Wed.May 22, 2024

article thumbnail

Anyone Can Trick AI Bots into Spilling Passwords

Data Breach Today

Thousands of People Tricked Bots into Revealing Sensitive Data in Lab Setting It doesn't take a skilled hacker to glean sensitive information anymore: all you need to trick a chatbot into spilling someone else's passwords is "creativity." In a multi-level test, nearly all participants were able to trick the chatbot into revealing a password on at least one level.

Passwords 289
article thumbnail

News alert: AI SPERA integrates its ‘Criminal IP’ threat intelligence tool into AWS Marketplace

The Last Watchdog

Torrance,Calif., May 22, 2024, CyberNewsWire — AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal IP , is now available on the AWS Marketplace. This integration ensures efficient software procurement and deployment, aligning seamlessly with customers’ existing cloud architectures.

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft's Recall Stokes Security and Privacy Concerns

Data Breach Today

K ICO Announces Probe Into Microsoft Screenshot Storage Feature Microsoft's new automatic screenshot retrieval feature could enable hackers to steal sensitive information such as online banking credentials, security experts warned. Additionally, the U.K. data regulator will probe Recall for compliance with privacy law.

Privacy 281
article thumbnail

Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech

WIRED Threat Level

Ultra-wideband radio has been heralded as the solution for “relay attacks” that are used to steal cars in seconds. But researchers found Teslas equipped with it are as vulnerable as ever.

IT 132
article thumbnail

Solving Open Source Complexity with a Managed Data Infrastructure Platform

With its unparalleled flexibility, rapid development and cost-saving capabilities, open source is proving time and again that it’s the leader in data management. But as the growth in open source adoption increases, so does the complexity of your data infrastructure. In this Analyst Brief developed with IDC, discover how and why the best solution to this complexity is a managed service, including: Streamlined compliance with some of the most complex regulatory guidelines Simplified operations, li

article thumbnail

Rockwell Automation Urges Disconnection of ICS from the Internet

Data Breach Today

Advisory Says Disconnecting ICS Reduces Exposure to Malicious Cyber Activities Rockwell Automation warned customers to disconnect industrial control systems from the internet, citing escalating cyber threats and rising global geopolitical tensions. Disconnecting these systems is a proactive measure to reduce the attack surface.

210
210

More Trending

article thumbnail

Chinese Cyber Espionage Groups Tied to ORB Network Attacks

Data Breach Today

Beijing's Tough-to-Track Mesh Networks Built Using Hacked Devices, Mandiant Warns Multiple Chinese cyber espionage groups, including Volt Typhoon, are using operational relay box networks, aka ORBs, built using leased proxy servers and compromised or end-of-life routers, to avoid detection and complicate efforts to track their activities, warns Google Cloud's Mandiant.

Cloud 176
article thumbnail

A consumer-grade spyware app found in check-in systems of 3 US hotels

Security Affairs

A researcher discovered a consumer-grade spyware app on the check-in systems of at least three Wyndham hotels across the US. The security researcher Eric Daigle discovered a commercial spyware app, called pcTattletale, on the check-in systems of at least three Wyndham hotels across the US, TechCrunch first reported. Parents often use the app to monitor their children’s online activities or by employers to keep track of employee productivity and internet usage.

Access 116
article thumbnail

LockBit Demands $25M Ransom from Canadian Drug Store Chain

Data Breach Today

Threatens to Leak Stolen Data; Attack Temporarily Shut Down Retail Pharmacy Stores LockBit cybercriminals demanded a $25 million ransom from Canadian pharmacy retail chain London Drugs following an attack detected in late April that forced the company to temporarily close its 79 stores across western Canada for more than a week.

