Mon.Jan 23, 2023

article thumbnail

Ransomware Profits Dip as Fewer Victims Pay Extortion

Data Breach Today

As Funding From Ransoms Goes Down, Gangs Embrace Re-Extortion, Researchers Warn Bad news for ransomware groups: Experts find it's getting tougher to earn a crypto-locking payday at the expense of others. The bad guys can blame a move by law enforcement to better support victims, and more organizations having robust defenses in place, which makes them tougher to take down.

article thumbnail

ChatGPT Doesn’t Get Writer’s Block. Discuss.

John Battelle's Searchblog

Photo by Florian Klauer on Unsplash How long have I been staring at a blank screen, this accusing white box, struggling to compose the first sentence of a post I know will be difficult to write? About two minutes, actually, but that’s at least ten times longer than ChatGPT takes to compose a full page. And it’s those two minutes – and the several days I struggled with this post afterwards – that convince me that ChatGPT will not destroy writing.

Education 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Makes Sumo Logic an Appealing Target for Private Equity

Data Breach Today

Sumo Logic Is a Well-Regarded SIEM Provider, But Profitability Remains Elusive Thoma Bravo, Vista Equity Partners and rival Francisco Partners have set their sights on a new target: Sumo Logic. Each of the three private equity firms has approached the Silicon Valley-based data analytics software vendor expressing interest in a possible acquisition, The Information reports.

Analytics 164
article thumbnail

TSA No-Fly List Snafu Highlights Risk of Keeping Sensitive Data in Dev Environments

Dark Reading

A Swiss hacker poking around in an unprotected Jenkins development server belonging to CommuteAir accessed the names and birthdates of some 1.5 million people on a TSA no-fly list from 2019.

Risk 106
article thumbnail

LLMOps for Your Data: Best Practices to Ensure Safety, Quality, and Cost

Speaker: Travis Addair, Co-Founder and CTO at Predibase

Large Language Models (LLMs) such as ChatGPT offer unprecedented potential for complex enterprise applications. However, productionzing LLMs comes with a unique set of challenges such as model brittleness, total cost of ownership, data governance and privacy, and the need for consistent, accurate outputs. Putting the right LLMOps process in place today will pay dividends tomorrow, enabling you to leverage the part of AI that constitutes your IP – your data – to build a defensible AI strategy for

article thumbnail

The Persisting Risks Posed by Legacy Medical Devices

Data Breach Today

Legislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities, but organizations will still face major risks involving legacy medical gear for many years to come, says Daniel dos Santos, research leader at security firm Forescout.

Risk 139

More Trending

article thumbnail

Australia Initiates Global Ransomware Task Force Operations

Data Breach Today

Aim Is International Cooperation in Fight Against Digital Extortion Australia started operating an international ransomware task force to facilitate information sharing and best practices worldwide. “Recent cyber incidents in Australia and around the globe are a stark reminder of the insidious nature of ransomware," said Minister for Home Affairs Clare O'Neil.

article thumbnail

FanDuel Sportsbook Bettors Exposed in Mailchimp Breach

Dark Reading

Amid all the NFL playoff action, FanDuel has sent an email warning to gamblers that their data was exposed in its third-party breach, putting them at risk for phishing attacks.

Phishing 100
article thumbnail

David Derigiotis on the Complex World of Cyber Insurance

Data Breach Today

In this episode of "Cybersecurity Unplugged," David Derigiotis of insurtech Embroker discusses the complex world of cyber liability insurance, including the collapse of crypto exchange FTX, recent breaches, and improvements in the cyber insurance industry.

Insurance 130
article thumbnail

Preservica customers use the past to inform the present, preserving democracy for future generations

Preservica

See how Preservica is helping leading institutions preserve democracy by safeguarding important voting records, some over a century old. Our nation's history of democracy and its road to voting rights is rich with content. The history of voting participation in the U.S. across gender, race and ethnicity contains oral and written stories, registration documents, litigation case documents and more.

