Tue.Jul 05, 2022

article thumbnail

How Machine Learning Is Changing Access Monitoring

Data Breach Today

More Adaptive Technology is Changing How Organizations Monitor, Assess & Control Access As this technology is automated, it can also scan more accesses because a new rule doesn’t need to be created for each access. You can jump from a 1% audit rate to a 99% audit rate.

Access 244
article thumbnail

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

Gathering intelligence has always been a key tool for organisational decision making – understanding the external operating environment is the ‘101’ for business. How can you grasp the challenges and opportunities for your company without a deep understanding of all the contributing factors that make the company tick? Related: We’re in the golden age of cyber espionage.

Risk 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Government Picks Quantum-Resistant Encryption Algorithms

Data Breach Today

Quantum Computers That Use Atom-Level States of Uncertainty Are a Matter of Time The National Institute of Standards and Technology today announced a first group of encryption algorithms designed to withstand the assault of a future quantum computer. Selection of the four algorithms comes after six years of evaluation by the U.S. federal agency.

article thumbnail

FTC Provides Update on Security and Privacy Rulemaking Process

Hunton Privacy

On June 22, 2022, the Federal Trade Commission submitted an updated abstract to the Office of Information and Regulatory Affairs indicating that it is considering initiating a rulemaking under Section 18 of the FTC Act to curb lax security practices, limit privacy abuses, and ensure that algorithmic decision-making does not result in unlawful discrimination.

Privacy 133
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Unknown Hacker Steals Data of a Billion Chinese Citizens

Data Breach Today

Data Has Been Put on Sale for 10 Bitcoin, Equivalent to About $200,000 A misconfigured Alibaba private cloud server has led to the leak of around one billion Chinese nationals' personal details. An unknown hacker, identified as "ChinaDan", posted an advertisement on a hacker forum selling 23 terabytes of data for 10 bitcoin, equivalent to about $200,000.

Sales 273

More Trending

article thumbnail

Vendor's Ransomware Attack Hits Over 600 Healthcare Clients

Data Breach Today

Accounts Receivables Firm Incident Affected Patients of Many Entities A ransomware attack on an accounts receivables management firm has affected hundreds of healthcare clients - including dental practices, physician groups and hospitals, resulting in one of the largest health data breaches involving a vendor so far this year.

article thumbnail

Catches of the Month: Phishing Scams for July 2022

IT Governance

Welcome to our July 2022 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over their personal data. This month, we look at a cyber attack at OpenSea, a US school district that was tricked into transferring funds to a crook and a report on the rising threat of phishing.

Phishing 116
article thumbnail

Django Software Foundation Patches High-Severity Bug

Data Breach Today

SQL Injection Vulnerability Affects Main Branch of the Open-Source Framework The Django web framework patched a high-severity vulnerability affecting its main branch and three other versions - 3.2, 4.0 and 4.1. Developers who match inputs against safelists are unaffected. There are more than 91,000 websites using the Django framework, many of them based in the United States.

IT 246
article thumbnail

Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Data

Dark Reading

A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.

115
115
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

RSA Conference 2022 Compendium: 150+ Interviews and More

Data Breach Today

Get the Latest Insights from the Industry's Top Minds - All in One Place Welcome to ISMG's compendium of RSA Conference 2022. The 31st annual conference covered a wide range of topics including cybercrime, cyberwarfare, zero trust, supply chain risk, ransomware, OT security, cyber insurance and jobs. Access 150+ interviews with the top speakers and influencers.

Insurance 244
article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 2520) (the “Cybersecurity Act”) and the Federal Rotational Cyber Workforce Program Act (S. 1097) (the “Cyber Workforce Program Act”), two bipartisan bills aimed at enhancing the cybersecurity postures of the federal, state and local governments.

article thumbnail

Leveraging Interindustry Data to Discover Mule Accounts

Data Breach Today

How can you leverage artificial intelligence and make sense of data from different industries to determine whether a customer is creditworthy or whether an account is a mule account? Guy Sheppard, general manager of financial services at Aboitiz Data Innovation, discusses a case study.

article thumbnail

AstraLocker ransomware operators shut down their operations

Security Affairs

AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re shutting down the operation and provided decryptors to the VirusTotal malware analysis platform. AstraLocker is based on the source code of the Babuk Locker (Babyk) ransomware that was leaked online on June 2021.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The hidden history of Db2

IBM Big Data Hub

In today’s world of complex data architectures and emerging technologies, databases can sometimes be undervalued and unrecognized. The fact is that databases are truly the engine driving better outcomes for businesses — they’re running your cloud-native apps, generating returns on your investments in AI, and the backbone supporting your data fabric strategy.

article thumbnail

Jamf Safe Internet brings safe connections everywhere students learn

Jamf

Jamf Safe Internet - the latest addition to Jamf’s education product suite — has launched, bringing with it, comprehensive content filtering, optimized for education and tightly integrated with your MDM for simple, powerful student and user protection.

