Mon.Apr 24, 2023

article thumbnail

ITRC: Lack of Details in Data Breach Notices on the Rise

Data Breach Today

James E. Lee Shares 2023 Q1 Data Breach Report Highlights According to findings from the Identity Theft Resource Center's 2023 Q1 Data Breach Report, the number of publicly reported data compromises decreased, but the number of data breaches with no actionable information about the root cause of the compromise grew.

article thumbnail

Announcing OpenText Cloud Editions (CE) 23.2

OpenText Information Management

As information expands exponentially, it is becoming more complex and extensive than ever before. To remain competitive, organizations must explore new ways of harnessing information – to not only power and protect it – but to innovate, ramp up growth, and increase speed to market. Since the acquisition of Micro Focus 90 days ago, OpenText … The post Announcing OpenText Cloud Editions (CE) 23.2 appeared first on OpenText Blogs.

Cloud 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Deputy AG: Aiding Victims Takes Precedence Over Arrests

Data Breach Today

Lisa Monaco Says Justice Department Values Stopping Cybercrime Over Court Victories The United States' second-highest-ranking prosecutor said the Department of Justice has pivoted its security strategy from pursuing courtroom victories to preventing and disrupting cybercrime. Lisa Monaco said Justice officials now embrace that put victims at the center of its cybercrime response.

Security 244
article thumbnail

UK Threatens End-to-End Encryption

Schneier on Security

In an open letter , seven secure messaging apps—including Signal and WhatsApp—point out that the UK’s Online Safety Bill could destroy end-to-end encryption: As currently drafted, the Bill could break end-to-end encryption,opening the door to routine, general and indiscriminate surveillance of personal messages of friends, family members, employees, executives, journalists, human rights activists and even politicians themselves, which would fundamentally undermine everyone’s ab

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ISMG Editors: Opening Day Overview of RSA Conference 2023

Data Breach Today

Emerging AI Tech, Identity Concerns and Latest Threats Are Among the Hot Topics ISMG editors are live at RSA Conference 2023 in San Francisco with an overview of opening-day speakers and hot topics including the emergence of AI, the latest intel on nation-state threats, security product innovation and deals, and ransomware trends. Join us for daily updates from RSA.

More Trending

article thumbnail

US Indicts Chinese National for Laundering DPRK Crypto

Data Breach Today

OFAC Adds Men to List of Specially Designated Nationals and Blocked Persons A Chinese and a Hong Kong national are each under U.S. federal indictment for their roles in channeling cryptocurrency stolen by North Korean hackers into hard currency. Prosecutors also indicted a North Korean man for representing the sanctioned Korea Kwangson Banking Corp.

144
144
article thumbnail

Rethinking Safer AI: Can There Really Be a 'TruthGPT'?

Dark Reading

Is Elon Musk's "maximum truth-seeking AI" achievable? Overcoming bias in artificial technologies is crucial for cybersecurity, but doing it could be a challenge.

article thumbnail

Most Common Connected Devices That Pose Risk to Hospitals

Data Breach Today

Study: Unpatched Nurse Call Systems, Printers and IP Cameras Top the List Nurse call systems present a top cybersecurity risk in clinical environments, but so do an array of other similarly connected nonmedical devices commonly found in healthcare settings, says a new research study by security vendor Armis.

Risk 144
article thumbnail

AuKill tool uses BYOVD attack to disable EDR software

Security Affairs

Ransomware operators use the AuKill tool to disable EDR software through Bring Your Own Vulnerable Driver (BYOVD) attack. Sophos researchers reported that threat actors are using a previously undocumented defense evasion tool, dubbed AuKill, to disable endpoint detection and response (EDR) software. The tool relies on the Bring Your Own Vulnerable Driver ( BYOVD ) technique to disable the EDR.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Another Perspective on ChatGPT's Social Engineering Potential

KnowBe4

We’ve had occasion to write about ChatGPT’s potential for malign use in social engineering , both in the generation of phishbait at scale and as a topical theme that can appear in lures. We continue to track concerns about the new technology as they surface in the literature.

article thumbnail

Experts released PoC Exploit code for actively exploited PaperCut flaw

Security Affairs

Threat actors are exploiting PaperCut MF/NG print management software flaws in attacks in the wild, while researchers released PoC exploit code. Hackers are actively exploiting PaperCut MF/NG print management software flaws (tracked as CVE-2023-27350 and CVE-2023-27351 ) in attacks in the wild. The threat actors were observed installing the Atera remote management software to take over vulnerable servers.

article thumbnail

Qwiet AI Builds a Neural Net to Catch Coding Vulnerabilities

Dark Reading

Code property graphs and a threat feed powered by artificial narrow intelligence help developers incorporate AppSec into DevOps.

