Tue.Apr 11, 2023

article thumbnail

Suspected Apple iOS Zero-Day Used to Spread 'Reign' Spyware

Data Breach Today

The Spyware Can Record Audio, Take Pictures, Track Locations and Steal Passwords A low-profile Israeli advanced spyware firm used a suspected zero-day to surveil the lives of journalists, political opposition figures and a nongovernmental organization worker across multiple continents, say researchers from the Citizen Lab and Microsoft.

Passwords 304
article thumbnail

Microsoft (& Apple) Patch Tuesday, April 2023 Edition

Krebs on Security

Microsoft today released software updates to plug 100 security holes in its Windows operating systems and other software, including a zero-day vulnerability that is already being used in active attacks. Not to be outdone, Apple has released a set of important updates addressing two zero-day vulnerabilities that are being used to attack iPhones , iPads and Macs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercrime: Ransomware Hits and Initial Access Listings Grow

Data Breach Today

But If Hydra Takedown Is a Guide, Fresh Disruptions May Take Big Bite Out of Market The cybercrime economy appears to remain alive and well: Compared to last year, researchers report seeing an increase in the number of known ransomware victims as well as initial access listings, which facilitate such attacks. The impact the takedowns of BreachForums and Genesis remains to be seen.

Access 276
article thumbnail

The Secret Value of AIIM: A True Story

AIIM

When Tony invited me to write a guest blog for AIIM, I planned to write a techie piece on the latest document AI news. I was even tempted to ask ChatGPT to write one in the style of Monty Python. You’ll be pleased to know that moment of temporary insanity quickly passed. Instead of techie talk, I would like to tell you a story about the secret value of AIIM and why I think it’s vital that we all pitch in and help Tori Miller Liu and the team to move AIIM forward.

ECM 145
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Proposed Health IT Certification Rules Target AI, Privacy

Data Breach Today

HHS Rules Aimed at Beefing Up Health IT Systems, Patient Data Privacy, Security Federal regulators have issued new rules aimed at securing certified healthcare software, helping patients decide which records to keep private, and protecting data used by AI and predictive tools. The 556-page proposed rule seeks to promote innovation and data sharing while tightening security.

Privacy 147

More Trending

article thumbnail

Latitude Financial Refuses to Pay Ransom

Data Breach Today

Ongoing Cyberattack Still Causing Service Disruptions Australian non-bank lender Latitude Financial said it will not pay a ransom demand from extorters behind the data theft of 14 million customer. Australian Home Minister Australian Clare O’Neil called Latitude’s decision "consistent with Australian government advice.

article thumbnail

Catches of the Month: Phishing Scams for April 2023

IT Governance

Welcome to our April 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at a scam targeting YouTube content creators, the traditional tax-related phishing campaigns that occur at this time of year and a new report highlighting a surge in email-based scams attacks.

Phishing 114
article thumbnail

Top 5 Reasons to Use MDR in Public Sector

Data Breach Today

Rob Lalumondier of Sophos on Questions to Ask When Selecting MDR Provider Gartner says by 2025, 50% of companies will be using MDR. What's the compelling business case, and how does it translate to meet the needs of public sector entities? Rob Lalumondier of Sophos shares five reasons to use MDR, as well as key questions to ask when selecting a provider.

IT 147
article thumbnail

Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads

Dark Reading

The campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.

124
124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Mysterious Origin of Albert Ingalls from Little House on the Prairie

Information Governance Perspectives

My wife and I sometimes debate the term “untimely death.” She thinks death is, by nature, untimely, but I believe it’s especially awful when it happens to young people. My brother Albert was one of them, taken from our family at seventeen while crossing the street on a cold, windy night in 1975. I write about his passing and its devastating impact on our family and friends for the first time in my new memoir, The Bastard of Beverly Hills.

IT 98
article thumbnail

How Password Managers Can Get Hacked

Dark Reading

Password managers aren't foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company's defenses.

Passwords 103
article thumbnail

The Upside of ESG: Why Strong Sustainability Programs Matter to Modern Enterprises

Hanzo Learning Center

ESG and sustainability are two concepts that have gained significant prominence recently. The World Bank Group’s International Finance Corporation defines ESG as a set of factors that companies and investors consider regarding environmental, social, and governance issues. On the other hand, sustainability refers to organizations' actions to achieve their environmental, social, and corporate governance goals.

article thumbnail

Yum! Brands, the owner of KFC, Taco Bell and Pizza Hut, discloses data breach

Security Affairs

Yum! Brands, the company that owns the KFC, Pizza Hut, and Taco Bell brands, disclosed a data breach after the January ransomware attack. On January 13, 2023, Yum! Brands suffered a cyberattack that forced the company to take its systems offline closing roughly 300 restaurants in the UK for one day. Now the company, which owns the KFC, Pizza Hut, and Taco Bell brands, disclosed a data breach and revealed that ransomware actors have stolen personally identifiable information (PII) of an unspecifi

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Microsoft Patches 97 CVEs, Including Zero-Day & Wormable Bugs

Dark Reading

The April 2023 Patch Tuesday security update also included a reissue of a fix for a 10-year-old bug that a threat actor recently exploited in the supply chain attack on 3CX.

