Fri.Apr 14, 2023

article thumbnail

European Scrutiny of ChatGPT Grows as Probes Increase

Data Breach Today

Concerns Raised Over ChatGPT's Compliance With GDPR The French and Spanish data privacy watchdogs have launched separate probes into ChatGPT over potential data privacy violations. European scrutiny of the chatbot mounted after the Italian data protection agency announced a temporary ban on ChatGPT in March.

article thumbnail

Why is ‘Juice Jacking’ Suddenly Back in the News?

Krebs on Security

KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about “ juice jacking ,” a term first coined here in 2011 to describe a potential threat of data theft when one plugs their mobile device into a public charging kiosk. It remains unclear what may have prompted the alerts, but the good news is that there are some fairly basic things you can do to avoid having to worry

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Describe Intelligence Leak Probe as Criminal Matter

Data Breach Today

National Guard Airman Jack Teixeira Charged With Mishandling Intelligence The arrest of a low-level U.S. military IT specialist, Jack Teixeira, on suspicion of leaking highly classified documents begs the question of why he had access to them in the first place. The national guard airman has been charged with inappropriately retaining and sharing intelligence.

Military 262
article thumbnail

Western Digital Cyber Attack a ‘Wake Up Call for ASIC Vendors’

eSecurity Planet

A massive cyber attack targeting drive maker Western Digital Corp. (WDC) could potentially have serious and long-term implications. One of the hackers apparently disclosed the extent of the cyber attack to TechCrunch this week. Hackers accessed a range of company assets and stole about 10 terabytes of data, but the disclosure with the greatest potential for damage is that the hackers claim to have the ability to impersonate WDC code-signing certificates.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Netskope, Zscaler, Palo Alto Lead SSE Gartner Magic Quadrant

Data Breach Today

Palo Alto Enters Leaders Area While Skyhigh Security Falls From Leader to Visionary A surging Palo Alto Networks has joined stalwarts Netskope and Zscaler atop Gartner's security service edge ranking, while Skyhigh Security fell from leader to visionary. Netskope joined Palo Alto as a big winner, catapulting from third to first in both execution ability and completeness of vision.

Security 159

More Trending

article thumbnail

HIMSS23: Tackling Some of Healthcare's Top Cyber Challenges

Data Breach Today

The Annual Health IT Event Will Showcase Security, Privacy Most healthcare organizations allocate 6% or less of their information technology budget for cybersecurity, putting them at a disadvantage in their security defenses and for competitive hiring, according to a recent survey by the Healthcare Information Management Systems Society.

Privacy 146
article thumbnail

[Head Start] Effective Methods How To Teach Social Engineering To An AI

KnowBe4

Remember The Sims? Well Stanford created a small virtual world with 25 ChatGPT-powered "people". The simulation ran for 2 days and showed that AI-powered bots can interact in a very human-like way.

article thumbnail

ISMG Editors: RSA Conference 2023 Preview

Data Breach Today

Special Guests Join Editors to Share RSA Predictions, Themes, Coverage In the latest weekly update, five key cybersecurity influencers join editors at Information Security Media Group to share predictions, themes and trends ahead of RSA Conference 2023, including a preview of speakers and interviews and an overview of ISMG's coverage at the event.

article thumbnail

What the Recent Collapse of SVB Means for Privacy

Dark Reading

Businesses must be diligent in their actions, cultivate awareness with employees, and implement strict standards around external communications in the wake of Silicon Valley Bank's collapse.

Privacy 97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

APT36 Running Espionage Ops Against India's Education Sector

Data Breach Today

Pakistan-Linked APT Group Using Spear-Phishing to Plant Info Stealer Malware A suspected Pakistan espionage threat actor that relies on phishing emails is expanding to the education sector after years of focusing on the Indian military and government. Security researchers from Sentinel Labs say Transparent Tribe is using malicious documents laced with Crimson RAT malware.

Education 146
article thumbnail

Investing in the patient experience with mobile devices

Jamf

Healthcare mobile device initiatives surged during pandemic restrictions. Now even more healthcare organizations understand how thoughtful implementation of mobile devices can improve the patient experience in healthcare while at the same time providing better and more personalized care.

98
article thumbnail

Data Protection: Data Has No Jurisdiction

Data Breach Today

In this podcast, Rodman Ramezanian, global cloud threat lead at Skyhigh Security, discusses why the risk of data breaches is so high, how security teams can protect data wherever it resides, and why security leaders should embrace a new mindset for data protection.

article thumbnail

5 Best Bot Protection Solutions and Software for 2023

eSecurity Planet

Malicious bots can be used to carry out a range of cyber threats like account takeovers and DDoS attacks, so bot protection is an increasingly important defense for web-facing assets. The main purpose of bot protection is to ensure the security and integrity of online systems as well as to prevent unfair or harmful activities such as spamming, click fraud, scraping, and credential stuffing.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Overcoming Federal Sector Compliance Regulation Challenges

Data Breach Today

The sheer volume of federal regulations in place makes it almost impossible for agencies to monitor and comply with all of them, much less understand the impact of new ones. Nick Graham of Skyhigh Security explores the many compliance challenges - and how to overcome them.

article thumbnail

Security Is a Revenue Booster, Not a Cost Center

Dark Reading

Focusing on what customers and partners need from a company can help CISOs show the real financial benefits of improving cybersecurity.

