Mon.Jun 26, 2023

article thumbnail

Army Alert on Free Smartwatches: Don't Sport These Wearables

Data Breach Today

Malware-Infected Watches Are the New USB Thumb Drive for Social Engineers Are unsolicited smartwatches the new USB thumb drive? The U.S. Army warns that service members are being sent free wearables preloaded with malware designed to steal data from mobile devices as well as intercept voice communications and hijack cameras.

article thumbnail

GUEST ESSAY: Dialing in generative AI to truly relieve and assist cybersecurity professionals

The Last Watchdog

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: A call to regulate facial recognition Although AI has become a powerful weapon, there’s concern it might be too effective compared to human cybersecurity professionals — leading to layoffs and replacements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Irish Government Accused of Trying to Muzzle Privacy Critics

Data Breach Today

New Bill Set to Penalize Disclosure of Data Protection Commission's Reprimands Irish Parliament has proposed changes to a new bill that would make it a criminal offense to disclose privacy reprimands issued by the Data Protection Commission. Civil rights groups are accusing the government of shielding the country's privacy regulator from criticism.

Privacy 227
article thumbnail

News Alert: Flexxon selects a Chief Technology Strategist, signals intent to expand into the US

The Last Watchdog

Singapore, June 26, 2023 – Hardware cybersecurity solutions pioneer Flexxon today announced the appointment of Erik Nilsen, PhD, as its Chief Technology Strategist. An industry veteran with almost three decades of experience, Nilsen will work closely with the Company’s executive management and Research and Development (R&D) team to design and deploy technological roadmaps for its value-driven cybersecurity innovations, with a focus on the US market.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Chinese APT Group Uses New Tradecraft to Live Off the Land

Data Breach Today

Group Targeting Transportation, Construction, Government Agencies, CrowdStrike Says A Chinese state hacker is using novel tradecraft to gain initial access to victim systems, according to CrowdStrike. Targeted organizations include those in the communications, manufacturing, utility, transportation, construction, maritime, government, IT and education sectors.

More Trending

article thumbnail

Monopoly Darknet Market: Suspected Operator Extradited to US

Data Breach Today

FBI: Market Facilitated $18 Million in Illegal Drug Transactions via Cryptocurrency The alleged operator of the darknet narcotics marketplace Monopoly has been extradited to the U.S. to stand trial. The FBI said it identified Milomir Desnica, a 33-year-old dual Croatian and Serbian national, thanks in part to invoices found in a Monopoly database seized by German law enforcement.

Marketing 141
article thumbnail

Trojanized Super Mario Installer Goes After Gamer Data

Dark Reading

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.

Security 107
article thumbnail

Victim Count in Maryland Ransomware Breach Jumps Fivefold

Data Breach Today

Atlantic General Hospital Now Says Attack Compromised PHI of Nearly 137,000 A Berlin, Maryland-based hospital recently told regulators that a ransomware breach discovered in January had compromised the sensitive information of nearly 137,000 patients, about five times the number of people originally estimated as having been affected by the incident.

article thumbnail

Internet Systems Consortium (ISC) fixed three DoS flaw in BIND

Security Affairs

The Internet Systems Consortium (ISC) addressed three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The Internet Systems Consortium (ISC) released security updates to address three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The three issues, tracked as CVE-2023-2828, CVE-2023-2829 and CVE-2023-2911, are remotely exploitable.

IT 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Jamf Connect and Jamf Protect now available in the AWS Marketplace!

Jamf

Discover Jamf Connect and Jamf Protect in the AWS Marketplace and Jamf's Integration with Amazon EC2, ensuring secure and trusted access to company resources.

Access 98
article thumbnail

Citizen of Croatia charged with running the Monopoly Market drug marketplace

Security Affairs

Milomir Desnica, a citizen of Croatia and Serbia, has been charged with running the Monopoly Market drug darknet marketplace. Milomir Desnica (33), a citizen of Croatia and Serbia, has been extradited from Austria to the United States to face charges of running the darknet drug marketplace Monopoly Market. According to the indictment, in late 2019, the man launched and operated a darknet marketplace to sell illicit narcotics, including opioids, stimulants, psychedelics, and prescription medicati

article thumbnail

3 Steps to Successfully & Ethically Navigate a Data Breach

Dark Reading

In this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.

article thumbnail

Energy company Suncor suffered a cyber attack and its company Petro-Canada gas reported problems at its gas stations in Canada

Security Affairs

The cyber attack suffered by Suncor Energy impacted payment operations at Petro-Canada gas stations in Canada. Suncor Energy is Canada’s leading integrated energy company that provides oil sands development, production and upgrading, offshore oil and gas, and petroleum refining in Canada and the U.S. It owns the Petro-Canada retail and wholesale distribution networks.

