Tue.Oct 10, 2023

article thumbnail

Unknown Cyberespionage Group Targeted Taiwan

Data Breach Today

Threat Actor Likely Operates From A Region With A Strategic Interest In Taiwan A previously undetected cyberespionage group spied against Taiwanese government agencies and the island-country's manufacturing sector, say cybersecurity researchers. The Symantec Threat Hunter Team says it likely operates "from a region with a strategic interest in Taiwan.

article thumbnail

Patch Tuesday, October 2023 Edition

Krebs on Security

Microsoft today issued security updates for more than 100 newly-discovered vulnerabilities in its Windows operating system and related software, including four flaws that are already being exploited. In addition, Apple recently released emergency updates to quash a pair of zero-day bugs in iOS. Apple last week shipped emergency updates in iOS 17.0.3 and iPadOS 17.0.3 in response to active attacks.

Libraries 219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TikTok Chief Summoned by EU Lawmakers For Privacy Probe

Data Breach Today

Parliamentary Committee Heads Says In-Person Appearance Would be "Beneficial" The head TikTok has been summoned by European lawmakers from different parliamentary committees for an inquiry into its privacy practices. In a letter sent to the TikTok CEO Shou Zi Chew on Thursday, the heads of five European Parliament committees requested that Chew appear for an in-person probe.

Privacy 303
article thumbnail

GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion

The Last Watchdog

As tragic as it is, we are in a space where video has become a crucial asset in wartime. Related: Apple tool used as warfare weapon Ukraine’s defense against Russian invaders has changed the role of video. Accessing video-based intelligence at the right time and place is a very effective method for gaining information about the constantly changing military landscape.

Metadata 130
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Researchers: North Korean Hackers Gain Speed, Flexibility

Data Breach Today

Regime Keeps Refining Cyber Operations Focused on Espionage and Financial Crime North Korea's state-sponsored hackers continue to refine their "cyber intrusions to conduct both espionage and financial crime to project power and to finance both their cyber and kinetic capabilities," says a new report from Google's Mandiant group.

287
287

More Trending

article thumbnail

McLaren Health Care Facing 3 Lawsuits in Ransomware Hack

Data Breach Today

Litigation Filed Days After Alphv/BlackCat Claimed to Have Stolen Data of 2.5 Million Patients A recent attack by a Russian ransomware-as-a-service group that stole the personal information of 2.5 million patients of McLaren Health Care has triggered at least three proposed federal class action lawsuits in recent days, claiming the healthcare company failed to protect patient privacy.

article thumbnail

Internet-Wide Zero-Day Bug Fuels Largest-Ever DDoS Event

Dark Reading

Ongoing Rapid Reset DDoS flood attacks exposed organizations need to patch CVE-2023-44487 immediately to head off crippling outages and business disruption.

139
139
article thumbnail

Ukraine Publishes Road Map for AI Regulation

Data Breach Today

Kyiv Sees Regulation As A Pathway to Closer European Integration The Ukrainian government says it will regulate AI, a step it portrays as a way to draw closer to the European Union, where rules for AI systems are close to approval. New rules will enable access to global markets and closer integration with the EU, the Ministry of Digital Transformation said.

article thumbnail

New ‘HTTP/2 Rapid Reset’ technique behind record-breaking DDoS attacks

Security Affairs

A new DDoS technique named ‘HTTP/2 Rapid Reset’ is actively employed in attacks since August enabling record-breaking attacks. Researchers disclosed a new zero-day DDoS attack technique, named ‘HTTP/2 Rapid Reset’, that was exploited since August in record-breaking attacks. Google announced to have observed a new series of massive DDoS attacks that reached a peak of 398 million requests per second (rps).

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

North Korea's State-Sponsored APTs Organize & Align

Dark Reading

An unprecedented collaboration by various APTs within the DPKR makes them harder to track, setting the stage for aggressive, complex cyberattacks that demand strategic response efforts, Mandiant warns.

108
108
article thumbnail

A flaw in libcue library impacts GNOME Linux systems

Security Affairs

A vulnerability in the libcue library impacting GNOME Linux systems can be exploited to achieve remote code execution (RCE) on affected hosts. A threat actor can trigger a vulnerability, tracked as CVE-2023-43641 (CVSS score: 8.8), in the libcue library impacting GNOME Linux systems to achieve remote code execution (RCE) on affected hosts. libcue provides an API for parsing and extracting data from CUE sheets.

