Mon.Jul 10, 2023

article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure. Related: Using ‘Big Data’ to improve health and well-being But there’s yet another towering technology mountain to climb: we must also overcome the limitations of Moore’s Law. After 30 years, we’ve reached the end of Moore’s Law , which states that the number of transistors on a silicon-based semiconductor chip doubles approximately eve

article thumbnail

Ukrainian Agencies, NATO Targeted With RATs Ahead of Summit

Data Breach Today

Attackers Using RomCom, PicassoLoader and njRAT Malware to Steal Credentials The threat actor behind the remote access Trojan called RomCom RAT and other pro-Russian groups are targeting Ukrainian agencies and allies ahead of the NATO Summit this week in Vilnius, Lithuania, using weaponized Microsoft documents and typosquatting techniques to deliver the malware.

Access 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

Aachen, Germany, July 10, 2023 – Utimaco , a leading global provider of IT security solutions that is celebrating its 40th year pioneering trusted cybersecurity and compliance solutions and services to customers across the globe, has released a new whitepaper, ‘ Circles of Trust 2023: Exploring Consumer Trust in the Digital Society ’, that takes a deep look at how consumers view trust in an increasingly digital world.

IoT 189
article thumbnail

TPG to Buy Forcepoint's Government Security Unit for $2.45B

Data Breach Today

Deal Comes 30 Months After PE Arm Francisco Bought All of Forcepoint for Just $1.1B Francisco Partners plans to split Forcepoint's government and commercial security practices, selling the former to TPG for $2.45 billion. The deal represents an impressive return on investment for Francisco Partners, which bought all of Forcepoint from Raytheon in January 2021 for just $1.1 billion.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign

Dark Reading

An attack involves a multi-stage infection chain with custom malware hosted on Amazon EC2 that ultimately steals critical system and browser data; so far, targets have been located in Latin America.

113
113

More Trending

article thumbnail

BREAKING: EU Commission Adopts EU-U.S. Data Privacy Framework Adequacy Decision

Hunton Privacy

On July 10, 2023, the European Commission formally adopted a new adequacy decision on the EU-U.S. Data Privacy Framework (the “Adequacy Decision”). The adoption of this Adequacy Decision follows years of intense negotiations between the EU and the U.S., after the invalidation of the EU-U.S. Privacy Shield by the Court of Justice of the European Union (“CJEU”) in the Schrems II case.

article thumbnail

HCA Says Up to 11M Patients Affected by Email Data Hack

Data Breach Today

Hospital Chain Notifies SEC, Says Incident Not Likely to Affect Financials Information on up to 11 million patients of hospital chain HCA Healthcare is up for sale on a dark web forum. HCA Healthcare on Monday confirmed an incident involving data theft from an external location used to automate the formatting of email messages but said it is still investigating.

Sales 109
article thumbnail

Deepfake Quantum AI Investment Scam Pops Up on Facebook

Dark Reading

A consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims.

109
109
article thumbnail

RomCom RAT attackers target groups supporting NATO membership of Ukraine

Security Affairs

Threat actors are targeting NATO and groups supporting Ukraine in a spear-phishing campaign distributing the RomCom RAT. On July 4, the BlackBerry Threat Research and Intelligence team uncovered a spear phishing campaign aimed at an organization supporting Ukraine abroad. The researchers discovered two lure documents submitted from an IP address in Hungary, both targeting upcoming NATO Summit guests who are providing support to Ukraine.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Job Recruitment Scams Rising Due to Social Engineering

KnowBe4

Job scams are a rising form of socially engineered cybercrime. And while it’s easy to imagine the trouble they cause individuals who innocently fall for them (lost opportunities, identity theft, financial loss, and so on) this form of fraud also affects businesses.

85
article thumbnail

The Quiet Rise of Real-Time Crime Centers

WIRED Threat Level

Cities across the US have established RTCCs that police say protect the rights of innocent people, but critics warn of creeping surveillance.

Privacy 94
article thumbnail

Amazon Prime Day Draws Out Cyber Scammers

Dark Reading

Cybercriminals lining up to score off Amazon Prime Day shoppers, who spent more than $22B in US online sales alone last year, according to estimates.

Sales 90
article thumbnail

Australia’s National Anti-Scam Centre: Prevention Is Better Than the Cure

KnowBe4

Australia officially launched their National Anti-Scam Centre this week. With more than AUD $3.1 billion lost each year , Australians need support.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Zero Trust Keeps Digital Attacks From Entering the Real World

Dark Reading

Amid IT/OT convergence, organizations must adopt an "assume breach" mindset to stop bad actors and limit their impact.