Retail 167
article thumbnail

An ongoing malware campaign exploits Microsoft Exchange Server flaws

Security Affairs

A threat actor is targeting organizations in Africa and the Middle East by exploiting Microsoft Exchange Server flaws to deliver malware. Positive Technologies researchers observed while responding to a customer’s incident spotted an unknown keylogger embedded in the main Microsoft Exchange Server page. The keylogger was used to collect account credentials.

article thumbnail

Provide Real Value in Your Applications with Data and Analytics

The complexity of financial data, the need for real-time insight, and the demand for user-friendly visualizations can seem daunting when it comes to analytics - but there is an easier way. With Logi Symphony, we aim to turn these challenges into opportunities. Our platform empowers you to seamlessly integrate advanced data analytics, generative AI, data visualization, and pixel-perfect reporting into your applications, transforming raw data into actionable insights.

article thumbnail

OpenText Boosts MDR Offering for MSPs With Pillr Acquisition

Data Breach Today

Purchase Fills Gap in OpenText's Cyber Offering for Small and Mid-Sized Businesses OpenText has acquired Pillr to strengthen its managed detection and response capabilities for small and mid-sized businesses. The integration will provide managed service providers with advanced security solutions, addressing increasing cyber threats and expanding OpenText's security portfolio.

Security 157
article thumbnail

Announcing KnowBe4 Student Edition: Cybersecurity Education Tailored for the Next Generation

KnowBe4

I recently heard another heartbreaking story of students who were scammed out of financial aid by a phishing attack. We have also heard stories of employment scams and social media based attacks where students fell victim to cybercriminals.

Education 108
article thumbnail

Pakistani-Aligned APT36 Targets Indian Defense Organizations

Data Breach Today

Espionage Group Using Linux-based Espionage Tools to Nab Defense Secrets A politically motivated hacking group aligned with Pakistani interests is matching the Indian military's shift away from the Windows operating system with a heavy focus on malware encoded for Linux. BlackBerry observed the cyberespionage group targeting government agencies and the defense industry.

Military 157
article thumbnail

OmniVision disclosed a data breach after the 2023 Cactus ransomware attack

Security Affairs

The digital imaging products manufacturer OmniVision disclosed a data breach after the 2023 ransomware attack. OmniVision Technologies is a company that specializes in developing advanced digital imaging solutions. In 2023, OmniVision employed 2,200 people and had an annual revenue of $1.4 billion. OmniVision Technologies Inc. is an American subsidiary of Chinese semiconductor device and mixed-signal integrated circuit design house Will Semiconductor.

article thumbnail

Entity Resolution: Your Guide to Deciding Whether to Build It or Buy It

Adding high-quality entity resolution capabilities to enterprise applications, services, data fabrics or data pipelines can be daunting and expensive. Organizations often invest millions of dollars and years of effort to achieve subpar results. This guide will walk you through the requirements and challenges of implementing entity resolution. By the end, you'll understand what to look for, the most common mistakes and pitfalls to avoid, and your options.

article thumbnail

Unfading Sea Haze APT Targeting South China Sea Governments

Data Breach Today

Bitdefender Exposes Unfading Sea Haze's Advanced Cyberespionage Tactics A previously undetected, suspected Chinese-state threat actor has been targeting governments in the South China Sea for years with a remote access Trojan that has been a favorite of Chinese hackers since its creation almost two decades ago, say security researchers from Bitdefender.

article thumbnail

Malicious Use of Generative AI Large Language Models Now Comes in Multiple Flavors

KnowBe4

Analysis of malicious large language model (LLM) offerings on the dark web uncovers wide variation in service quality, methodology and value – with some being downright scams.

Security 101
article thumbnail

Proof of Concept: Ensuring AI Compliance, Security Controls

Data Breach Today

Panelists Troy Leach and Avani Desai on AI Organizational and Regulatory Challenges In the latest "Proof of Concept," Troy Leach of CSA and Avani Desai of Schellman discussed integrating AI into organizational frameworks. They highlighted the evolving roles of compliance and leadership and the importance of regulatory frameworks in ensuring robust and trustworthy AI deployment.

article thumbnail

ICO Publishes Its Strategic Approach to Regulating AI

Data Matters

On 30 April 2024, the UK’s Information Commissioner’s Office (“ICO”) published its strategic approach to regulating artificial intelligence (“AI”) (the “Strategy”), following the UK government’s request that key regulators set out their approach to AI regulation and compliance with the UK government’s previous AI White Paper (see our previous blog post here).

article thumbnail

Deliver Mission Critical Insights in Real Time with Data & Analytics

In the fast-moving manufacturing sector, delivering mission-critical data insights to empower your end users or customers can be a challenge. Traditional BI tools can be cumbersome and difficult to integrate - but it doesn't have to be this way. Logi Symphony offers a powerful and user-friendly solution, allowing you to seamlessly embed self-service analytics, generative AI, data visualization, and pixel-perfect reporting directly into your applications.

