Thu.Dec 29, 2022

article thumbnail

Why Governments Should Give Incentives for Collaboration

Data Breach Today

Global Cyber Alliance CEO Philip Reitinger Shares Updates, Challenges Global Cyber Alliance CEO Philip Reitinger shares updates on the alliance's Internet Integrity and Capacity & Resilience programs, which tackle key challenges of internet infrastructure, privacy and safety. Success is measured by the number of partners and "who is using the platform," he says.

article thumbnail

Extracting Encrypted Credentials From Common Tools

Dark Reading

Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Indian Railways Says It's Not Source of Alleged Data Breach

Data Breach Today

30 Million Purported Passenger Records Listed for Sale on Cybercrime Forum A cybercrime forum this week listed for sale what a seller purports to be 30 million passenger records for users of India's railways. The Indian Ministry of Railways denies that the Indian Railway Catering and Tourism Corp, is the source of any data breach, but says it's investigating.

article thumbnail

6 Ways to Protect Your Organization Against LAPSUS$

Dark Reading

Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.

Education 106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Improving Recovery From Healthcare Ransomware Incidents

Data Breach Today

Many healthcare organizations struggle to recover from ransomware attacks, putting clinical procedures and patient safety in jeopardy during the process, says Steve Cagle, CEO of privacy/consulting firm Clearwater. "They need to think about how the technology is supporting the business," he says.

More Trending

article thumbnail

Predicting the Cybersecurity Future: Experts Preview 2023

Data Breach Today

The latest edition of the ISMG Security Report shares tips for security leaders to navigate the threat landscape next year, discusses cybersecurity and privacy policy shifts to watch, and explains why global political and economic instability should not be cause for cybersecurity budgets to drop.

article thumbnail

After the Uber Breach: 3 Questions All CISOs Should Ask Themselves

Dark Reading

How CISOs handle the ethical issues around data breaches can make or break their careers. Don't wait until a breach happens to plot the course forward.

article thumbnail

Children's Hospital Expects Weekslong Ransomware Recovery

Data Breach Today

Treatment and Diagnostic Delays at Toronto Hospital Blamed on Malware Attack Nearly a week after a ransomware attack forced a network shutdown at Toronto's Hospital for Sick Children, patients are still experiencing delays in treatment and diagnostic procedures. The hospital says it has restored some systems, phones and websites, but the recovery process could take weeks.

article thumbnail

3 Industries, 3 Security Programs

Dark Reading

Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.

Security 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hive Ransomware Hits Louisiana Hospitals, Leaks Patient Data

Data Breach Today

Patients Notified About October Incident at Lake Charles Memorial Health System Hackers stole and leaked personal data for nearly 270,000 patients and employees of Louisiana's Lake Charles Memorial Health System as part of a ransomware attack for which Hive claimed credit. Patients and regulators have just been informed about the October attack.

article thumbnail

Thousands of Citrix servers still vulnerable to CVE-2022-27510 and CVE-2022-27518 

Security Affairs

Researchers warn of thousands of Citrix Application Delivery Controller (ADC) and Gateway endpoints are still unpatched. NCC Group’s Fox-IT research team warns of thousands of Citrix ADC and Gateway endpoints remain vulnerable to two critical vulnerabilities, tracked as CVE-2022-27510 and CVE-2022-27518 (CVSS scores: 9.8), that the company addressed in recent months.

Cloud 93
article thumbnail

Children's Hospital Expects Weeks-Long Ransomware Recovery

Data Breach Today

Treatment and Diagnostic Delays at Toronto Hospital Blamed on Malware Attack Nearly a week after a ransomware attack forced a network shutdown at Toronto's Hospital for Sick Children, patients are still experiencing delays in treatment and diagnostic procedures. The hospital says it has restored some systems, phones and websites, but the recovery process could take weeks.

article thumbnail

Phishing Activity Rose 130% in the Second Half of 2022, Representing Three-Quarters of All Email-Based Attacks

KnowBe4

New data focused on cyberattacks in the second half of the year-to-date shows phishing taking the overwhelming lead as the initial attack vector of choice.

