Wed.Jun 28, 2023

article thumbnail

50 US Agencies Using Unsecured Devices, Violating Policy

Data Breach Today

Researchers Say Routers, Access Points, Firewalls, VPNs Could Expose Federal Data Security researchers at Censys found hundreds of federally owned devices at 50 different agencies exposed to the internet, accessible through IPv4 addresses and loaded with potentially vulnerable MOVEit and Barracuda Networks' ESG software. The vulnerabilities violate new CISA policy, the firm said.

Access 283
article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Penetration tests are vital components of vulnerability management programs. In these tests, white hat hackers try to find and exploit vulnerabilities in your systems to help you stay one step ahead of cyberattackers. Because these tests can use illegal hacker techniques, pentest services will sign a contract detailing their roles, goals, and responsibilities.

Cloud 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vendor Pays $75,000 HIPAA Fine in Data Exfiltration Breach

Data Breach Today

Patient Information Left Unsecured on Network Server, HHS Says A firm that provides coding and billing services to healthcare entities has agreed to pay federal regulators a $75,000 fine and implement a corrective action plan in the wake of an exfiltration incident that compromised patient data contained in an unsecured network server.

161
161
article thumbnail

Come With Me on a Spin Through the Hellscape of AI-Generated News Sites

John Battelle's Searchblog

Welcome to the hellscape of “Made for Advertising” sites This past Monday NewsGuard , a journalism rating platform that also analyzes and identifies AI-driven misinformation, announced it had identified hundreds of junk news sites powered by generative AI. The focus of NewsGuard’s release was how major brands were funding these spam sites through the indifference of programmatic advertising, but what I found interesting was how low that number was – 250 or so sites.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Venn Raises $29M to Safeguard Data on Employee-Owned Laptops

Data Breach Today

Startup Helps Clients Control, Govern Corporate Data Without Remote Virtual Desktop Venn Software landed Series A funding to help businesses ensure the security and compliance of data on laptops they don't necessarily manage or own. The $29 million will enable firms to control and govern corporate data on worker-owned devices without forcing users to launch remote virtual desktops.

More Trending

article thumbnail

Worker Inappropriately Accessed Patient Records for 15 Years

Data Breach Today

Cleveland Safety-Net Healthcare Organization Says Employee 'Disciplined' for Breach A Cleveland-based healthcare system is notifying a not-yet-disclosed number of individuals about an incident involving unauthorized medical records access by an employee that continued for 15 years. The safety-net organization says the worker has been disciplined.

Access 141
article thumbnail

Partner Spotlight: Advisory Solutions

Jamf

Advisory Solutions, a managed service provider, uses Jamf, Google Workspace, and Apple to help their clients reimagine how work gets done. Here’s how Jamf helped Advisory to ensure their clients are productive, secure and accessible while transforming workplaces into truly collaborative spaces.

Access 98
article thumbnail

Ukraine's Critical Infrastructure Hit 3,000 Times Since 2022

Data Breach Today

Hackers Evolve Tactics to Focus on Espionage, Not Destruction, State Agency Says Cyberattackers have hit Ukraine's critical infrastructure over 3,000 times since the beginning of the Russian invasion in 2022, according to Ukraine's national incident response team, which warned that such attacks may continue for years even after the fighting on the ground is over.

130
130
article thumbnail

Critical SQL Injection flaws in Gentoo Soko can lead to Remote Code Execution

Security Affairs

SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two SQL injection vulnerabilities in Gentoo Soko, collectively tracked as CVE-2023-28424 (CVSS score: 9.1) [ 1 ],[ 2 ], that can be exploited by a remote attacker to execute arbitrary code on vulnerable systems. “The two package search handlers, Search and SearchFeed, implemented in pkg/app/handler/packages/search.go, are affected by a SQL injection

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cisco XDR: Making Defenders' Lives Better

Data Breach Today

Cisco connected the world; who better to defend it? This is the mindset Carlos Diaz brings to the new Cisco XDR release, which he says is designed to make cybersecurity defenders' lives easier. The message that defenders should draw from this XDR solution, he says, is "Cisco knows me.

article thumbnail

Using Electromagnetic Fault Injection Attacks to take over drones

Security Affairs

Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them. While the use of drones continues to grow, researchers from IOActive analyzed how to develop fault injection attacks against hardened Unmanned Aerial Vehicles (UAVs). The experts focused on achieving code execution on a commercially available drone, supporting significant security features (i.e. the use of signed and encrypted firmware, Trusted Executio

article thumbnail

Astrix Security Raises $25M to Protect Nonhuman Identities

Data Breach Today

Cash Will Allow Astrix to Bring Threat Detection, Secure Access to Third-Party Apps A finalist at this year's RSA Innovation Sandbox contest landed Series A funding to detect threats and secure access for nonhuman identities. The $25 million will enable Astrix Security to expand from managing access for nonhuman identities to understanding threats to services and applications.