article thumbnail

Critical Veeam Backup Enterprise Manager authentication bypass bug

Security Affairs

A critical security vulnerability in Veeam Backup Enterprise Manager could allow threat actors to bypass authentication. A critical vulnerability, tracked as CVE-2024-29849 (CVSS score: 9.8), in Veeam Backup Enterprise Manager could allow attackers to bypass authentication. Veeam Backup Enterprise Manager is a centralized management and reporting tool designed to simplify the administration of Veeam Backup & Replication environments.

article thumbnail

How to find out if an AirTag is tracking you

Collaboration 2.0

Apple's handy trackers have been used to track people's location against their consent, but there's a way to determine if an AirTag is tracking you. Here's what to know.

98
article thumbnail

Don't Let Criminals Steal Your Summer Fun

KnowBe4

Summer has finally arrived in certain parts of the world, and with it come many exciting events — from the grandeur of the Olympics to the grass courts of Wimbledon, from the electrifying performances of Taylor Swift to the many other concerts that light up the season.

IT 90
article thumbnail

Navigating GDPR Compliance with CIAM: A Quick Guide

Thales Cloud Protection & Licensing

Navigating GDPR Compliance with CIAM: A Quick Guide andrew.gertz@t… Wed, 05/22/2024 - 16:13 Identity & Access Management Access Control Compliance GDPR Wouter de Wit | Senior Product Manager, Thales More About This Author > In 2018, the implementation of the General Data Protection Regulation ( GDPR ) shook up the landscape of data handling across the European Union.

GDPR 62
article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

UK Cybersecurity Org Offers Advice for Thwarting BEC Attacks

KnowBe4

The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organizations defend themselves against business email compromise (BEC) attacks, especially those targeting senior staff members.

article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

Counting Down to the EU NIS2 Directive madhav Thu, 05/23/2024 - 05:16 Our recently released 2024 Data Threat Report showed a direct correlation between compliance and cyber security outcomes. 84% of organizations that failed a compliance audit reported having a data breach in their history. By contrast, for those that passed compliance audits, only 21% have a breach history.

article thumbnail

CILIP welcomes General Election call

CILIP

Looking for opportunities A general election has been called by Prime Minister Rishi Sunak, with a date set for 4 July. The election will give voters across the country the chance to have their say at the ballot box as they decide on a new government. Whatever the outcome of the 4 July vote, there is guaranteed to be a huge number of new MPs entering the House of Commons for the first time.

article thumbnail

OpenText sets its sights on the Payments Canada Summit 2024 

OpenText Information Management

We are excited to be a lead sponsor at the 2024 Payments Canada Summit! As we prepare for one of the most important events in payments, we understand that the financial services industry is undergoing significant changes, driven by standards like ISO 20022 and the rapid adoption of artificial intelligence. That's why we’re committed to leading the discussion on these critical topics at The Summit.

article thumbnail

Using Data & Analytics for Improving Healthcare Innovation and Outcomes

In the rapidly evolving healthcare industry, delivering data insights to end users or customers can be a significant challenge for product managers, product owners, and application team developers. The complexity of healthcare data, the need for real-time analytics, and the demand for user-friendly interfaces can often seem overwhelming. But with Logi Symphony, these challenges become opportunities.

article thumbnail

Unredacting Pixelated Text

Schneier on Security

Experiments in unredacting text that has been pixelated.

102
102
article thumbnail

How to use Windows Quick Assist for tech support - and why it's better than Remote Desktop

Collaboration 2.0

Whether you need to give or receive technical help, here's how to make the most of the Quick Assist tool in Windows 10 and 11.

IT 75
article thumbnail

To dream like a human? Creative reflections on the age of AI

CILIP

Looking for opportunities By Matt Finch ( @drmattfinch ), writer and consultant who specialises in strategy, foresight, and innovation work with institutions worldwide. See more here. AUSTRALIA’S Peter Miller, aka Scribbletronics. has been working with digital art for two decades. It’s a long way from his early days, tinkering with mathematical rules to generate procedural images, but Peter’s approach has evolved for the age of Midjourney, DALL-E, et al.