Thu.Feb 16, 2023

article thumbnail

Kia and Hyundai Fix TikTok Security Challenge

Data Breach Today

Vulnerability Potentially Caused Deaths and Thousands of Thefts in the US Hyundai and Kia are rolling out a software update aimed at stopping an outbreak of car thefts caused by a trend on social media app TikTok. The "Kia Challenge" went viral in mid-2022 after users discovered how to steal certain cars using a screwdriver and a male USB Type A connector.

Security 273
article thumbnail

ChatGPT Is Ingesting Corporate Secrets

Schneier on Security

Interesting : According to internal Slack messages that were leaked to Insider , an Amazon lawyer told workers that they had “already seen instances” of text generated by ChatGPT that “closely” resembled internal company data. This issue seems to have come to a head recently because Amazon staffers and other tech workers throughout the industry have begun using ChatGPT as a “ coding assistant ” of sorts to help them write or improve strings of code, the report

IT 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Forcepoint CEO on How SSE Eases Unified Policy Application

Data Breach Today

Manny Rivelo on Leveraging SSE to Apply Access, Threat and DLP Policies Everywhere Forcepoint's new Security Service Edge offering allows clients to apply access, threat or data loss protection policies across all channels as soon as they're implemented. The firm long offered DLP, SD-WAN, SWG and CASB tools, but the lack of full integration made it tough to apply unified policies.

Access 167
article thumbnail

Bring-Your-Own-Device Programs: A Balance Between Privacy and Cybersecurity

Data Protection Report

A ”bring your own device” ( BYOD ) program is a popular arrangement used by employers, whereby employees use their personal devices (e.g., smartphones, laptops, or tablets) for both personal and business purposes. Last year, about two-thirds of Canadian private sector employers had at least one employee using personal devices for business-related activities. [1] While the BYOD approach may offer certain advantages, such as greater flexibility and cost savings, employers should be mindful of the

Privacy 124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Webinar | Third-Party Risk, ChatGPT & Deepfakes: Defending Against Today's Threats

Data Breach Today

In today's rapidly evolving threat landscape, cyber attacks are becoming more sophisticated, with spear phishing attacks now the most common way for cybercriminals to enter an organization. With the advent of new technologies like ChatGPT and Deepfakes, the situation is only getting worse. ChatGPT is being used to write compelling and grammatically correct emails to launch phishing attacks, while Deepfakes are being used to commit fraud and manipulate employees.

Risk 144

More Trending

article thumbnail

2022 Cyberattack Has Cost CommonSpirit $150 Million So Far

Data Breach Today

Hospital Chain Discloses Impact of Ransomware Attack in Financial Report A ransomware incident last fall that disrupted some of hospital chain CommonSpirit's operations for at least a month has cost the organization $150 million in lost revenue, remediation and other expenses so far. CommonSpirit also likely faces additional legal expenses.

article thumbnail

Master modern work with intelligent, connected, secure and responsible experiences

OpenText Information Management

No matter your industry or business function, whether you’re dealing with highly complex and regulated processes like clinical trials; simply need to automate manual data entry into everyday tools; or want a fast track to the cloud, seamlessly connecting content to process is essential to meet the demands of modern work. With Cloud Edition (CE) … The post Master modern work with intelligent, connected, secure and responsible experiences appeared first on OpenText Blogs.

Security 104
article thumbnail

US Takes Aim at Illicit Advanced Technology Reaching China

Data Breach Today

Disruptive Technology Strike Force Set to Target Governments Abusing Tech The U.S. government on Thursday unveiled a task force aimed at preventing advanced technology from reaching repressive regimes, including the People's Republic of China. The task force will be led by personnel in the departments of Justice and Commerce.

article thumbnail

Window Snyder's Start-up Launches Security Platform for IoT Device Makers

Dark Reading

Thistle's technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says.

IoT 102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ukraine Withstands Torrent of Russian Cyberattacks

Data Breach Today

Wipers and Phishing Attacks Rose Steeply in 2022 Russian military intelligence agency hackers walloped Ukraine with waves of data wipers and phishing attacks, but the torrent of destructive cyberattacks doesn't appear to have been as effective as previous Russian cyberattacks, report researchers from the Google Threat Analysis Group and Mandiant.

Military 144
article thumbnail

Mirai V3G4 botnet exploits 13 flaws to target IoT devices

Security Affairs

During the second half of 2022, a variant of the Mirai bot, tracked as V3G4, targeted IoT devices by exploiting tens of flaws. Palo Alto Networks Unit 42 researchers reported that a Mirai variant called V3G4 was attempting to exploit several flaws to infect IoT devices from July to December 2022. Below is the list of vulnerabilities exploited by V3G4: CVE-2012-4869 : FreePBX Elastix Remote Command Execution Vulnerability Gitorious Remote Command Execution Vulnerability CVE-2014-9727 : FRITZ!

IoT 98
article thumbnail

Ukraine Withstands Rain of Russian Cyberattacks

Data Breach Today

Wipers and Phishing Attacks Rose Steeply in 2022 Russian military intelligence agency hackers walloped Ukraine with waves of data wipers and phishing attacks but the wave of destructive cyberattacks doesn't appear to have been as impactful as previous Russian cyberattacks, report researchers from the Google Threat Analysis Group and Mandiant.