article thumbnail

Your Expert Guide to CX Orchestration & Enhancing Customer Journeys

Speaker: Keith Kmett, Principal CX Advisor at Medallia

Join Keith Kmett, Principal CX Advisor, in this new webinar that will focus on: Understanding CX Orchestration Fundamentals: Gain a solid understanding of what CX orchestration is, its significance in the customer experience landscape, and how it plays a crucial role in shaping customer journeys. This includes the key concepts, strategies, and best practices involved in CX orchestration. 🔑 Connection to Customer Journey Maps: How to effectively integrate customer journey mapping into the

article thumbnail

2 Vendors Among BlackCat's Alleged Recent Ransomware Victims

Data Breach Today

Group Lists EHR Provider, Pharmaceutical Services Firm on Leak Site An electronic health records vendor and a pharmacy management services firm are purportedly among the latest healthcare sector victims of ransomware-as-a-service group BlackCat, also known as Alphv. NextGen Healthcare and PharmaCare Services appeared on BlackCat's leak site late last week.

article thumbnail

No-Fly List Exposed

Schneier on Security

I can’t remember the last time I thought about the US no-fly list: the list of people so dangerous they should never be allowed to fly on an airplane, yet so innocent that we can’t arrest them. Back when I thought about it a lot, I realized that the TSA’s practice of giving it to every airline meant that it was not well protected, and it certainly ended up in the hands of every major government that wanted it.

article thumbnail

Malware Blurs Line Between Banking Trojan and Surveillance

Data Breach Today

Hook Banking Trojan Can Simulate Clicks and Send WhatsApp Messages Android malware highlighted by Dutch cybersecurity firm ThreatFabric shows the line between a banking Trojan and advanced spyware. The Trojan, dubbed Hook, can take a screenshot, simulate clicks and input swipe gesture commands. It can also take control of WhatsApp.

article thumbnail

Apple backported patches for CVE-2022-42856 zero-day on older iPhones, iPads

Security Affairs

Apple has backported the security updates for the zero-day vulnerability CVE-2022-42856 to older iPhones and iPads. On December 2022, Apple released security updates to address a new zero-day vulnerability, tracked as CVE-2022-42856 , that is actively exploited in attacks against iPhones. The IT giant released security bulletins for iOS/iPadOS 15.7.2 , Safari 16.2 , tvOS 16.2 , and macOS Ventura 13.1.

article thumbnail

LLMs in Production: Tooling, Process, and Team Structure

Speaker: Dr. Greg Loughnane and Chris Alexiuk

Technology professionals developing generative AI applications are finding that there are big leaps from POCs and MVPs to production-ready applications. They're often developing using prompting, Retrieval Augmented Generation (RAG), and fine-tuning (up to and including Reinforcement Learning with Human Feedback (RLHF)), typically in that order. However, during development – and even more so once deployed to production – best practices for operating and improving generative AI applications are le

article thumbnail

Chinese Group Targeting Vulnerable Cloud Providers, Apps

Data Breach Today

Cryptomining Campaign Targets Public Cloud Environments, Increases Security Risks Cybersecurity researchers say a Chinese for-profit threat group tracked as 8220 Gang is targeting cloud providers and poorly secured applications with a custom-built crypto miner and IRC bot. The malware can slow system performance, drive up costs and expose systems to security risks.

Cloud 130
article thumbnail

Hunting Insider Threats on the Dark Web

Dark Reading

Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.

126
126
article thumbnail

Profiles in Leadership: Matanda Doss

Data Breach Today

JPMorgan Chase Cybersecurity Head on How to Fight Russia's Shifting Cyberattacks Nation-state attackers are not just looking for major vulnerabilities to gain control of the enterprise. They are exploiting minor flaws to gain access and increase the severity of their attacks, says Matanda Doss, executive director of cybersecurity and technology controls at JPMorgan Chase.

article thumbnail

What is Apple Business Manager?

Jamf

Apple Business Manager, combined with Mobile Device Management (MDM), is the best way to simplify and speed your everyday Apple device management tasks.

MDM 98
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Spanish Authorities Arrest 3 in Bitzlato Crackdown

Data Breach Today

Nearly Half of Assets Exchanged Through Defunct Crypto Platform Linked to Crimes Spanish authorities arrested three senior executives of now-defunct cryptocurrency exchange platform Bitzlato, Europol announced. The crime coordination agency says about 46% of the assets exchanged through Bitzlato, worth roughly 1 billion euros, had links to criminal activities.