IT 92
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Twitter Celeb Account Hacker Heads to Jail for 5 Years

Dark Reading

Extradited from Spain, PlugWalkJoe has been sentenced in US court and is now headed to federal prison on a raft of charges related to account hijacking and cyber stalking.

87
article thumbnail

China-linked APT group VANGUARD PANDA uses a new tradecraft in recent attacks

Security Affairs

China-linked APT group VANGUARD PANDA, aka Volt Typhoon, was spotted observing a novel tradecraft to gain initial access to target networks. CrowdStrike researchers observed the China-linked APT group VANGUARD PANDA, aka Volt Typhoon , using a novel tradecraft to gain initial access to target networks. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

Cleanup 89
article thumbnail

Excel Data Forensics

Schneier on Security

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. (And, yes, an author of a paper on dishonesty is being accused of dishonesty. There’s more evidence.

Paper 85
article thumbnail

SolarWinds Execs Targeted by SEC, CEO Vows to Fight

Dark Reading

CEO says SEC penalties related to the 2020 SolarWinds supply chain attacks are unwarranted and is ready to mount a defense to any legal actions against the company or its employees.

IT 83
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Cryptocurrency Coinbase Phishing Campaign Uses Social Engineering

KnowBe4

A phishing campaign is impersonating cryptocurrency trading platform Coinbase, Tech.co reports. Crypto trader Jacob Canfield described the campaign in a Twitter thread, stating that the threat actors texted and then called him.

article thumbnail

Remediation Ballet Is a Pas de Deux of Patch and Performance

Dark Reading

AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.

article thumbnail

How to responsibly scale business-ready generative AI

IBM Big Data Hub

Imagine the possibilities of providing text-based queries and opening a world of knowledge for improved learning and productivity. Possibilities are growing that include assisting in writing articles, essays or emails; accessing summarized research; generating and brainstorming ideas; dynamic search with personalized recommendations for retail and travel; and explaining complicated topics for education and training.

Retail 75
article thumbnail

Cl0p in Your Network? Here's How to Find Out

Dark Reading

Companies targeted by hacking groups with Cl0p ransomware typically have several chances to catch the attack prior to the payload being deployed, experts say.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Small and Medium Businesses Day: Tips on Securing the Backbone of National Economies

Thales Cloud Protection & Licensing

Small and Medium Businesses Day: Tips on Securing the Backbone of National Economies madhav Tue, 06/27/2023 - 05:46 The United Nations General Assembly designated 27 June as Micro-, Small, and Medium-sized Enterprises Day to raise awareness of these businesses’ contribution to national economies. SMBs account for 90% of companies, 60 to 70% of employment, and 50% of GDP globally.

article thumbnail

How Infrastructure as Code Can Help Minimize Human Error

Dark Reading

Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.

Cloud 73
article thumbnail

The Hybrid Cloud Forecast: Part 2

IBM Big Data Hub

In my previous post , I described how I got started with a podcast series called The Hybrid Cloud Forecast. In each episode, I invite an IBM Fellow as the guest and ask them to share their insights on hybrid cloud and their careers and experiences. Across the 30+ episodes published so far, three themes have emerged that appeared to come up: Research , which I covered in the previous blog Journey to Cloud , which I will cover here Life Stories , which I will leave for the next blog post Theme: Jo

Cloud 66
article thumbnail

It's Open Season on Law Firms for Ransomware & Cyberattacks

Dark Reading

Law firms have an ethical responsibility to protect their clients' sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to shore up cybersecurity.

IT 69
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

IBM Tech Now: June 26, 2023

IBM Big Data Hub

​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 79 On this episode, we’re covering the following topics: The age of quantum utility The general availability of IBM Storage Defender Stay plugged in You can check out the IBM Blog Announcements for a full rundown of all news,

Cloud 65
article thumbnail

European Commission and ASEAN releases Guide to ASEAN Model Contractual Clauses and EU Standard Contractual Clauses

Data Protection Report

Introduction To enable international businesses to comply with cross-border personal data transfers and the relevant laws across the European Union ( EU ) and South-East Asia, on 24 May 2023 the European Commission and the Association of Southeast Asian Nations ( ASEAN ) published a Reference Guide to ASEAN Model Contractual Clauses ( ASEAN MCC s) and EU Standard Contractual Clauses ( EU SCC s) (the Reference Guide ).

article thumbnail

The six strategic uses cases for AIOps

IBM Big Data Hub

The benefits of AIOps are many. By infusing artificial intelligence (AI) into IT operations , you can leverage the considerable power of natural language processing and machine learning models to automate and streamline operational workflows. For today’s IT professionals, AIOps is also one of the fastest ways to realize tangible ROI from digital transformation investments.