Phishing 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients

Security Affairs

The Lake Charles Memorial Health System (LCMHS) suffered a ransomware attack that impacted 270,000 patients. The Lake Charles Memorial Health System (LCMHS) disclosed a data breach that affected almost 270,000 patients at its medical centers. The Lake Charles Memorial Health System is the largest not-for-profit community healthcare system in Southwest Louisiana.

article thumbnail

Why Businesses Are Switching to the Cloud

Record Nations

Success in today’s business world means implementing the latest technology to minimize turnaround time and stay above the competition. Cloud technology gives you instant access to your files, heightened security, and more control over your data. Businesses of all sizes can benefit from cloud services, which is why nearly 94% of all enterprises use cloud […].

Cloud 76
article thumbnail

Preservica - 2022 highlights & momentum looking ahead

Preservica

As the year comes to a close, it’s hard not to reflect on the digital preservation needs across industries over the last 12 months. From academic institutions and government agencies to corporate businesses and the health sector, 2022 was full of world events that will shape our history forever. It’s for that reason why preserving vital content for our collective digital memory is so important.

article thumbnail

The Worst Hacks of 2022

WIRED Threat Level

The year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Predictions ’23: AI Gets a Business Model (or Three)

John Battelle's Searchblog

Let’s start our 2023 predictions off with some thoughts on artificial intelligence. With ChatGPT , Silicon Valley seems to have gotten a bit of its mojo back. After two decades spent simmering the magic of Apple, Google, Amazon and Facebook into a sticky lucre of corporate profit, here was the kind of technological marvel the industry seemed to have forgotten how to make – a magical tour de force that surprised, mystified, and delighted millions.

article thumbnail

New Year's Surprise: Cybersecurity M&A, Funding Activity Snowballs in Q4

Dark Reading

Concerns about recessionary trends impacting the cybersecurity sector in 2022 remained largely unfounded in Q4, as investment activity surged after a Q3 slowdown.

article thumbnail

Why Businesses Are Switching to the Cloud

Record Nations

Success in today’s business world means implementing the latest technology to minimize turnaround time and stay above the competition. Cloud technology gives you instant access to your files, heightened security, and more control over your data. Businesses of all sizes can benefit from cloud services, which is why nearly 94% of all enterprises use cloud […] The post Why Businesses Are Switching to the Cloud appeared first on Record Nations.

Cloud 52
article thumbnail

Updated Memorandum Regarding Transition to Electronic Records in the US

IG Guru

Check out the publication here.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

KrebsOnSecurity turns 13 years old today. That’s a crazy long time for an independent media outlet these days, but then again I’m bound to keep doing this as long as they keep letting me. Heck, I’ve been doing this so long I briefly forgot which birthday this was! Thanks to your readership and support, I was able to spend more time in 2022 on some deep, meaty investigative stories — the really satisfying kind with the potential to affect positive change.

Passwords 218
article thumbnail

Predictions ’23: Advertising – Netflix, Apple, Amazon, Twitter

John Battelle's Searchblog

I love advertising – particularly digital advertising. There, I said it. Was that so hard? Well, yes, the industry I’ve partnered with for more than three decades can be very difficult to defend – and the past ten or fifteen years have been particularly bad. I’m tempted to say that everything after Google Adwords was a net negative in the world, including Facebook, which was the bastard child of Google, and even the open web and programmatic advertising (a development I&#

article thumbnail

Predictions ’23 – The Summary

John Battelle's Searchblog

I’ve used the image above for many years, mainly because I love how surprised the guy looks as he gazes into the crystal ball. Or maybe he’s just sat on something unpleasant. In any case, it pretty much sums up my approach to this, my 20th edition of annual predictions. I sit down, I might have an adult beverage on hand, and I just write until I feel like I’m done.

article thumbnail

Predictions ’23: Crypto, Tesla, IPOs, and Trump Takes a Bow

John Battelle's Searchblog

My first two long form prediction posts focused on big topics – artificial intelligence and digital advertising. This one, my last, will focus on a grab bag of market-related topics that have dominated the headlines at one time or another over the past few years. Let’s start with crypto. It’s hard to fathom how poorly the crypto market has had it these past twelve months, unless, like me, you were a participant in the Great Crypto Winter of 2018.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.