Wed.Apr 26, 2023

article thumbnail

6 Plead Guilty in Criminal HIPAA Scheme at Health Entity

Data Breach Today

Defendants Include 5 Former Hospital Financial Counselors Six individuals - including five former employees of a Tennessee healthcare organization - have pleaded guilty to criminal HIPAA violations in an alleged scheme involving the sale of motor vehicle accident patient information to third parties. One of the defendants has been sentenced so far.

Sales 141
article thumbnail

Fake Meta Tech Support Profiles for Fraud

KnowBe4

Researchers at Group-IB have found an extensive campaign in which criminal operators have created a large number of fake Facebook profiles that repost messages in which the scammers misrepresent themselves as tech support personnel from Meta (Facebook’s corporate parent). Researchers discovered some 3200 bogus profiles in twenty-three languages. By far most of the profiles were created in English, more than 90%, followed by Mongolian (2.5%), Arabic (2.3%), Italian (0.8%), and Khmer (0.6%).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Obscure Network Protocol Has Flaw That Could Unleash DDoS

Data Breach Today

Service Location Protocol Amplifies Queries by Up to 2,200 Times An obscure routing protocol codified during the 1990s has come roaring back to attention after researchers found a flaw that would allow attackers to initiate massive distributed denial-of-service attacks. Researchers from Bitsight and Curesec say they found a bug in Service Location Protocol.

141
141
article thumbnail

A component in Huawei network appliances could be used to take down Germany’s telecoms networks

Security Affairs

German government warns that technology to regulate power consumption in Huawei network appliances could be used for sabotage purposes. In March, the interior ministry announced it was conducting an audit on the network appliance from Chinese telecoms giants Huawei and ZTE. German lawmakers were briefed on the probe by the German Interior Ministry, the federal intelligence service, and the German cybersecurity agency in a classified hearing at the Bundestag’s digital committee in early A

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Exploit TP-Link N-Day Flaw to Build Mirai Botnet

Data Breach Today

Quick Turnaround of New Vulnerability Shows Hackers Reacting Quickly to Patches Hackers are attempting to infect a consumer-grade Wi-Fi router model with Mirai botnet malware following the discovery of zero-days in the device in a December hacking competition. TP-Link released a patch in mid-March. Telemetry shows infections in Eastern Europe and elsewhere.

141
141

More Trending

article thumbnail

ISMG Editors: Day 3 Overview at RSA Conference 2023

Data Breach Today

Finding the Value in Generative AI; Blockchain's Decline and Fall ISMG editors are live at RSA Conference 2023 in San Francisco with an overview of the latest speakers and hot topics, including the continuing conversation about generative AI and the decline and fall of blockchain. Join us for daily updates from San Francisco.

article thumbnail

Jabil is building reports with IBM Business Analytics Portfolio

IBM Big Data Hub

Jabil isn’t just a manufacturer, they are experts on global supply chain, logistics, automation, product design and engineering solutions. They are also interested and involved in the holistic application of emerging technologies like additive manufacturing, autonomous technologies, and artificial intelligence. They are a technologically motivated enterprise, so it’s no surprise that they would apply this forward-thinking view to their finance reporting as well.

article thumbnail

Thousands of publicly-exposed Apache Superset installs exposed to RCE attacks

Security Affairs

Apache Superset open-source data visualization platform is affected by an insecure default configuration that could lead to remote code execution. Apache Superset is an open-source data visualization and data exploration platform. The maintainers of the software have released security patches to address an insecure default configuration, tracked as CVE-2023-27524 (CVSS score: 8.9), that could lead to remote code execution.

article thumbnail

A US Bill Would Ban Kids Under 13 From Joining Social Media

WIRED Threat Level

The legislation would insert the government into online platforms' age-verification efforts—a move that makes some US lawmakers queasy.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Pro-Russia hacking group executed a disruptive attack against a Canadian gas pipeline

Security Affairs

Pro-Russia hacking group Zarya caused a cybersecurity incident at a Canadian gas pipeline, the critical infrastructure sector is on alert. A Canadian gas pipeline suffered a cyber security incident, Canada’s top cyber official and Pro-Russia hacking group Zarya claimed the attack could have caused an explosion. Pro-Russia hacktivist groups call to action for targeting organizations in the critical infrastructure sector, said Canada’s top cyber official.

article thumbnail

Recruiting Money Mules

KnowBe4

Money mules play a subordinate but important role in the criminal economy. They’re used to move stolen funds around, a low-level version of illicit remittance and money laundering. Researchers at Feedzai, in the course of a look at fraud in social media, have found that, while romance fraud remains common, scams designed to recruit the victims as money mules are becoming increasingly common.

article thumbnail

Google 2FA Syncing Feature Could Put Your Privacy at Risk

Dark Reading

Researchers find that the encryption of a user's 2FA secrets are stripped after transportation to the cloud.