130
130
article thumbnail

Two flaws in Samsung Galaxy Store can allow to install Apps and execute JS code

Security Affairs

Researchers found two flaws in Samsung Galaxy Store that could be exploited to install applications or achieve code execution on the devices. Researchers from cybersecurity firm NCC Group published technical details on two vulnerabilities, tracked as CVE-2023-21433 and CVE-2023-21434, in Samsung Galaxy Store that could be exploited to install applications or execute malicious JavaScript code.

article thumbnail

Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access

Dark Reading

Devices running Android 12 and below are at risk of attackers downloading apps that direct users to a malicious domain.

Access 107
article thumbnail

Companies impacted by Mailchimp data breach warn their customers

Security Affairs

The recent Mailchimp data breach has impacted multiple organizations, some of them are already notifying their customers. The popular email marketing and newsletter platform Mailchimp recently disclosed a news data breach , the incident exposed the data of 133 customers. Threat actors targeted the company’s employees and contractors to gain access to an internal support and account admin tool.

article thumbnail

Use Cases for Apache Cassandra®

There’s a good reason why Apache Cassandra® is quickly becoming the NoSQL database of choice for organizations of all stripes. In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid. From understanding its distributed architecture to unlocking its incredible power for industries like healthcare, finance, retail and more, experience how Cassandra® can transform your entire data operations.

article thumbnail

Webinar: Archiving War: Lessons From Iraq via ARMA Mid-Michigan on February 16th, 2023 at 12pm Eastern

IG Guru

Joel Westphal’s presentation looks at the lessons learned from capturing, managing, and archiving the largest digital collection of war records in our nation’s history, The Iraqi War Collection located at United States CENTRAL COMMAND (USCENTCOM), which holds 50+ TB of data from the years 2003 to 2010.

article thumbnail

Massive Ad fraud scheme VASTFLUX targeted over 11 million devices

Security Affairs

Researchers dismantled a sophisticated ad fraud scheme, dubbed VASTFLUX, that targeted more than 11 million devices. HUMAN’s Satori Threat Intelligence and Research Team dismantled a sophisticated ad fraud operation dubbed VASTFLUX. The name VASTFLUX comes from the evasion technique “ fast flux ” and VAST, the Digital Video Ad Serving Template that was abused by threat actors in this fraudulent scheme.

article thumbnail

Digital Health Transformation: A Practical Guide for Life Sciences Companies

Data Matters

In 2022, many if not most pharmaceutical, medical device, and other life sciences companies established strategies to innovate digital health technology complementary to their existing strategic focus. The digital transformation of the life sciences industry is still widely unfolding across the marketplace. In 2023 and beyond, the race is on to launch the next generation of digital health technologies to innovate the delivery of therapies to patients.

article thumbnail

Understanding Data Governance

IBM Big Data Hub

If you’re in charge of managing data at your organization, you know how important it is to have a system in place for ensuring that your data is accurate, up-to-date, and secure. That’s where data governance comes in. What exactly is data governance and why is it so important? Simply put, data governance is the process of establishing policies, procedures, and standards for managing data within an organization.

article thumbnail

Reimagining CX: How to Implement Effective AI-Driven Transformations

Speaker: Steve Pappas

As businesses strive for success in an increasingly digitized world, delivering an exceptional customer experience has become paramount. To meet this demand, enterprises are embracing innovative approaches that captivate customers and fuel their loyalty. 💥 Enter conversational AI - an absolute game-changer (if done right) in redefining CX norms.

article thumbnail

Wallarm Aims to Reduce the Harm From Compromised APIs

Dark Reading

API Leak Management software discovers exposed API keys and other secrets, blocks their use, and monitors for abuse, the company says.

69
article thumbnail

CPPA Board to Hold Meeting on Status of CPRA Rulemaking

Hunton Privacy

On January 23, 2023, the California Privacy Protection Agency (“CPPA”) Board announced that it will hold a public meeting on February 3, 2023 regarding the status of the California Privacy Rights Act of 2020 (“CPRA”) rulemaking process, particularly with respect to the issuance of new draft rules on risk assessments, cybersecurity audits and automated decisionmaking.

article thumbnail

No One Wants to Be Governed, Everyone Wants to Be Helped

Dark Reading

Here's how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.