Security 106
article thumbnail

Will Other Countries Follow Italy's Ban of ChatGPT?

Data Breach Today

Attorney Jonathan Armstrong on Recent Ban, Legal Implications and ChatGPT Policies Italy's suspension of ChatGPT is part of a "wider campaign in Italy" to regulate the use of AI applications, said attorney Jonathan Armstrong of Cordery Compliance, who added that transparency, usage and the protection of intellectual property are major concerns with the new generative AI tool.

article thumbnail

Kodi discloses data breach after its forum was compromised

Security Affairs

Open-source media player software provider Kodi discloses a data breach after threat actors stole its MyBB forum database. Kodi has disclosed a data breach, threat actors have stolen the company’s MyBB forum database that contained data for over 400K users and private messages. The threat actors also attempted to sell the stolen data on the BreachForums cybercrime forum that was recently shut down by law enforcement. “In the last 24 hours we became aware of a dump of the Kodi user f

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Snyk Lays Off Another 128 Staffers as Economic Woes Persist

Data Breach Today

Third Round of Layoffs Comes 4 Months After Snyk Raised $196.5M on $7.4B Valuation Snyk has executed its third round of layoffs since June 2022, axing 128 workers amid projections of challenging market conditions persisting into early 2024. The Boston-based application security vendor revealed Thursday plans to reduce its more than 1,200-person staff by an estimated 11%.

Marketing 146
article thumbnail

Gaining an Advantage in Roulette

Schneier on Security

You can beat the game without a computer : On a perfect [roulette] wheel, the ball would always fall in a random way. But over time, wheels develop flaws, which turn into patterns. A wheel that’s even marginally tilted could develop what Barnett called a ‘drop zone.’ When the tilt forces the ball to climb a slope, the ball decelerates and falls from the outer rim at the same spot on almost every spin.

87
article thumbnail

Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

Dark Reading

The threat group behind the SolarWinds supply-chain attacks is back with new tools for spying on officials in NATO countries and Africa.

98
article thumbnail

Ivanti Policy Secure: NAC Product Review

eSecurity Planet

As a spinoff of the network infrastructure leader, Juniper Networks, Ivanti’s Policy Secure provides effective network access control built on a foundation of deep understanding of networks. However, with three rebrandings since 2014, many potential customers may not recognize the product as a long-tenured competitor in the NAC market. This article will explore the product in depth and explore the features, pros, cons, pricing, and other key aspects of Ivanti’s NAC solution.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement

Dark Reading

Detailing how extended IoT (xIoT) devices can be used at scale by attackers to establish persistence across networks and what enterprises should start doing about the risk.

IoT 84
article thumbnail

Google fixed the first Chrome zero-day of 2023

Security Affairs

Google released an emergency security update to address a zero-day vulnerability in Chrome which is actively exploited in the wild. Google released an emergency security update to address the first Chrome zero-day vulnerability (CVE-2023-2033) in 2023, the company is aware of attacks in the wild exploiting the issue. The vulnerability is a Type Confusion issue that resides in the JavaScript engine V8.

article thumbnail

Montana’s Looming TikTok Ban Is a Dangerous Tipping Point

WIRED Threat Level

The state is poised to be the first in the US to block downloads of the popular app, which could ignite a precarious chain reaction for digital rights.

article thumbnail

A cyberattack on the Cornwall Community Hospital in Ontario is causing treatment delays

Security Affairs

The Cornwall Community Hospital in Ontario, Canada, is under a cyber attack that is causing delays to scheduled and non-urgent care. A cyberattack on the Cornwall Community Hospital in Ontario, Canada, is causing delays to scheduled and non-urgent care. The cyber attack was discovered on Tuesday, April 11, 2023, it is investigating the incident with the help of cybersecurity experts. “On April 11, 2023, Cornwall Community Hospital (CCH) identified a network issue, which an investigation ha

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Revolutionizing the consumer goods industry with integrated business planning

IBM Big Data Hub

The world of business demands the right decisions to succeed. For Al Rabie —a prominent juice manufacturing company in the Middle East—their reality was no different. However, their manual planning and budgeting process in spreadsheets posed several challenges, including lack of control, delayed data, poor execution, and the need for continuous follow-up with IT for actual data.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking on “Cybersecurity Thinking to Reinvent Democracy” at RSA Conference 2023 in San Francisco, California, on Tuesday, April 25, 2023, at 9:40 AM PT. I’m speaking at IT-S Now 2023 in Vienna, Austria, on June 2, 2023 at 8:30 AM CEST. The list is maintained on this page.

article thumbnail

Bugs in Manarium Play-to-Earn Platform Showcase Crypto-Gaming Insecurity

Dark Reading

Researchers plug in winning scores to make off with NFTs without actually playing the GameFi platform's minigames.

78