Tue.Mar 05, 2024

article thumbnail

How to Improve Health Data Breach Response Planning

Data Breach Today

Experts Offer Tips for Ironing Out Common Kinks in Incident Response The healthcare sector should have plenty of experience responding to data security incidents and breaches, especially in light of the record number of breaches reported last year. But when leaders are dealing with an incident, response plans can go awry. Experts offer tips for avoiding mishaps.

article thumbnail

Polishing Rough Diamonds: How Information Governance Boosts AI-Driven Innovation

AIIM

With AI-centric use cases expanding to extract value from both physical and digital assets, it’s time to see information governance as a way to accelerate innovation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A New Self-Spreading, Zero-Click Gen AI Worm Has Arrived!

Data Breach Today

Researchers Created Worm That Can Exfiltrate Data, Spread Spam and Poison AI Models Researchers have created a zero-click, self-spreading worm that can steal personal data through applications that use chatbots powered by generative artificial intelligence. Dubbed Morris II, the malware uses a prompt injection attack vector to trick AI-powered email assistant apps.

article thumbnail

Apple emergency security updates fix two new iOS zero-days

Security Affairs

Apple released emergency security updates to address two new iOS zero-day vulnerabilities actively exploited in the wild against iPhone users. Apple released emergency security updates to address two iOS zero-day vulnerabilities, respectively tracked as CVE-2024-23225 and CVE-2024-23296, that were exploited in attacks against iPhone devices. CVE-2024-23225 is a Kernel memory corruption flaw, the company addressed it with improved validation. “An attacker with arbitrary kernel read and writ

Security 132
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Axonius Raises $200M, Aims to Guard More Asset Types Via M&A

Data Breach Today

Firm Maintains $2.6B Valuation in Series E Extension Round Amid Economic Headwinds A startup led by an Israeli intelligence veteran hauled in $200 million to pursue acquisitions that will allow for the protection of more asset types. The money will allow Axonius to better use existing data and build on its recent expansion to safeguard SaaS applications and installed software.

IT 278

More Trending

article thumbnail

BlackCat Ransomware Group 'Seizure' Appears to Be Exit Scam

Data Breach Today

Affiliate Claims Administrators Kept All $22 Million Paid by Change Healthcare The administrators of the BlackCat ransomware-as-a-service group claim law enforcement has shut down their operation. But experts and affiliates accuse the group's leadership of running an exit scam on the heels of a $22 million ransom payment by a recent victim - Optum's Change Healthcare unit.

article thumbnail

Experts disclosed two severe flaws in JetBrains TeamCity On-Premises software

Security Affairs

Two new security flaws in JetBrains TeamCity On-Premises software can allow attackers to take over affected systems. Rapid7 researchers disclosed two new critical security vulnerabilities, tracked as CVE-2024-27198 (CVSS score: 9.8) and CVE-2024-27199 (CVSS score:7.3), in JetBrains TeamCity On-Premises. An attacker can exploit the vulnerabilities to take control of affected systems.

article thumbnail

Hornetsecurity Buys Vade to Fuel Strength in France, Germany

Data Breach Today

Joint Hornetsecurity-Vade Will Have More Geographic Reach, Microsoft 365 Protection Hornetsecurity purchased French email security vendor Vade to expand its geographic footprint and protection capabilities around Microsoft 365 for small and midsized businesses. The acquisition of Vade will allow the joint company to have a strong presence in Europe's two most important markets.

Marketing 277
article thumbnail

CISA ADDS MICROSOFT WINDOWS KERNEL BUG USED BY LAZARUS APT TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft Windows Kernel vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the CVE-2024-21338 (CVSS Score 7.8) Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.

IT 118
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CrowdStrike to Buy Israeli Data Defense Vendor Flow Security

Data Breach Today

Data Security Posture Management Deal Will Help CrowdStrike Guard Endpoints, Clouds CrowdStrike plans to purchase a data security posture management startup led by an Israeli Defense Forces team leader to safeguard information across endpoints and clouds. The proposed Flow Security deal will give CrowdStrike visibility into cloud data flows and how data interacts with applications.

Security 276
article thumbnail

The Insecurity of Video Doorbells

Schneier on Security

Consumer Reports has analyzed a bunch of popular Internet-connected video doorbells. Their security is terrible. First, these doorbells expose your home IP address and WiFi network name to the internet without encryption, potentially opening your home network to online criminals. […] Anyone who can physically access one of the doorbells can take over the device—no tools or fancy hacking skills needed.

article thumbnail

George Kurtz: There's a Difference Between Price, Total Cost

Data Breach Today

Palo Alto Offering Free Products Won't Neutralize CrowdStrike's Cost Advantage: CEO CEO George Kurtz said Palo Alto Networks' strategy of offering free products won't neutralize CrowdStrike's advantage around total cost of ownership. Customers are smart enough to recognize the different between the price of a product and the total lifetime cost of operating inferior technology.