Military 130
article thumbnail

CISA adds Cacti, Office, Windows and iOS bugs to its Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added actively exploited flaws in Cacti framework, Microsoft Office, Windows, and iOS to its Known Exploited Vulnerabilities Catalog. US CISA added the following actively exploited flaws to its Known Exploited Vulnerabilities Catalog : CVE-2022-46169 – Cacti is an open-source platform that provides a robust and extensible operational monitoring and fault management framework for users.

IT 97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Shining a light: How Collibra’s BLEND Community is celebrating Black and African American leaders this Black History Month

Collibra

Creating a shared understanding of data starts with considering a wide range of perspectives. That’s why authenticity and belonging are embedded into our culture. This Black History Month, Collibrians around the globe are honoring the Black and African American community’s countless contributions by celebrating the accomplishments of Black and African American leaders — including leaders at Collibra.

article thumbnail

Hyundai and Kia to patch a flaw that allows the theft of the cars with a USB cable

Security Affairs

Hyundai and Kia car makers are releasing an emergency software update to fix a flaw that can allow stealing a car with a USB cable. Carmakers Hyundai and KIA are rolling out an emergency update for the software shipped with several car models. The update addresses a bug that can be exploited by thieves to steal the impacted vehicles. The anti-theft software upgrade rolled out by the company aims at preventing the vehicles from starting during a method of theft that was shared on TikTok and other

Access 95
article thumbnail

[HEADS UP] Russian Hacker Group Launches New Spear Phishing Campaign with Targets in US and Europe

KnowBe4

The Russian-based hacking group Seaborgium is at it again with increased spear phishing attacks targeting US and European countries in the last year.

article thumbnail

Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after

Security Affairs

ESXiArgs ransomware continues to spread in Europe, most of the recent infections were observed in France, Germany, the Netherlands, the UK, and Ukraine Researchers from Censys reported that more than 500 hosts have been infected in a new wave of ESXiArgs ransomware attacks, most of which are in France, Germany, the Netherlands, and the U.K. “Over the last few days, Censys has observed just over 500 hosts newly infected with ESXiArgs ransomware, most of which are in France, Germany, the Net

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 335

Troy Hunt

No cyber. It's literally a "cyber-free" week, as least far as the term relates to security things. Instead, I'm unboxing an armful of Insta360 goodies and lamenting the state of IoT whilst putting even more IoT things into our massive garage renovation. I'm enjoying it though. Honestly. I think. References The Ubiquiti AI Bullet camera with license plate recognition is.

IoT 80
article thumbnail

New MortalKombat ransomware employed in financially motivated campaign

Security Affairs

Talos researchers observed a financially motivated threat actor using a new ransomware dubbed MortalKombat and a clipper malware named Laplas. Since December 2022, Cisco Talos researchers have been observing an unidentified financially motivated threat actor deploying two new malware, the recently discovered MortalKombat ransomware and a GO variant of the Laplas Clipper malware.

article thumbnail

Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats

Dark Reading

It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.

article thumbnail

Protect your “anywhere” workforce from web-based threats

OpenText Information Management

The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without secure, private, and visible control over internet traffic, it can expose organizations to a wide range of security threats. This is a top concern because 1 in 4 malicious URLs is hosted on an otherwise … The post Protect your “anywhere” workforce from web-based threats appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Atlassian: Leaked Data Stolen via Third-Party App

Dark Reading

SiegedSec threat group leaked data that Atlassian says was taken from app used to coordinate in-office resources.

88
article thumbnail

Improve agent experience to impact total customer experience

OpenText Information Management

Many organizations have spent a great deal of focus and technological investments to improve overall customer experience. The practice of customer experience (CX) management focuses on designing and delivering a positive customer experience throughout their interactions with a company. It includes improving the usability of a website, providing personalized customer service, streamlining the checkout process, … The post Improve agent experience to impact total customer experience appeared

article thumbnail

SideWinder APT Spotted Stealing Crypto

Dark Reading

The nation-state threat group has been attacking a wider range of victims and regions than previously thought.

89
article thumbnail

How to accelerate the move to the SAP Cloud

OpenText Information Management

With the ever-changing technology landscape, more and more organizations are moving their operations to the cloud, many of which are partnering with SAP as part of SAP RISE. For some of these organizations, in order to embrace the cloud and all it has to offer, they must first decide what to do with the dozens … The post How to accelerate the move to the SAP Cloud appeared first on OpenText Blogs.

Cloud 57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Simplify to Survive: How Organizations Can Navigate Cyber-Risk

Dark Reading

Simplification can result in efficiencies, reduced overhead, and the ability to respond to cyber threats more quickly.

Risk 84
article thumbnail

Simplify security through a scalable platform for MSPs and SMBs

OpenText Information Management

Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with the tools that make it easy, effective, and efficient to keep your business customers secure. When it comes to managing cybersecurity, we understand our MSP partners need vendor solutions that help unify your security tools … The post Simplify security through a scalable platform for MSPs and SMBs appeared first on OpenText Blogs.

article thumbnail

ESXi Ransomware Update Outfoxes CISA Recovery Script

Dark Reading

New ESXiArgs-ransomware attacks include a workaround for CISA's decryptor, researchers find.