105
105
article thumbnail

Hackers can hack organizations using data found on their discarded enterprise network equipment

Security Affairs

ESET researchers explained that enterprise network equipment that was discarded, but not destroyed, could reveal corporate secrets. ESET researchers purchased a few used routers to set up a test environment and made a shocking discovery, in many cases, previously used configurations had not been wiped. The experts pointed out that the data they found on the devices could be used to identify the prior owners, this information can be used by threat actors to breach their networks. “Results r

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed

eSecurity Planet

Aqua Security’s cloud security research team recently found thousands of registries and artifact repositories exposed online, revealing more than 250 million artifacts and over 65,000 container images. The registries and repositories belonged to a wide range of companies, including 10 members of the Fortune 500 and two leading cybersecurity providers. “In some of these cases, anonymous user access allowed a potential attacker to gain sensitive information, such as secrets, keys, and

article thumbnail

EvilExtractor, a new All-in-One info stealer appeared on the Dark Web

Security Affairs

EvilExtractor is a new “all-in-one” info stealer for Windows that is being advertised for sale on dark web cybercrime forums. Fortinet FortiGuard Labs researchers discovered a new “all-in-one” info stealer for Windows, dubbed EvilExtractor (sometimes spelled Evil Extractor) that is available for sale on dark web cybercrime forums.

article thumbnail

Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

WIRED Threat Level

To protect its Confidential Computing cloud infrastructure and gain critical insights, Google leans on its relationships with chipmakers.

Cloud 93
article thumbnail

Russian cybercrime group likely behind ongoing exploitation of PaperCut flaws

Security Affairs

Print management software provider PaperCut confirmed ongoing active exploitation of CVE-2023-27350 vulnerability. On April 19th, Print management software provider PaperCut confirmed that it is aware of the active exploitation of the CVE-2023-27350 vulnerability. The company received two vulnerability reports from the cybersecurity firm Trend Micro ) for high/critical severity security issues in PaperCut MF/NG.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Millions of Artifacts, Misconfigured Enterprise Software Registries Are Ripe for Pwning

Dark Reading

Researchers find 250 million artifacts and 65,000 container images exposed in registries and repositories scattered across the Internet.

93
article thumbnail

Compliance Updates for Employer’s use of Automated Decisionmaking Tools: New York City Finalizes Rules on Automated Employment Decision Tools and Sets Enforcement Date for July 5, 2023, Upcoming California Regulations, and Federal Guidance

Data Matters

Employers in New York City may soon be subject to a new law, Local Law 144 , that regulates employers’ use of automated employment decision tools (“AED tools” or “AEDT”) – software and other programs used to make decisions about who to hire, who to promote and other employment decisions. Local Law 144, the first of its kind law regulating these AED tools, was originally supposed to go into effect on January 1, 2023; however, because needed regulatory guidance had not been issued, the effective

article thumbnail

SPanel: Taking Website Security to the Next Level

eSecurity Planet

Cybercrime has skyrocketed in the last few years, and the websites of small and medium-sized companies have been the most frequent target of web attacks. The statistics are sobering: Small businesses report substantial downtime and lost data and business from those cyberattacks, and fewer than 30% are able to recover from a cyberattack within eight hours.

article thumbnail

Critical Infrastructure Organizations Further Affected in 3CX Breach

Dark Reading

As investigations continue, researchers find confirmation in their suspicions of a sprawling attack affecting multiple organizations.

81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Sharing a reliable sustainability podcast

IBM Big Data Hub

I want to introduce you to the second season of my podcast, Making of the SRE Omelette. This season explores achieving our sustainability goals via the practice of Site Reliability Engineering. “Culture is the outcome of what we do. In the context of The Chicken or The Egg, it is like an Omelette.” – Kareem Yusuf, SVP IBM Software Wondering what does an Omelette has to do with SRE?

IT 66
article thumbnail

ZeroFox to Acquire LookingGlass, Broadening Global Attack Surface Intelligence Capabilities

Dark Reading

Deal strengthens ZeroFox's External Cybersecurity Platform with attack surface management (EASM) and threat intelligence capabilities.

article thumbnail

Cut cloud waste and control cloud spending with OpenText FinOps

OpenText Information Management

Foster a culture of financial responsibility, improve decision-making with intelligent insights, and deliver the centralized control you need to tame your cloud bill. OpenText Hybrid Cloud Management X (HCMX) FinOps Express is a cloud financial management solution that helps organizations cut cloud waste and control cloud spending. With about $500 billion being spent on cloud … The post Cut cloud waste and control cloud spending with OpenText FinOps appeared first on OpenText Blogs.

Cloud 57
article thumbnail

Tangled Up: 'Tomiris' APT Uses Turla Malware, Confusing Researchers

Dark Reading

Researchers are unraveling the threads connecting two separate, but in some ways overlapping, Russian-language APTs.

78
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Work smarter with content insights

OpenText Information Management

Content services platforms must support document management, automate business processes, enable information governance and facilitate collaboration between employees and external stakeholders to support an organization’s modern work strategy. But as Forrester notes, “AI and machine learning (ML) still have the potential to add more value to content management use cases,” including automated data extraction and … The post Work smarter with content insights appeared first on OpenText Blogs.

article thumbnail

Google Workspace Extends Enterprise-Grade Security and Device Management for Hybrid Work With Okta and VMware

Dark Reading

JumpCloud integrates with Google Workspace to extend enterprise-quality security capabilities to small and midsize organizations.

article thumbnail

Warehouse 4.0

RFID Global Solution, Inc.

Warehouse management has evolved significantly over the years. The industry is rapidly moving towards what is being labeled “Warehouse 4.0”, driven by the latest advancements in software automation and robotics. Two robots from Boston Dynamics stand out among the rest – Stretch and Atlas. These robots have the potential to revolutionize the way warehouses are … Warehouse 4.0 Read More » The post Warehouse 4.0 appeared first on RFID Global Solution.

52