Security 101
article thumbnail

A “By-Design” flaw in Microsoft Azure can allow storage accounts takeover

Security Affairs

A flaw in Microsoft Azure could be exploited by attackers to gain access to storage accounts, perform lateral movements, and even execute remote code. Researchers from the security firm Orca demonstrated how to abuse Microsoft Azure Shared Key authorization to gain full access to storage accounts and potentially critical business assets. The issue can also be abused to move laterally in the environment and even execute remote code.

Access 95
article thumbnail

This Identity Management Day, Go BIG or Go HOME!

Thales Cloud Protection & Licensing

This Identity Management Day, Go BIG or Go HOME! madhav Wed, 04/12/2023 - 06:11 Identity and Access Management (IAM) has evolved significantly over the past decade. It almost feels like we’re at an inflection point at the moment. There are a number of startups emerging in this space, which is a sign of a healthy pipeline of innovation in the industry.

B2C 87
article thumbnail

Cybercrime group exploits Windows zero-day in ransomware attacks

Security Affairs

Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in ransomware attacks. Microsoft has addressed a zero-day vulnerability, tracked as CVE-2023-28252 , in the Windows Common Log File System (CLFS), which is actively exploited in ransomware attacks. Microsoft fixed the issue with the release of Patch Tuesday security updates for April 2023.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

7 Things Your Ransomware Response Playbook Is Likely Missing

Dark Reading

Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?

article thumbnail

Apple released emergency updates to fix recently disclosed zero-day bugs on older devices

Security Affairs

Apple released updates to backport patches addressing two actively exploited zero-day vulnerabilities in older iPhones, iPads, and Macs. Apple has released emergency updates to backport security patches that address two actively exploited zero-day flaws also affecting older iPhones, iPads, and Macs. On April 7, 2023, Apple has released emergency security updates to address two actively exploited zero-day vulnerabilities, tracked as CVE-2023-28205 and CVE-2023-28206, impacting iPhones, Macs, and

article thumbnail

How IBM invests in opportunities to reach maximum equitable impact

IBM Big Data Hub

At IBM, we strive each day to achieve our purpose; to be the catalyst that helps makes the world work better. We endeavor to be at the forefront of groundbreaking changes in the industries we serve and the global community at large. None of this would be possible without skilled and talented IBMers. Businesses should make equity in the workplace a priority.

article thumbnail

Samsung Engineers Feed Sensitive Data to ChatGPT, Sparking Workplace AI Warnings

Dark Reading

In three separate incidents, engineers at the Korean electronics giant reportedly shared sensitive corporate data with the AI-powered chatbot.

97
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Top Takeaways You Could be Missing Out on my Upcoming Ransomware Master Class

KnowBe4

There is no doubt that ransomware is one of the top cybersecurity challenges of our lifetime. Survey after survey has revealed senior management and IT employees from the top on down, list a successful ransomware attack as their number one cybersecurity fear above all others.

article thumbnail

Where Are the Women? Making Cybersecurity More Inclusive

Dark Reading

Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.

article thumbnail

[Jaw-Dropper] FTX's Cybersecurity Was Hilariously Bad

KnowBe4

4/11/2023 - Gizmodo just dropped this eye-roll inducing news. The disgraced crypto exchange had no dedicated cybersecurity staff and "protected" users assets with minimal safeguards, according to new bankruptcy filings.

article thumbnail

'Blatantly Obvious': Spyware Offered to Cyberattackers via PyPI Python Repository

Dark Reading

Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their wares.

98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Does HIPAA require penetration testing?

Outpost24

Does HIPAA require penetration testing? 14.Apr.2023 Florian Barre Tue, 04/11/2023 - 09:51 Penetration Testing Teaser The HIPAA Security Rule requires healthcare organizations to perform regular security risk assessments to protect e-PHI. Penetration testing can help organizations with this requirement.

Risk 75
article thumbnail

Don’t let bad data drag you down: A retailer’s guide

Collibra

Retail is a dynamic and competitive market. It needs to work around the fickleness of customers and rapidly evolving trends. In addition to the traditional brick-and mortar-stores, the retail business today includes online and mobile stores. Every process at every stage of these stores relies on data. And the role of data is getting bigger in supply chain management, omnichannel customer experiences, and target marketing strategies.

Retail 74
article thumbnail

[Free Tool] See Which Users Are Susceptible to Risky Security Behavior with SecurityCoach Free Preview!

KnowBe4

The human factor is involved in 82% of data breaches, according to the 2022 Verizon Data Breach Investigations Report. Cybercriminals use social engineering techniques like phishing, spear phishing and impersonation to manipulate your employees in attempts to hack into your organization causing significant downtime risks.