MDM 98
article thumbnail

NIST Picks Four Quantum-Resistant Cryptographic Algorithms

Dark Reading

The US Department of Commerce's National Institute of Standards and Technology (NIST) announced the first group of encryption tools that will become part of its post-quantum cryptographic standard.

article thumbnail

Malicious NPM packages used to grab data from apps, websites?

Security Affairs

Researchers from ReversingLabs discovered tens of malicious NPM packages stealing data from apps and web forms. Researchers from ReversingLabs discovered a couple of dozen NPM packages that included malicious code designed to steal data from apps and web forms on websites that included the modules. The malicious NPM modules were delivered as part of a widespread campaign, tracked as IconBurst, that according to the experts has been active at least since 2021.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

New Phishing Campaign Impersonates Canada Revenue Agency

KnowBe4

A phishing campaign is impersonating the Canada Revenue Agency (CRA) in an attempt to steal Canadians’ personal information, according to Rene Holt at ESET. The phishing emails inform users that they’ve received a tax refund of just under CAD$500. The user is directed to click on a link to a spoofed Government of Canada site.

article thumbnail

Cyber Police of Ukraine arrested 9 men behind phishing attacks on Ukrainians attempting to capitalize on the ongoing conflict

Security Affairs

The Cyber Police of Ukraine arrested nine members of a cybercriminal gang that has stolen 100 million hryvnias via phishing attacks. The Cyber Police of Ukraine arrested nine members of a cybercriminal organization that stole 100 million hryvnias via phishing attacks. The crooks created more than 400 phishing sites for obtaining the banking data of Ukrainian citizens under the guise of social security payments from the EU.

article thumbnail

Latest Cyberattack Against Iran Part of Ongoing Campaign

Threatpost

Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.

article thumbnail

Why Browser Vulnerabilities Are a Serious Threat — and How to Minimize Your Risk

Dark Reading

As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.

Risk 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Threat actors compromised British Army ’s Twitter, YouTube accounts to promote crypto scams

Security Affairs

Threat actors compromised the Twitter and YouTube accounts of the British Army to promote online crypto scams. The Twitter and YouTube accounts of the British Army were used to promote NFT and other crypto scams. The YouTube account was used to transmit an older Elon Musk clip that attempts to trick users into visiting cryptocurrency scam sites. The attackers hijacked the verified Twitter account of the British Army, changed the profile images, and renamed it to ‘pssssd.’ After the U

article thumbnail

3 Cyber Threats Resulting From Today's Technology Choices to Hit Businesses by 2024

Dark Reading

Companies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues resulting from heavy use of low- and no-code tools.

Cloud 79
article thumbnail

Exposing the common myths of ISO 20022 migration

CGI

This blog highlights common myths related to ISO 20022 adoption and its impact on payments modernization timelines.

IT 97
article thumbnail

5 steps to lowering financial auditing costs (Part 1) – Acting as a maturity model for your organization?

Rocket Software

This is part one of a blog series about lowering financial auditing costs. . A 2021 study by Gartner revealed that 62% of companies polled expect their external audit fees to increase this year. Luckily, focusing on audit control automation can significantly lower the resource needs for audits. Today, many organizations still use manual auditing procedures , the most cost-demanding and insufficient approach for medium or large-scale enterprises as financial reporting processes have become mo

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

End-to-End Encryption's Central Role in Modern Self-Defense

WIRED Threat Level

With abortion set to be criminalized in more than half the US, encryption has never been more important for protection—and civil disobedience.

article thumbnail

Google Chrome WebRTC Zero-Day Faces Active Exploitation

Dark Reading

The heap buffer-overflow issue in Chrome for Android could be used for DoS, code execution, and more.

96
article thumbnail

5 ways to achieve faster time to value when modernizing applications in the cloud

OpenText Information Management

OpenText cloud experts, Kristina Lengyel, Vice President of Customer Solutions and Jon Schupp, Vice President of Cloud Go-to-Market, sat down for a fireside chat about how to achieve faster time-to-value when modernizing applications in the cloud. Emphasizing the many business benefits that cloud-native applications can deliver, including application currency and compliance, Kristina and Jon also … The post 5 ways to achieve faster time to value when modernizing applications in the cloud a

Cloud 67