Libraries 110
article thumbnail

74% of CEOs Concerned About Their Organization's Ability to Protect Against Cyber Attacks, Despite Seeing Cybersecurity as Critical

KnowBe4

According to the recent The Cyber-Resilient CEO report released by IT services and consulting agency Accenture , a staggering 74% of CEOs have expressed concerns about their organizations' ability to protect their businesses from cyber attacks. This is despite the fact that 96% of CEOs acknowledge the importance of cybersecurity for the growth and stability of their organizations.

article thumbnail

Model Extraction Attack on Neural Networks

Schneier on Security

Adi Shamir et al. have a new model extraction attack on neural networks: Polynomial Time Cryptanalytic Extraction of Neural Network Models Abstract: Billions of dollars and countless GPU hours are currently spent on training Deep Neural Networks (DNNs) for a variety of tasks. Thus, it is essential to determine the difficulty of extracting all the parameters of such neural networks when given access to their black-box implementations.

Paper 103
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

New One-Click Exploit Is a Supply Chain Risk for Linux OSes

Dark Reading

An overlooked library contains a vulnerability that could enable full remote takeover simply by clicking a link.

Libraries 131
article thumbnail

Google Makes Passkeys Default, Stepping Up Its Push to Kill Passwords

WIRED Threat Level

Google is making passkeys, the emerging passwordless login technology, the default option for users as it moves to make passwords “obsolete.

Passwords 109
article thumbnail

Microsoft Patch Tuesday Haunted by Zero-Days, Wormable Bug

Dark Reading

October's CVE update is here. Here's which security vulnerabilities to patch now to exorcise your Microsoft systems demons.

Security 118
article thumbnail

Smishing Triad Threat Actor Sets Its Sights on the UAE

KnowBe4

Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE).

IT 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Frontline Report of Chinese Threat Actor Tactics and Techniques

Dark Reading

Threat intel experts see a reduced focus on desktop malware as threat groups prioritize passwords and tokens that let them access the same systems as remote workers.

Passwords 104
article thumbnail

Improving Sustainability in the Workplace

Record Nations

The importance of sustainability has never been more evident. As we struggle with the consequences of climate change, and resource depletion, the need to prioritize sustainability in every aspect of our lives has become increasingly urgent. We can make a significant impact by improving sustainability in the workplace. In fact, 77% of consumers are more.

87
article thumbnail

Badbox Operation Targets Android Devices in Fraud Schemes

Dark Reading

Researchers believe that more than 70,000 Android devices may have been affected with preloaded Peachpit malware that was installed on the electronics before being sold at market.

article thumbnail

IBM watsonx Assistant: Driving generative AI innovation with Conversational Search

IBM Big Data Hub

Generative AI has taken the business world by storm. Organizations around the world are trying to understand the best way to harness these exciting new developments in AI while balancing the inherent risks of using these models in an enterprise context at scale. Whether its concerns over hallucination, traceability, training data, IP rights, skills, or costs, enterprises must grapple with a wide variety of risks in putting these models into production.

Cloud 92
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

How Keyloggers Have Evolved From the Cold War to Today

Dark Reading

Keyloggers have been used for espionage since the days of the typewriter, but today's threats are easier to get and use than ever.

113
113
article thumbnail

Deploying applications built in external CI through IBM Cloud DevSecOps

IBM Big Data Hub

Cyber risk is preeminent in today’s threat landscape, and that includes attacks on the software supply chain. In fact, the increase in cyberattacks on software supply chains is estimated to affect 45% of organizations worldwide. These are referred to as supply chain risks, and they include vulnerable code that may be included from open source or third parties.

Cloud 86
article thumbnail

Old-School Attacks Are Still a Danger, Despite Newer Techniques

Dark Reading

The cold, hard truth? Cybercriminals are still perpetuating plenty of unsophisticated attacks for a simple reason: They work.

108
108
article thumbnail

6 ways to avoid and reduce data debt via InfoWorld

IG Guru

Check out the article here. The post 6 ways to avoid and reduce data debt via InfoWorld first appeared on IG GURU.

Risk 84
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Securely Moving Financial Services to the Cloud

Dark Reading

Financial services organizations migrating applications to the cloud need to think about cloud governance, applying appropriate policies and oversight, and compliance and regulatory requirements.

article thumbnail

Guidance on Digitization and Quality Management

National Archives Records Express

Digitization Project at Archives I, National Archives Identifier: 184341402 We are pleased to announce the release of the Digitization Quality Management Guide. This guide provides detailed information about the various aspects of quality management (QM) in digitization, including quality assurance and quality control, as well as the role of objective testing and automation in optimizing quality control and inspection processes.

article thumbnail

Reasonable Valuations Drove Mergers and Acquisition Activity in Q3, 2023

Dark Reading

Cisco's $28 billion purchase of Splunk was the biggest story, but other security majors made strategic acquisitions as well in a better-than-expected quarter.