Fri.Mar 10, 2023

article thumbnail

ISMG Editors: Assessing the New US Cybersecurity Strategy

Data Breach Today

Also: Panel Discusses Vendor Liability, Ransomware and the Rise of Check Fraud In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues, including how the new U.S. cybersecurity strategy doubles down on hitting ransomware, how the strategy shifts liability issues to vendors, and why check fraud is on the rise and what can be done about it.

article thumbnail

Utah Legislature Passes Bills Restricting Social Media Accounts for Minors

Hunton Privacy

On March 1-3, 2023, the Utah legislature passed a series of bills, SB 152 and HB 311, regarding social media usage for minors. For social media companies with more than five million users worldwide, SB 152 would require parental permission for social media accounts for users under age 18, while HB 311 would hold social media companies liable for harm minors experience on the platforms.

Risk 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Central Bank to Hold Cyber Stress Tests for Banks

Data Breach Today

Financial Regulator Will Gauge Banks' Ability to Withstand Cyberattacks The European Central Bank will conduct cyber stress tests to determine banks' resilience against cyberattacks. The tests, which will receive a "significant amount of time and resources," are set to be completed by mid-2024, said Andrea Enria, ECB's top official for oversight.

130
130
article thumbnail

BlackMamba PoC Malware Uses AI to Avoid Detection

eSecurity Planet

HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms. The malware, dubbed “BlackMamba,” is the latest example of exploits that can evade even the most sophisticated cybersecurity products.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

Not-So-Cerebral Sharing of Mental Health Data Hits Millions

Data Breach Today

Website Tracking Tools in Use Since 2019 Exposed Online Mental Health Assessments A provider of online mental health services is notifying nearly 3.2 million people that the company used website tracking tools to share sensitive patient information with third parties including Facebook, Google and TikTok - without the individuals' consent.

130
130

More Trending

article thumbnail

SVB Collapse Is 'Self-Inflicted Gunshot Wound' for Startups

Data Breach Today

Silicon Valley Bank Crash Will Make Getting Loans, Credit Lines Harder for Startups One top venture capitalist says the sudden downfall of Silicon Valley Bank will make it harder for cybersecurity startups to get loans and credit lines. For decades, SVB was one of the few institutions willing to extend money to early-stage firms that got the cold shoulder from traditional banks.

article thumbnail

Unpatched Zero-Day Bugs in Smart Intercom Allow Remote Eavesdropping

Dark Reading

A video-enabled smart intercom made by Chinese company Akuvox has major security vulnerabilities that allow audio and video spying, and the company has so far been unresponsive to the discoveries.

article thumbnail

AT&T is notifying millions of customers of data breach after a third-party vendor hack

Security Affairs

AT&T is warning some of its customers that some of their information was exposed after the hack of a third-party vendor’s system. AT&T is notifying millions of customers that some of their information was exposed after a third-party vendor was hacked. CPNI is information related to the telecommunications services purchased by the customers, including the number of lines for each account or the wireless plan to which customers are subscribed. “We recently determined that an un

article thumbnail

ChatGPT Browser Extension Hijacks Facebook Business Accounts

Dark Reading

Between March 3 and March 9, at least 2,000 people a day downloaded the malicious "Quick access to ChatGPT" Chrome extension from the Google Play app store.

Access 97
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

One-Quarter of Users Fall for Online Scams Despite an Overconfidence in an Ability to Spot Them

KnowBe4

A new survey of individuals across seven countries shows that users may have had luck on their side, as a majority aren’t sure about their device security or how to spot malicious sites online.

article thumbnail

Weekly Update 338

Troy Hunt

I'm going lead this post with where I finished the video because it brought the biggest smile to Charlotte's and my faces this week: This. Is. Amazing 😍 pic.twitter.com/wOl4kpK841 — Troy Hunt (@troyhunt) March 3, 2023 When I talked about the McLaren in this week's video, Frits made the comment "the smile on your face says it all", which absolutely nailed it.

Cloud 83
article thumbnail

Law enforcement seized the website selling the NetWire RAT and arrested a Croatian man

Security Affairs

An international law enforcement operation seized the infrastructure associated with the NetWire RAT and resulted in the arrest of its administrator. A coordinated international law enforcement operation resulted in the seizure of the infrastructure associated with the NetWire RAT, the police also arrested its administrator. Busted! A coordinated #lawenforcement action has taken down the #Netwire Remote Access Trojan infrastructure.

