Tue.Jul 05, 2022

article thumbnail

How Machine Learning Is Changing Access Monitoring

Data Breach Today

More Adaptive Technology is Changing How Organizations Monitor, Assess & Control Access As this technology is automated, it can also scan more accesses because a new rule doesn’t need to be created for each access. You can jump from a 1% audit rate to a 99% audit rate.

Access 244
article thumbnail

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

Gathering intelligence has always been a key tool for organisational decision making – understanding the external operating environment is the ‘101’ for business. How can you grasp the challenges and opportunities for your company without a deep understanding of all the contributing factors that make the company tick? Related: We’re in the golden age of cyber espionage.

Risk 256
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Government Picks Quantum-Resistant Encryption Algorithms

Data Breach Today

Quantum Computers That Use Atom-Level States of Uncertainty Are a Matter of Time The National Institute of Standards and Technology today announced a first group of encryption algorithms designed to withstand the assault of a future quantum computer. Selection of the four algorithms comes after six years of evaluation by the U.S. federal agency.

article thumbnail

FTC Provides Update on Security and Privacy Rulemaking Process

Hunton Privacy

On June 22, 2022, the Federal Trade Commission submitted an updated abstract to the Office of Information and Regulatory Affairs indicating that it is considering initiating a rulemaking under Section 18 of the FTC Act to curb lax security practices, limit privacy abuses, and ensure that algorithmic decision-making does not result in unlawful discrimination.

Privacy 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Unknown Hacker Steals Data of a Billion Chinese Citizens

Data Breach Today

Data Has Been Put on Sale for 10 Bitcoin, Equivalent to About $200,000 A misconfigured Alibaba private cloud server has led to the leak of around one billion Chinese nationals' personal details. An unknown hacker, identified as "ChinaDan", posted an advertisement on a hacker forum selling 23 terabytes of data for 10 bitcoin, equivalent to about $200,000.

Sales 273

More Trending

article thumbnail

Vendor's Ransomware Attack Hits Over 600 Healthcare Clients

Data Breach Today

Accounts Receivables Firm Incident Affected Patients of Many Entities A ransomware attack on an accounts receivables management firm has affected hundreds of healthcare clients - including dental practices, physician groups and hospitals, resulting in one of the largest health data breaches involving a vendor so far this year.

article thumbnail

Catches of the Month: Phishing Scams for July 2022

IT Governance

Welcome to our July 2022 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over their personal data. This month, we look at a cyber attack at OpenSea, a US school district that was tricked into transferring funds to a crook and a report on the rising threat of phishing.

Phishing 116
article thumbnail

Django Software Foundation Patches High-Severity Bug

Data Breach Today

SQL Injection Vulnerability Affects Main Branch of the Open-Source Framework The Django web framework patched a high-severity vulnerability affecting its main branch and three other versions - 3.2, 4.0 and 4.1. Developers who match inputs against safelists are unaffected. There are more than 91,000 websites using the Django framework, many of them based in the United States.

IT 246
article thumbnail

Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Data

Dark Reading

A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.

115
115
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

RSA Conference 2022 Compendium: 150+ Interviews and More

Data Breach Today

Get the Latest Insights from the Industry's Top Minds - All in One Place Welcome to ISMG's compendium of RSA Conference 2022. The 31st annual conference covered a wide range of topics including cybercrime, cyberwarfare, zero trust, supply chain risk, ransomware, OT security, cyber insurance and jobs. Access 150+ interviews with the top speakers and influencers.

Insurance 244
article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 2520) (the “Cybersecurity Act”) and the Federal Rotational Cyber Workforce Program Act (S. 1097) (the “Cyber Workforce Program Act”), two bipartisan bills aimed at enhancing the cybersecurity postures of the federal, state and local governments.

article thumbnail

Leveraging Interindustry Data to Discover Mule Accounts

Data Breach Today

How can you leverage artificial intelligence and make sense of data from different industries to determine whether a customer is creditworthy or whether an account is a mule account? Guy Sheppard, general manager of financial services at Aboitiz Data Innovation, discusses a case study.

article thumbnail

AstraLocker ransomware operators shut down their operations

Security Affairs

AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re shutting down the operation and provided decryptors to the VirusTotal malware analysis platform. AstraLocker is based on the source code of the Babuk Locker (Babyk) ransomware that was leaked online on June 2021.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Jamf Safe Internet brings safe connections everywhere students learn

Jamf

Jamf Safe Internet - the latest addition to Jamf’s education product suite — has launched, bringing with it, comprehensive content filtering, optimized for education and tightly integrated with your MDM for simple, powerful student and user protection.