Security 130
article thumbnail

NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness

Dark Reading

The popular package manager for software developers has been vulnerable to this attack vector for a while, and negligent in fixing the problem, according to a former employee.

96
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

European Cyber Agency Remains Underfunded

Data Breach Today

ENISA Chief Says Lack of Appropriate Funding Continues to Be a Challenge The European cyber agency continues to remain underfunded despite the surge in ransomware and other cyberthreats, the organization's chief said in a recent hearing. The ENISA chief called on the European Commission to hold regulatory consultations to address the existing policy gaps.

article thumbnail

6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy

Dark Reading

Generative AI chatbots like ChatGPT are the buzziest of the buzzy right now, but the cyber community is starting to mature when it comes to assessing where it should fit into our lives.

article thumbnail

Apple Criticizes UK Government's Client-Side Scanning Push

Data Breach Today

Online Safety Bill Also Criticized by Leading Cybersecurity Experts and Academics Technology giant Apple has joined the chorus of voices calling on the British government to rethink its proposed Online Safety Bill legislation intended to increase public safety by monitoring people's private communications via client-side scanning.

article thumbnail

Experts warn of a spike in May and June of 8Base ransomware attacks

Security Affairs

Researchers warn of a massive spike in May and June 2023 of the activity associated with the ransomware group named 8Base. VMware Carbon Black researchers observed an intensification of the activity associated with a stealthy ransomware group named 8Base. The experts observed a massive spike in activity associated with this threat actor between May and June 2023.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

LetMeSpy Phone-Tracking App Hacked, Revealing User Data

Dark Reading

With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.

IT 97
article thumbnail

What is slow productivity?

IBM Big Data Hub

Slow productivity can be defined as working at a slower pace on fewer tasks at a time to increase workplace productivity and satisfaction. The trend toward slow productivity is for businesses and employees to rethink what productivity looks like and create an environment where quality of work is emphasized over quantity of work. In his book Rest: Why You Get More Done When You Work Less , Silicon Valley consultant Alex Soojung-Kim Pang describes taking a working sabbatical where he got an enormo

article thumbnail

Generative AI Projects Pose Major Cybersecurity Risk to Enterprises

Dark Reading

Developers' enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.

Risk 89
article thumbnail

Stalkerware Vendor Hacked

Schneier on Security

The stalkerware company LetMeSpy has been hacked : TechCrunch reviewed the leaked data, which included years of victims’ call logs and text messages dating back to 2013. The database we reviewed contained current records on at least 13,000 compromised devices, though some of the devices shared little to no data with LetMeSpy. (LetMeSpy claims to delete data after two months of account inactivity.) […] The database also contained over 13,400 location data points for several thousand v

IT 78
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Saudi Arabia's Cyber Capabilities Ranked Second Globally

Dark Reading

Saudi Arabia is one of the world's leaders in cybersecurity development and preparedness, according to the latest rankings.

article thumbnail

National Cyber Security Centre Notes UK Law Firms are Main Target for Cybercriminals

KnowBe4

In the most recent Cyber Threat report from the National Cyber Security Centre (NCSC), it is clear that UK law firms are a gold mine for cybercriminals.

Mining 78
article thumbnail

3 Strategies for Bringing Rigor to Software Security

Dark Reading

With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt.

article thumbnail

How to Digitize Documents

Record Nations

Homes and businesses are turning to digitization for better preservation and organization of their documents. Digital documents are easy to track, find, update, and share. Whether you have small or large volumes of files, you can digitize those documents quickly, and have them ready to use in no time. . Documents of all kinds can. How to Digitize Documents The post How to Digitize Documents appeared first on Record Nations.

74
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Open Source LLM Projects Likely Insecure, Risky to Use

Dark Reading

New LLM-based projects typically become successful in a short period of time, but the security posture of these generative AI projects are very low, making them extremely unsafe to use.

article thumbnail

How Your Real Flight Reservation Can Be Used to Scam You

WIRED Threat Level

Scammers use a booking technicality, traveler confusion, and promises of dirt-cheap tickets to offer hot deals that are anything but.

article thumbnail

Astrix Security Raises $25M in Series A Funding

Dark Reading

The investment will allow enterprises to further secure non-human identities and safely leverage the soaring adoption of third-party apps and Generative AI services.