Wed.Apr 12, 2023

article thumbnail

Microsoft Patches Zero-Day Bug Exploited by Ransomware Group

Data Breach Today

Attackers Drop Nokoyawa Ransomware; Experts See Increasing Criminal Sophistication Microsoft has issued fixes for 114 vulnerabilities, including patching a zero-day flaw being actively exploited by a ransomware group and updating guidance to block a vulnerability from 2013 that was recently exploited for the software supply chain attack on 3CX users, attributed to North Korea.

article thumbnail

FBI Advising People to Avoid Public Charging Stations

Schneier on Security

The FBI is warning people against using public phone-charging stations, worrying that the combination power-data port can be used to inject malware onto the devices: Avoid using free charging stations in airports, hotels, or shopping centers. Bad actors have figured out ways to use public USB ports to introduce malware and monitoring software onto devices that access these ports.

Risk 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will Generative AI's Use in Cyber Tools Exceed Expectations?

Data Breach Today

To What Extent Will Security Tools Benefit From Linking Arms With OpenAI's ChatGPT? The launch of Microsoft's Security Copilot may have attracted the most attention in the market since it was developed by the company that brought generative AI chatbots to the masses, but it's neither the first nor the only security product to incorporate OpenAI's ChatGPT into its design.

Marketing 146
article thumbnail

Past, present and future in a digital transformation journey

OpenText Information Management

A digital transformation is the adoption of new business processes and practices to help an organization compete effectively in a modern and increasingly digital world. The objective is often tied to cost leadership, increased competitiveness or simply moving into a niche. According to Gartner, a digital transformation includes information technology modernization, adoption of cloud computing, … The post Past, present and future in a digital transformation journey appeared first on OpenTex

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

HHS Wants HIPAA Changes to Protect Reproductive Health Info

Data Breach Today

Proposed Rule Would Prohibit Certain PHI Disclosures, Uses for Law Enforcement Federal regulators have issued proposed changes to the HIPAA privacy rule aimed at protecting reproductive healthcare information from disclosures or uses involving law enforcement and related purposes in the wake of the Supreme Court last year overturning Roe v. Wade.

Privacy 146

More Trending

article thumbnail

Hyundai suffered a data breach that impacted customers in France and Italy

Security Affairs

Hyundai disclosed a data breach that impacted Italian and French car owners and clients who booked a test drive. Hyundai has suffered a data breach that impacted Italian and French car owners and customers who booked a test drive. Threat actors had access to the email addresses, physical addresses, telephone numbers, and vehicle chassis numbers of the impacted individuals.

article thumbnail

FBI & FCC Warn on 'Juice Jacking' at Public Chargers, but What's the Risk?

Dark Reading

Hackers can compromise public charging hubs to steal data, install malware on phones, and more, threatening individuals and businesses alike.

Risk 105
article thumbnail

Win The AI Wars To Enhance Security And Decrease Cyber Risk

KnowBe4

With all the overwrought hype with ChatGPT and AI…much of it earned…you could be forgiven for thinking that only the bad actors are going to be using these advanced technologies and the rest of us are at their mercy.

Risk 91
article thumbnail

1M+ WordPress Sites Hacked via Zero-Day Plug-in Bugs

Dark Reading

A wide-ranging campaign to inject malicious code into WordPress-run websites has been ongoing for at least five years.

113
113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Recent Artificial Intelligence Hype is Used for Phishbait

KnowBe4

Anticipation leads people to suspend their better judgment as a new campaign of credential theft exploits a person’s excitement about the newest AI systems not yet available to the general public. On Tuesday morning, April 11th, Veriti explained that several unknown actors are making false Facebook ads which advertise a free download of AIs like ChatGPT and Google Bard.

article thumbnail

OpenAI launched a bug bounty program

Security Affairs

AI company OpenAI launched a bug bounty program and announced payouts of up to $20,000 for security flaws in its ChatGPT chatbot service. OpenAI launched a bug bounty program and it is offering up to $20,000 to bug hunters that will report vulnerabilities in its ChatGPT chatbot service. The company explained that ChatGPT is in scope, including ChatGPT Plus, logins, subscriptions, OpenAI-created plugins (e.g.

article thumbnail

LinkedIn Verification Now Lets You Verify Your Job and Account

WIRED Threat Level

To beat back fake accounts, the professional social network is rolling out new tools to prove you work where you say you do and are who you say you are.

