Tue.Mar 07, 2023

article thumbnail

Sued by Meta, Freenom Halts Domain Registrations

Krebs on Security

The domain name registrar Freenom , whose free domain names have long been a draw for spammers and phishers, has stopped allowing new domain name registrations. The move comes just days after the Dutch registrar was sued by Meta , which alleges the company ignores abuse complaints about phishing websites while monetizing traffic to those abusive domains.

Phishing 238
article thumbnail

Minimizing Privacy Risk From Web Tracking Technologies

Data Breach Today

7 Tips to Reduce Risk to Patients, Beneficiaries and the Organization As healthcare becomes increasingly interconnected, web tracking is easy to overlook but could introduce additional risks to patient privacy. Learn about the different kinds of patient data and the seven recommendations for reducing risk to patients, beneficiaries and the organization.

Risk 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

Dark Reading

More than 4% of employees have put sensitive corporate data into the large language model, raising concerns that its popularity may result in massive leaks of proprietary information.

Security 144
article thumbnail

Germany's 5G Safety Review Could Ban Huawei and ZTE Gear

Data Breach Today

Berlin Reportedly Eyes Chinese Equipment Ban, Would Make Telcos Rip and Replace Germany may belatedly ban Chinese-built telecommunications gear from its 5G networks on national security grounds as the country's Federal Office for Information Security, the BSI, conducts a review. The majority of 5G radio access network equipment in German networks comes from Chinese vendors.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Acer Confirms Data Offered Up for Sale Was Stolen

Dark Reading

An Acer statement confirms that a document server for repair techs was compromised, but says customer data doesn't appear to be part of the leak.

Sales 131

More Trending

article thumbnail

Irish Data Protection Commission Publishes Annual Report for 2022

Hunton Privacy

On March 7, 2023, the Irish Data Protection Commission (“DPC”) published its Annual Report for 2022 (the “Report”). The Report contains details on several areas of the DPC’s work, including complaints from data subjects received by the DPC, personal data breach notifications received by the DPC and statutory inquiries conducted by the DPC. Highlights from the Report include: During 2022, the DPC received 2,700 complaints from data subjects under the General Data Protection Regulation (“GDPR”).

article thumbnail

CrowdStrike Goes Downmarket With Dell Pact, Small Biz Bundle

Data Breach Today

CEO George Kurtz Sees Dell Partnership, E-Commerce Portal As Central to SMB Success CrowdStrike hopes to capture more small and mid-sized organizations through a new product bundle, revamped e-commerce portal and renewed partnership with Dell. CEO George Kurtz says becoming the exclusive endpoint security partner of PC giant Dell will help CrowdStrike reach small businesses.

Security 146
article thumbnail

Catches of the Month: Phishing Scams for March 2023

IT Governance

Welcome to our March 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we’re dedicating our feature to a topic that has been circling the cyber security sector – and many others besides – for some time: AI (artificial intelligence).

Phishing 111
article thumbnail

Arctic Wolf CEO on Incident Response, M&A, Cyber Insurance

Data Breach Today

Nick Schneider Shares How His Firm Can Help Clients Prepare for a Security Incident Arctic Wolf has expanded its security operations platform into threat intelligence, incident response and cyber insurance, says CEO Nick Schneider. The company has focused on putting businesses in the best possible position to answer questions from insurance carriers following a security incident.

Insurance 146
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

[SCAM OF THE WEEK] Is ChatGPT Your Next Financial Advisor?

KnowBe4

ChatGPT, an artificial intelligence (AI) chatbot created by OpenAI, has risen in popularity since its release last year. Now, cybercriminals are using ChatGPT’s popularity to lure you into phishing scams. In one of these scams, cybercriminals try to trick you with a fake new ChatGPT feature.

article thumbnail

US Senators Aim to Block Foreign Tech that Poses Threat

Data Breach Today

Senators Target TikTok and Other Chinese Companies in White House Backed Bill A dozen U.S. senators on Tuesday introduced legislation backed by the White House charging the federal government with initiating a process to systematically block foreign technology from reaching the domestic market when the tech poses a national security threat.

Marketing 146
article thumbnail

Remcos RAT Spyware Scurries Into Machines via Cloud Servers

Dark Reading

Attackers use phishing emails that appear to come from reputable organizations, dropping the payload using public cloud servers and an old Windows UAC bypass technique.

Cloud 101
article thumbnail

Scrutiny Over Health Data Tracking, Disclosures Grows

Data Breach Today

Regulators and Legislators Paying Closer Attention to Privacy Controversies Privacy concerns involving the tracking, collection and disclosure of sensitive health data of consumers - without their knowledge or consent - remain top enforcement priorities for federal regulators, as well as top legislative fodder for some members of Congress.

Privacy 146
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What does 2023 hold for manufacturers?

CGI

Instead of simply pruning assets, forward-looking manufacturers are looking to advance digital transformation and use technology to improve efficiency, innovation and agility for more holistic revenue growth.

article thumbnail

Hacker Cracks Toyota Customer Search Tool

Dark Reading

Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.

article thumbnail

Technology Trends and RFID in 2023

RFID Global Solution, Inc.