MDM 98
article thumbnail

NIST Picks Four Quantum-Resistant Cryptographic Algorithms

Dark Reading

The US Department of Commerce's National Institute of Standards and Technology (NIST) announced the first group of encryption tools that will become part of its post-quantum cryptographic standard.

article thumbnail

The hidden history of Db2

IBM Big Data Hub

In today’s world of complex data architectures and emerging technologies, databases can sometimes be undervalued and unrecognized. The fact is that databases are truly the engine driving better outcomes for businesses — they’re running your cloud-native apps, generating returns on your investments in AI, and the backbone supporting your data fabric strategy.

article thumbnail

Malicious NPM packages used to grab data from apps, websites?

Security Affairs

Researchers from ReversingLabs discovered tens of malicious NPM packages stealing data from apps and web forms. Researchers from ReversingLabs discovered a couple of dozen NPM packages that included malicious code designed to steal data from apps and web forms on websites that included the modules. The malicious NPM modules were delivered as part of a widespread campaign, tracked as IconBurst, that according to the experts has been active at least since 2021.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Phishing Campaign Impersonates Canada Revenue Agency

KnowBe4

A phishing campaign is impersonating the Canada Revenue Agency (CRA) in an attempt to steal Canadians’ personal information, according to Rene Holt at ESET. The phishing emails inform users that they’ve received a tax refund of just under CAD$500. The user is directed to click on a link to a spoofed Government of Canada site.

article thumbnail

Latest Cyberattack Against Iran Part of Ongoing Campaign

Threatpost

Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.

article thumbnail

Why Browser Vulnerabilities Are a Serious Threat — and How to Minimize Your Risk

Dark Reading

As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.

Risk 101
article thumbnail

Cyber Police of Ukraine arrested 9 men behind phishing attacks on Ukrainians attempting to capitalize on the ongoing conflict

Security Affairs

The Cyber Police of Ukraine arrested nine members of a cybercriminal gang that has stolen 100 million hryvnias via phishing attacks. The Cyber Police of Ukraine arrested nine members of a cybercriminal organization that stole 100 million hryvnias via phishing attacks. The crooks created more than 400 phishing sites for obtaining the banking data of Ukrainian citizens under the guise of social security payments from the EU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

3 Cyber Threats Resulting From Today's Technology Choices to Hit Businesses by 2024

Dark Reading

Companies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues resulting from heavy use of low- and no-code tools.

Cloud 79
article thumbnail

Threat actors compromised British Army ’s Twitter, YouTube accounts to promote crypto scams

Security Affairs

Threat actors compromised the Twitter and YouTube accounts of the British Army to promote online crypto scams. The Twitter and YouTube accounts of the British Army were used to promote NFT and other crypto scams. The YouTube account was used to transmit an older Elon Musk clip that attempts to trick users into visiting cryptocurrency scam sites. The attackers hijacked the verified Twitter account of the British Army, changed the profile images, and renamed it to ‘pssssd.’ After the U

article thumbnail

Exposing the common myths of ISO 20022 migration

CGI

This blog highlights common myths related to ISO 20022 adoption and its impact on payments modernization timelines.

IT 97
article thumbnail

5 steps to lowering financial auditing costs (Part 1) – Acting as a maturity model for your organization?

Rocket Software

This is part one of a blog series about lowering financial auditing costs. . A 2021 study by Gartner revealed that 62% of companies polled expect their external audit fees to increase this year. Luckily, focusing on audit control automation can significantly lower the resource needs for audits. Today, many organizations still use manual auditing procedures , the most cost-demanding and insufficient approach for medium or large-scale enterprises as financial reporting processes have become mo

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

End-to-End Encryption's Central Role in Modern Self-Defense

WIRED Threat Level

With abortion set to be criminalized in more than half the US, encryption has never been more important for protection—and civil disobedience.

article thumbnail

Google Chrome WebRTC Zero-Day Faces Active Exploitation

Dark Reading

The heap buffer-overflow issue in Chrome for Android could be used for DoS, code execution, and more.

96
article thumbnail

5 ways to achieve faster time to value when modernizing applications in the cloud

OpenText Information Management

OpenText cloud experts, Kristina Lengyel, Vice President of Customer Solutions and Jon Schupp, Vice President of Cloud Go-to-Market, sat down for a fireside chat about how to achieve faster time-to-value when modernizing applications in the cloud. Emphasizing the many business benefits that cloud-native applications can deliver, including application currency and compliance, Kristina and Jon also … The post 5 ways to achieve faster time to value when modernizing applications in the cloud a

Cloud 69