article thumbnail

SAP April 2023 security updates fix critical vulnerabilities

Security Affairs

SAP fixed two critical bugs that affect the Diagnostics Agent and the BusinessObjects Business Intelligence Platform. SAP April 2023 security updates include a total of 24 notes, 19 of which are new vulnerabilities. The most critical vulnerabilities are: CVE-2023-27267 : missing authentication and insufficient input validation in the OSCommand Bridge of SAP Diagnostics Agent, version 720, can be exploited by an attacker to execute scripts on connected Diagnostics Agents.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Leaked Pentagon Documents May Herald a New Era of Revelations

WIRED Threat Level

The bizarre release of sensitive US government materials soon after their creation signals a potential shift to near-real-time unauthorized disclosures.

article thumbnail

Lazarus Group's 'DeathNote' Cluster Pivots to Defense Sector

Dark Reading

Usually focused on going after cryptocurrency organizations, the threat actor has begun targeting defense companies around the world.

89
article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q1 2023

IT Governance

Welcome to our first quarterly review of security incidents for 2023, in which we take a closer look at the information gathered in our monthly list of data breaches and cyber attacks. In this article, you’ll find an overview of the cyber security landscape from the past three months, including the latest statistics and our observations. This includes year-on-year comparisons in the number of publicly disclosed data breaches, a review of the most breached sectors and a running total of incidents

article thumbnail

Microsoft: NSO Group-Like 'QuaDream' Actor Selling Mobile Spyware to Governments

Dark Reading

Researchers at Microsoft have discovered links between a threat group tracked as DEV-0196 and an Israeli private-sector company, QuaDream, that sells a platform for exfiltrating data from mobile devices.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Connect with OpenText at Smarter Faster Payments 2023

OpenText Information Management

The Nacha Smarter Faster Payments Conference is one of the leading events in the payments industry. The annual conference brings together experts, innovators, and practitioners from across the payments landscape to explore the latest trends, technologies, and innovations in the constantly evolving world of financial services. This year’s conference will be held in person in … The post Connect with OpenText at Smarter Faster Payments 2023 appeared first on OpenText Blogs.

article thumbnail

Gartner: Human-Centric Design Is Top Cybersecurity Trend for 2023

Dark Reading

In order to reduce cybersecurity risks and failures, organizations will need to focus on employees, management, and new operating models.

article thumbnail

Using Freeform in the classroom with Jamf Teacher

Jamf

The Freeform app is a popular new tool from Apple which enables iPhone, iPad and Mac users to visually collaborate, providing a shared space for brainstorming. Learn how you can make it even better for the classroom with Jamf Teacher.

IT 52
article thumbnail

Google Tackles Open Source Security With New Dependency Service

Dark Reading

With deps.dev API and Assured OSS, Google is addressing the common challenges software developers face in securing the software supply chain.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data management in manufacturing: the difference between being data-driven and data-burdened

CGI

In today's digital world, the ability to create business value from data makes it one of the most prized assets of any organization. With the right data, businesses can make informed decisions, improve operations and gain a competitive advantage, to name just some of the benefits.

article thumbnail

Data on 400K Kodi Forum Members Stolen and Put Up for Sale

Dark Reading

Open source media player Kodi still hasn't recovered its forum and plans to redeploy it on a new server with software update.

Sales 83
article thumbnail

Are you asking the right questions to build your manufacturing data strategy?

CGI

In today's fast-paced and highly competitive manufacturing landscape, data has become an essential resource for running a business. Making the most of what’s fast becoming almost unlimited data reserves requires a well-defined data strategy. It can help manufacturers achieve their goals, whether it is to better understand customers, improve operational efficiency and resilience, or drive profitable growth.

article thumbnail

When Banking Laws Don't Protect Consumers From Cybertheft

Dark Reading

If attackers use your stolen login information or set up wire transfers, you might be out of luck.

85
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Enterprise intelligence: Going from “data rich” to “insights rich” in manufacturing

CGI

Enterprise intelligence is foundational to becoming a truly data-driven organization. It refers to the collection, analysis and dissemination of data and information within an organization to support informed decision-making. But how can you harness it?

article thumbnail

CrowdStrike Expands Falcon to Include IoT

Dark Reading

CrowdStrike Falcon Insight for IoT covers Internet of Things, Industrial IoT, Operations Technology, as well as medical devices.

IoT 73
article thumbnail

How to Prevent Data Breaches in Healthcare

Record Nations

Healthcare has become a prime target for cyber criminals. In 2022, 94% of organizations reported experiencing a cyber attack. Thankfully, not all of them ended in success. However, it illustrates the degree of risk facing healthcare organizations in the digital space. So how can a healthcare organization work to prevent costly and damaging data breaches?