Gartner identified a list of 10 strategic technology trends that organizations should explore in 2023. The list was presented at the Gartner IT Symposium/Xpo and focused on four themes: Sustainability, and trends to help organizations Optimize, Scale and be a Pioneer in their industries. Key trends include Applied Observability, Adaptive AI and Wireless Value Realization, … Technology Trends and RFID in 2023 Read More » The post Technology Trends and RFID in 2023 appeared first on RFID Gl

IT 97
article thumbnail

Expert released PoC exploit code for critical Microsoft Word RCE flaw

Security Affairs

Security researcher released a proof-of-concept exploit code for a critical flaw, tracked as CVE-2023-21716, in Microsoft Word. Security researcher Joshua Drake released a proof-of-concept for a critical vulnerability, tracked as CVE-2023-21716 (CVSS score 9.8 out of 10), in Microsoft Word. The vulnerability can be exploited by a remote attacker to execute arbitrary code on a system running the vulnerable software.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Prompt Injection Attacks on Large Language Models

Schneier on Security

This is a good survey on prompt injection attacks on large language models (like ChatGPT). Abstract: We are currently witnessing dramatic advances in the capabilities of Large Language Models (LLMs). They are already being adopted in practice and integrated into many systems, including integrated development environments (IDEs) and search engines. The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unass

Paper 97
article thumbnail

LastPass hack caused by an unpatched Plex software on an employee’s PC

Security Affairs

The LastPass data breach was caused by the failure to update Plex on the home computer of one of the company updates. The security breach suffered by LastPass was caused by the failure to update Plex on the home computer of one of its engineers. Recently, the password management software firm disclosed a “second attack,” a threat actor used data stolen from the August security breach and combined it with information available from a third-party data breach.

article thumbnail

Practical steps for businesses to comply with Bill C-27: part 2

Data Protection Report

In our previous update , we summarized key operational elements that businesses should be aware of under the proposed Consumer Privacy Protection Act (CPPA), and provided practical tips to help businesses comply with these new requirements. As currently drafted, the CPPA codifies a number of best practices and recommendations issued by the Office of the Privacy Commissioner of Canada under the Personal Information Protection and Electronic Documents Act.

Privacy 95
article thumbnail

Data Protection for Small Business – Laws Companies Need to Know

Record Nations

Data protection for small businesses is crucial in today’s digital age. Privacy legislation is constantly evolving, both on the professional and consumer side of business. These law changes often have repercussions for companies large and small. Making it even more complicated, these data regulations can change based on your number of employees, your annual revenue, […] The post Data Protection for Small Business – Laws Companies Need to Know appeared first on Record Nations.

Privacy 94
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Acer discloses a new data breach, 160 GB of sensitive data available for sale

Security Affairs

Taiwanese multinational hardware and electronics corporation Acer discloses a data breach after a threat actor claimed the hack of the company. Recently a threat actor announced the availability for sale of 160 GB of data allegedly stolen from the Taiwanese multinational hardware and electronics corporation Acer. The threat actor announced the hack on a popular cybercrime forum, he claims to have stolen about 2869 files.

article thumbnail

Tech Giants Go Cloud-Native Shopping

Dark Reading

Cisco’s acquisition of cloud-native firewall provider Valtix and HPE’s deal to buy SSE provider Axis Security fill gaps in their existing portfolios.

Cloud 93
article thumbnail

SYS01 stealer targets critical government infrastructure

Security Affairs

Researchers discovered a new info stealer dubbed SYS01 stealer targeting critical government infrastructure and manufacturing firms. Cybersecurity researchers from Morphisec discovered a new, advanced information stealer, dubbed SYS01 stealer, that since November 2022 was employed in attacks aimed at critical government infrastructure employees, manufacturing companies, and other sectors.

article thumbnail

Hiatus Campaign Infects DrayTek Gear for Cyber Espionage, Proxy Control

Dark Reading

Two novel malware binaries, including "HiatusRAT," offer unique capabilities that point to the need for better security for companies' router infrastructure.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

VMware NSX Manager bugs actively exploited in the wild since December

Security Affairs

Security researchers warn of hacking attempts in the wild exploiting critical vulnerabilities in VMware NSX Manager. Cyber security firm Wallarm is warning of ongoing attacks exploiting the critical flaws, tracked as CVE-2021-39144 (CVSS score of 9.8) and CVE-2022-31678 (CVSS score of 9.1), in VMware NSX Manager. VMware NSX is a network virtualization solution that is available in VMware vCenter Server.

article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Penetration tests are simulated cyber attacks executed by white hat hackers on systems and networks. The goal of these simulations is to detect vulnerabilities, misconfigurations, errors, and other weaknesses that real attackers could exploit. Pentesters work closely with the organization whose security posture they are hired to improve. There are different types of penetration tests, methodologies and best practices that need to be followed for optimal results, and we’ll cover those here.

article thumbnail

How Denmark’s Welfare State Became a Surveillance Nightmare

WIRED Threat Level

Once praised for its generous social safety net, the country now collects troves of data on welfare claimants.

IT 101