IT 82
article thumbnail

Experts released PoC exploit for Ubiquiti EdgeRouter flaw

Security Affairs

A Proof-of-Concept (PoC) exploit for the CVE-2023-31998 vulnerability in the Ubiquiti EdgeRouter has been publicly released. The CVE-2023-31998 flaw (CVSS v3 5.9) is a heap overflow issue impacting Ubiquiti EdgeRouters and Aircubes, an attacker can exploit it to potentially execute arbitrary code and interrupt UPnP service to a vulnerable device. The flaw resides in the miniupnpd service and can be exploited by a LAN attacker.

article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q2 2023

IT Governance

Welcome to our second quarterly review of cyber attacks and data breaches for 2023. In this article, we take a closer look at the information gathered in our monthly list of security breaches , and delve into the infosec landscape over the past three months. You’ll find an overview of the most common types of cyber attack, plus year-on-year comparisons, details on the most breached sectors and a running total of incidents for the year.

article thumbnail

NIST Launches Generative AI Working Group

Dark Reading

The public working group will develop guidance around the special risks of AI technologies that generate content.

Risk 93
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A flaw in Revolut US payments resulted in the theft of $20 Million

Security Affairs

A zero-day vulnerability in the Revolut payment systems allowed threat actors to steal more than $20 million in early 2022. In early 2022, threat actors exploited a zero-day flaw in Revolut payment systems to steal more than $20 million, reported the Financial Times quoting multiple unnamed sources. The issue resulted from differences between American and European payment systems.

Access 94
article thumbnail

Analysts: Cybersecurity Funding Set for Rebound

Dark Reading

Analysts seem bullish about funding and M&A activity for the second half of the year, though transaction volumes and values dipped again in Q2.

article thumbnail

New Phishing Benchmarks Unlocked: Is Your Organization Ahead of the Curve in 2023

KnowBe4

Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.

article thumbnail

Honeywell to Acquire SCADAfence, Strengthening its Cybersecurity Software Portfolio

Dark Reading

SCADAfence will integrate into the Honeywell Forge Cybersecurity+ suite providing expanded asset discovery, threat detection, and compliance management capabilities.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Cybercriminals Evolve Antidetect Tooling for Mobile OS-Based Fraud

Security Affairs

Resecurity identified the emergence of adversarial mobile Android-based Antidetect Tooling for Mobile OS-Based Fraud. Resecurity has identified the emergence of adversarial mobile Android-based tools (called “mobile anti-detects”), like Enclave and McFly, as a new frontier in fraud tradecraft evolution. These tools are used by criminals involved in online-banking theft to impersonate compromised account holders and bypass anti-fraud controls by leveraging mobile client.

article thumbnail

What is vibration analysis and how can it help optimize predictive maintenance?

IBM Big Data Hub

Vibration analysis (or vibration monitoring) is a powerful diagnostic tool for identifying, monitoring and preventing mechanical failures in rotating and reciprocating machinery. It’s an essential component of predictive maintenance programs, allowing technicians to detect developing problems in equipment before they lead to costly unplanned downtime or catastrophic failures.

article thumbnail

10 Features an API Security Service Needs to Offer

Dark Reading

Securing APIs is specialized work. Here's what organizations should look for when selecting an outside partner.

article thumbnail

How to improve employee experience (and your bottom line)

IBM Big Data Hub

In a nutshell, employee experience refers to the totality of interactions employees have with their organization. It starts the moment a potential hire spots a company’s listing for an open position and ends with an employee’s retirement or departure. It includes every aspect of an employee’s professional life—from workplace culture, company mission, title, daily responsibilities and co-workers to workspaces, systems, company policies and interactions with human resources

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What will a turning point in academic publishing look like?

CILIP

What will a turning point in academic publishing look like? WHEN 43 editors resigned from two Elsevier journals in April they not only transferred smoothly to a new title at a new publisher, they also successfully highlighted growing concerns about the profits of the largest commercial publishers from open access publishing. The recently-resigned Editor in Chief of NeuroImage , Stephen Smith, is now EiC of recently-launched ‘ Imaging Neuroscience at MIT Press.

article thumbnail

Industry analyst round up – July 2023 edition

OpenText Information Management

At OpenText, our technology investments and customer-centric approach are, we believe, what makes our solutions so valuable. As leading innovators of modern information management, it’s always encouraging and exciting to be acknowledged by our customers and market experts. This includes the industry analyst community. So, we are casting a regular eye on the reports issued … The post Industry analyst round up – July 2023 edition appeared first on OpenText Blogs.

article thumbnail

OCR June 2023 OCR Cybersecurity Newsletter

IG Guru

U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights __ June 30, 2023 June 2023 OCR Cybersecurity Newsletter HIPAA and Cybersecurity Authentication Strong authentication processes are often analogized to a locked door in the cyber world. Weak or non-existent authentication processes leave your digital door open to intrusion by malicious actors and increase the […] The post OCR June 2023 OCR Cybersecurity Newsletter first appeared on IG GURU.