023. Position Information: Permanent – Full-time Who May Apply: All candidates who are: Current or former federal employees qualifying as Status Candidate

article thumbnail

Elephant Hackers

Schneier on Security

An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.

IT 77
article thumbnail

Have Enterprise Collaboration Tools Made Every Day “Casual Friday” When It Comes to Electronic Communications?

eDiscovery Law

Employees ten years ago could not have anticipated how quickly and completely our workplaces have evolved over the past decade. In the aftermath of the global pandemic, significant numbers of employees have transitioned to telecommuting for some or all of their workweeks.

article thumbnail

The privacy loophole in your doorbell via Politico

IG Guru

Check out the article here.

Privacy 74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Have Enterprise Collaboration Tools Made Every Day “Casual Friday” When It Comes to Electronic Communications?

eDiscovery Law

Employees ten years ago could not have anticipated how quickly and completely our workplaces have evolved over the past decade. In the aftermath of the global pandemic, significant numbers of employees have transitioned to telecommuting for some or all of their workweeks.

article thumbnail

HHS OCR Asks Congress for Big Funding Boost

Data Breach Today

HIPAA Civil Penalty Settlements Can't Fund a Skyrocketing Caseload, HHS Says President Joe Biden's budget request for fiscal 2024 includes a big proposed boost for the federal office charged with enforcing privacy and security within the healthcare industry. The proposal asks for $78 million in appropriations for the Office of Civil Rights.

Privacy 130
article thumbnail

Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific

Schneier on Security

Chinese squid fishing boats are overwhelming Ecuador and Peru. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.