273
273
article thumbnail

US Gov sanctioned Intellexa Consortium individuals and entities behind Predator spyware attacks

Security Affairs

The U.S. government sanctioned two individuals and five entities linked to the development and distribution of the Predator spyware used to target Americans. Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced actions on two individuals and five entities associated with the Intellexa Consortium for their role in the development and distribution of the commercial Predator spyware used to target Americans.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

JetBrains' TeamCity Bugs Could Lead to Server Takeover

Data Breach Today

Users Advised to Prioritize Patching for Publicly Known Flaws, Exploit Two critical vulnerabilities affecting all on-premises versions of TeamCity servers can result in authentication bypass and path traversal, enabling an attacker to gain administrative privileges for a server and take it over. Users should prioritize patching now that the exploit is public.

article thumbnail

How the European Union’s Digital Markets Act impacts your iOS estate

Jamf

Launching alongside iOS 17.4, Apple will be making changes to adhere to the European Union’s Digital Markets Act, which could have massive implications for your organization’s end users and the security of their devices.

Marketing 111
article thumbnail

How NOT to Lead

Data Breach Today

Leaders in cybersecurity - and in any other business - need to keep a bank account filled with the trust and respect of their employees and make sure that account stays in the black, said Chase Cunningham, aka the Doctor of Zero Trust. He discussed his new book on how to be a good leader.

article thumbnail

Inside Registered Agents Inc., the Shadowy Firm Pushing the Limits of Business Privacy

WIRED Threat Level

Registered Agents Inc. has for years allowed businesses to register under a cloak of anonymity. A WIRED investigation has found that its secretive founder has taken the practice to an extreme.

Privacy 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Germany Rules Out Russian Hack in Military Data Leak

Data Breach Today

Defense Minister Pistorius Says Leak Caused by Webex 'Application Error' German Minister of Defense Boris Pistorius on Tuesday said the recent leak of intercepted military data was the result of an "application error" and not caused by a system compromise by Russian hackers. Pistorius also said the country is continuing to examine the incident further.

Military 252
article thumbnail

Global Data Breaches and Cyber Attacks in February 2024 – 719,366,482 Records Breached

IT Governance

IT Governance’s research found the following for February 2024: 712 publicly disclosed security incidents. 719,366,482 records known to be breached. After January’s 29.5 billion records breached, following the MOAB (mother of all breaches) , 719 million records for this month seems comparatively small. The number of records breached is also small compared to January’s numbers excluding the MOAB – 3,530,829,011 known records breached.

article thumbnail

Phishers Abusing Legitimate but Neglected Domains To Pass DMARC Checks

KnowBe4

A recent great article by BleepingComputer about domain hijacking and DMARC abuse reminded me that many companies and people do not understand DMARC well enough to understand what it does and how it helps to prevent phishing.

article thumbnail

Data Archiving Defined

Record Nations

Every bit and byte holds significance within your physical and digital business data. Data archiving is essential for maintaining regulatory compliance, preserving historical records, optimizing costs, mitigating risks, and improving operational efficiency. It ensures that organizations can effectively manage their data assets while safeguarding their integrity and accessibility for future use.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Microsoft and OpenAI Team Up to Block Threat Actor Access to AI

KnowBe4

Research on analysis of emerging threats in the age of AI has been released giving insight into exactly how these gangs are leveraging AI to advance.

Access 96
article thumbnail

College Board Agrees to Settle with the New York Attorney General Over Student Data Privacy

Hunton Privacy

On February 13, 2024, New York Attorney General (“NY AG”) Letitia James and New York State Education Department Commissioner (“NYSED”) Betty A. Rosa announced that College Board has agreed to settle charges in connection with allegations that it violated New York Education Law § 2-d, New York’s student privacy law. College Board is a New York-based nonprofit that administers standardized tests to high school students as part of the college admissions process, develops college readiness programs

article thumbnail

Phishing Kit Targets the FCC and Crypto Exchanges

KnowBe4

Researchers at Lookout have discovered a sophisticated phishing kit that’s targeting employees at the US Federal Communications Commission (FCC), as well as employees of cryptocurrency exchanges Binance and Coinbase.

article thumbnail

CILIP Pathways Turns Four

CILIP

CILIP Pathways Turns Four Zoe and Sheila recently completed their apprenticeships assessed by CILIP Pathways. CILIP Pathways was launched four years ago today, and this year also celebrates becoming the end-point assessment organisation (EPAO) for assessing the Level 7 Archives and Records Manager standard. CILIP Pathways provides quality assessment services for apprenticeships, and is staffed by experts in the library, information and knowledge sector and has a team of qualified independent ass

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Combat content sprawl with cloud content management

OpenText Information Management

The rapid growth of Microsoft® Teams within enterprises has led to unparalleled growth in content, with numerous Teams sites creating data duplication, document redundancy, and version control issues. As a result, content sprawl has become quite real quite quickly, creating governance challenges, user frustration, and productivity dips with content located across channels, chats, and emails. … The post Combat content sprawl with cloud content management appeared first on OpenText Blogs.

Cloud 57
article thumbnail

Join us for the 2024 SAA Records Management Virtual Colloquium! April 9th, 3-4:30pm

The Schedule

Join us for the annual Records Management Colloquium (virtual)! Register here. This year we will be highlighting two leaders in information management (and two wonderful humans) as they reflect on digital preservation and email archiving and their relationships to records management: Christopher Prom , author of The Future of Email Archives and Trevor Owens , author of The Theory and Craft of Digital Preservation.

article thumbnail

What are your competitors doing this year?

OpenText Information Management

Application delivery management (ADM) plays a pivotal role in ensuring the seamless deployment, monitoring, and optimization of software applications. We’re well into 2024, and we can see the ADM field is poised for significant transformations, fueled by emerging technologies, evolving market demands, and heightened consumer expectations. Let’s dive into what we can anticipate in the … The post What are your competitors doing this year?