Fri.Apr 05, 2024

article thumbnail

Hackers Can Use AI Hallucinations to Spread Malware

Data Breach Today

A Fake Software Library Made Up by a ChatBot Was Downloaded More Than 35,000 Times Generative artificial intelligence is good at sounding authoritative - even when it's making stuff up. One community that thinks so-called AI hallucinations are actually a good thing: hackers. Especially when developers use AI tools that hallucinate entire software libraries.

article thumbnail

Magento flaw exploited to deploy persistent backdoor hidden in XML

Security Affairs

Threat actors are exploiting critical Magento vulnerability CVE-2024-20720 to install a persistent backdoor on e-stores. Sansec researchers observed threat actors are exploiting the recently disclosed Magento vulnerability CVE-2024-20720 to deploy a persistent backdoor on e-stores. The vulnerability CVE-2024-20720 (CVSS score of 9.1) is an OS Command (‘OS Command Injection’) vulnerability that could lead to arbitrary code execution.

CMS 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sophisticated Latrodectus Malware Linked to 2017 Strain

Data Breach Today

New Malware With Ties to IcedID Loader Evades Detection, Gains Persistence Security researchers are warning about a relatively new malware called Latrodectus, believed to be an evolutionary successor to the IcedID loader. It has been detected in malicious email campaigns since November 2023, and recent enhancements make it harder to detect and mitigate.

Security 309
article thumbnail

FinCEN Seeks Input on Banks’ Collecting Partial Social Security Numbers for Customer Identification Programs

Data Matters

On March 28, 2024, the Financial Crimes Enforcement Network (FinCEN), in consultation with the U.S. banking agencies and the National Credit Union Administration, issued a request for information (RFI) regarding the customer identification program (CIP) requirement for depository institutions (referred to herein as banks) to collect tax identification numbers (TINs). 1 Comments are due by May 28, 2024.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cloudflare Enters Observability Space With Baselime Purchase

Data Breach Today

Acquiring Baselime Will Give Developers Better Visibility Into Serverless Platforms Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.

306
306

More Trending

article thumbnail

Vietnamese Threat Actor Targeting Financial Data Across Asia

Data Breach Today

CoralRaider Looks for Social Media Accounts That Contain Payment Information Vietnamese financially motivated hackers are targeting businesses across Asia in a campaign to harvest corporate credentials and financial data for resale in online criminal markets. Researchers at Cisco Talos identified a cluster of hacking activity its tracks as CoralRaider.

Marketing 288
article thumbnail

Cyberattack disrupted services at Omni Hotels & Resorts

Security Affairs

US hotel chain Omni Hotels & Resorts suffered a cyber attack that forced the company to shut down its systems. A cyberattack hit Omni Hotels & Resorts disrupting its services and forcing the company to shut down its systems. Since Friday, March 29, Omni Hotels & Resorts has been responding to a cyberattack on its systems. Upon learning of this issue, Omni immediately took steps to shut down its systems to protect and contain its data.

Paper 94
article thumbnail

China Is Using AI to Influence Elections, Microsoft Warns

Data Breach Today

Chance of AI-Generated Content Affecting Results Appears to Remain Low - for Now China-backed attackers are continuing to refine their use of content generated using artificial intelligence tools, including audio deepfakes and video news anchors, to sow disruption and influence elections in the U.S., Taiwan, India and beyond, security researchers at Microsoft warn.

article thumbnail

Microsoft’s new era of AI PCs will need a Copilot key, says Intel via The Verge

IG Guru

Check out the article here. The post Microsoft’s new era of AI PCs will need a Copilot key, says Intel via The Verge first appeared on IG GURU.

Risk 78
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ISMG Editors: Breaking Down OT Cybersecurity Challenges

Data Breach Today

Also: Implications of a Critical Linux Utility Backdoor; Focus on Cloud Security In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.

article thumbnail

How Pick n Pay plans to transform software test cases with AI

OpenText Information Management

Headquartered in Cape Town, South Africa, Pick n Pay is a leading retailer that operates more than 1,650 stores in seven countries on the African continent. While we continue to grow our physical footprint, online and mobile shopping are increasingly popular channels for our customers. Alongside our standard home delivery services, we recently launched the ASAP!

Retail 67
article thumbnail

Medical Device Cyberthreat Modeling: Top Considerations

Data Breach Today

Besides not doing cyberthreat modeling at all, some the biggest mistakes medical device manufacturers can make are starting the modeling process too late in the development phase or using it simply as a "paper weight exercise," said threat modeling expert Adam Shostack of Shostack & Associates.

article thumbnail

The convergence of HPC and AI: Driving innovation at speed  

IBM Big Data Hub

In today’s rapidly changing landscape, delivering higher-quality products to the market faster is essential for success. Many industries rely on high-performance computing (HPC) to achieve this goal. Enterprises are increasingly turning to generative artificial intelligence (gen AI) to drive operational efficiencies, accelerate business decisions and foster growth.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Friday Squid Blogging: SqUID Bots

Schneier on Security

They’re AI warehouse robots. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

An integrated asset management data platform

IBM Big Data Hub

Part 2 of this four-part series discusses the complex tasks energy utility companies face as they shift to holistic grid asset management to manage through the energy transition. The first post of this series addressed the challenges of the energy transition with holistic grid asset management. In this part, we discuss the integrated asset management platform and data exchange that unite business disciplines in different domains in one network.