Risk 105
article thumbnail

Cloud scalability: Scale-up vs. scale-out

IBM Big Data Hub

IT Managers run into scalability challenges on a regular basis. It is difficult to predict growth rates of applications, storage capacity usage and bandwidth. When a workload reaches capacity limits, how is performance maintained while preserving efficiency to scale? The ability to use the cloud to scale quickly and handle unexpected rapid growth or seasonal shifts in demand has become a major benefit of public cloud services, but it can also become a liability if not managed properly.

Cloud 70
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

High-Severity SLP Flaw Can Amplify DDoS Attacks up to 2,200 Times

Dark Reading

More than 2,000 global organizations — including Fortune 1,000 companies — are at risk to reflective DDoS attacks that exploit a vulnerability discovered in the legacy Internet protocol.

Risk 76
article thumbnail

The Future of UK Open Banking: Joint Regulatory Oversight Committee Issues Recommendations

Data Matters

The committee of government and regulatory authorities responsible for open banking in the UK has set out its plans and timeframes for expanding and developing infrastructure, standards, and processes for the sector. Central among these are proposals to improve the performance of interfaces among relevant firms, mitigate financial crime risks, and ensure that end users receive sufficient information and are protected if something goes wrong.

Privacy 88
article thumbnail

Metaverse Version of the Dark Web Could be Nearly Impenetrable

Dark Reading

Law enforcement will likely find it much harder to take down criminal activities on the "deepverse.

IT 93
article thumbnail

Michelle’s Approach to ChatGPT Has Me Convinced Google Will Launch a Direct Competitor

John Battelle's Searchblog

Last week I wrote a piece noting how my wife Michelle’s Google usage was down by nearly two thirds, thanks to her discovery of ChatGPT. I noted that Michelle isn’t exactly an early adopter – but that’s not entirely true. Michelle is more of a harbinger – if an early tech product “fits” her, she’ll adopt it early and often – and it’s usually a winner once it goes mainstream.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Linux Shift: Chinese APT Alloy Taurus Is Back With Retooling

Dark Reading

An old threat actor is making its comeback, sending around their old malware with a new tint.

IT 94
article thumbnail

Three strategies for health data interoperability success

CGI

Government and commercial health organizations realize that being data driven leads to better decisions and more impactful outcomes. It is critical for quality care, and is directly dependent on the interoperability of health data.

article thumbnail

Effects of the Hive Ransomware Group Takedown

Dark Reading

Despite some success in limiting damage from Hive, there's no time to relax security vigilance.

article thumbnail

What is endpoint management?

Jamf

This blog explores what endpoint management is and what tools organizations can use to manage and secure their endpoints.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Malware-Free Cyberattacks Are On the Rise; Here's How to Detect Them

Dark Reading

Last year, 71% of enterprise breaches were pulled off quietly, with legitimate tools, research shows.

79
article thumbnail

US medical provider hack impacts 2.3m+ victims via Cyber News

IG Guru

Check out the article here.

Risk 82
article thumbnail

Common Techniques Hackers Use to Penetrate Systems and How to Protect Your Organization

ForAllSecure

Criminal hacking has become a major threat to today’s organizations. According to a Deloitte Center for Controllership poll , “During the past 12 months, 34.5% of polled executives report that their organizations' accounting and financial data were targeted by cyber adversaries.” And, “Nearly half (48.8%) of C-suite and other executives expect the number and size of cyber events targeting their organizations’ accounting and financial data to increase in the year ahe

article thumbnail

CyberGRX Announces Winners of the Inaugural Cyber Risk Nation Awards

Dark Reading

Awarded individuals and companies are trailblazers in third-party risk management.

Risk 61
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What Are the Latest Developments from Thales in Data Security and IAM at RSA Conference 2023?

Thales Cloud Protection & Licensing

What Are the Latest Developments from Thales in Data Security and IAM at RSA Conference 2023? madhav Thu, 04/27/2023 - 05:55 We’ve been having a great week participating in RSA Conference 2023 and this year’s theme, Stronger Together, couldn’t be more appropriate as the cybersecurity industry fights to protect people and businesses against emerging threats and motivated malicious actors.

article thumbnail

BigID and Thales Collaborate to Deliver Comprehensive Data Protection and Privacy Compliance

Dark Reading

article thumbnail

Iranian 'Educated Manticore' Hackers Target Israel

Data Breach Today

Iranian Threat Actor Deploys Improved PowerLess Backdoor Iranian hackers are deploying an updated backdoor apparently targeting Israeli academic researchers with an interest in Iraq. A group's newly dubbed "Educated Manticore" is sending Iraq-themed bait to coax deployment of an implant known as PowerLess.

Education 141