Sales 81
article thumbnail

Legal Industry Faces Double Jeopardy as a Favorite Cybercrime Target

Dark Reading

Hackers are increasingly tantalized by the troves of sensitive data held by lightly protected law firms and legal services organizations.

81
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google: Analysis of Cyberattacks Targeting Ukraine Shed Light on What a Cyberwar Strategy Looks Like

KnowBe4

A look back at the last year of attacks on Ukraine by Google’s Threat Analysis Group (TAG) provides insight into attacks on NATO countries to gain a cyberspace advantage.

article thumbnail

And the Cyberattack Goes To. Oscar-Nominated Film Fans

Dark Reading

With the rise of cybercriminals targeting online piracy, this year's Oscar-nom fans need to be especially careful not to download malicious files while attempting to watch popular films for free.

74
article thumbnail

Use of Malware Decreases in Cyber Attacks as Exploit Usage Skyrockets

KnowBe4

New data on cyberattacks from last quarter provides a lens of what kinds of attack techniques to expect to see from cyber attackers this year.

article thumbnail

BlackLotus Secure Boot Bypass Malware Set to Ramp Up

Dark Reading

BlackLotus is the first in-the-wild malware to exploit a vulnerability in the Secure Boot process on Windows, and experts expect copycats and imminent increased activity.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Convert resistance into support when implementing software

OpenText Information Management

Managing user resistance can be challenging and there can be many reasons for this resistance. However, it would be wrong to treat users as if they are the problem and then to develop a defense mechanism around their resistance. It is rather, an opportunity to help people transition through the change. It is an opportunity … The post <strong>Convert resistance into support when implementing software</strong> appeared first on OpenText Blogs.

IT 57
article thumbnail

Make Sure Your Cybersecurity Budget Stays Flexible

Dark Reading

CISOs' ability to pivot tight budgets is key to defense plans that can stand up to attackers.

article thumbnail

Elephant Hackers

Schneier on Security

An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.

IT 81
article thumbnail

Pig Butchering & Investment Scams: The $3B Cybercrime Threat Overtaking BEC

Dark Reading

A novel take on investment scams mixes romance and the lure of crypto riches to con targets out of "the whole hog" of their assets.

74
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Everything you want to know about integrating Student Information Systems + Apple

Jamf

Managing sensitive student data shouldn’t be an exercise in reinventing the wheel or a security incident waiting to happen. With Student Information Systems, educational organizations can centrally and securely manage and update this data while connecting with Apple School Manager to extend functionality to automate essential education management processes.

article thumbnail

Job Postings

National Archives Records Express

Our office has posted a vacancy announcement for two positions in our appraisal program. The positions will be open until Monday, March 20, 2023. Archives Specialist Agency: National Archives and Records Administration Salary: $94,199.00 to $145,617.00 /PA Series and Grade: GS-1421-12/13 Open Period: Friday March 10, 2023 to Monday, March 20, 2023. Position Information: Permanent – Full-time Who May Apply: All candidates who are: Current or former federal employees qualifying as Status Candidate

article thumbnail

Have Enterprise Collaboration Tools Made Every Day “Casual Friday” When It Comes to Electronic Communications?

eDiscovery Law

Employees ten years ago could not have anticipated how quickly and completely our workplaces have evolved over the past decade. In the aftermath of the global pandemic, significant numbers of employees have transitioned to telecommuting for some or all of their workweeks.

article thumbnail

The privacy loophole in your doorbell via Politico

IG Guru

Check out the article here.

Privacy 73
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Have Enterprise Collaboration Tools Made Every Day “Casual Friday” When It Comes to Electronic Communications?

eDiscovery Law

Employees ten years ago could not have anticipated how quickly and completely our workplaces have evolved over the past decade. In the aftermath of the global pandemic, significant numbers of employees have transitioned to telecommuting for some or all of their workweeks.

article thumbnail

HHS OCR Asks Congress for Big Funding Boost

Data Breach Today

HIPAA Civil Penalty Settlements Can't Fund a Skyrocketing Caseload, HHS Says President Joe Biden's budget request for fiscal 2024 includes a big proposed boost for the federal office charged with enforcing privacy and security within the healthcare industry. The proposal asks for $78 million in appropriations for the Office of Civil Rights.

Privacy 130
article thumbnail

Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific

Schneier on Security

Chinese squid fishing boats are overwhelming Ecuador and Peru. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.