Tue.Jan 23, 2024

article thumbnail

Medical Lab Database Exposed 1.3M Records, COVID Test Info

Data Breach Today

Researcher Reported Configuration Issue to Cloud Vendor After Lab Failed to Respond An unsecured database appearing to belong to a Netherlands-based medical laboratory exposed 1.3 million records on the internet, including COVID test results and other personal identifiable information, said a security researcher who discovered the trove and reported his findings to the company.

Cloud 286
article thumbnail

Navigating Your Career Path with Challenges and Supports

AIIM

I love information management! I love the information governance, records management, and data governance fields. Most of my family and friends think I’m crazy and I would agree with them. This work doesn’t excite everyone. I didn’t always use to be in this field though. Before entering the information management field, I spent 25 years in higher education.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia, US, UK Sanction Russian Over 2022 Medibank Breach

Data Breach Today

Governments Accuse Aleksandr Ermakov and REvil of Being Medibank Hackers The United States, Australia and the United Kingdom sanctioned a Russian man the governments say was behind the October 2022 hacking of Medibank, Australia's largest private health insurer. The attack was a high point in a wave of data breaches buffeting the country that year.

Insurance 284
article thumbnail

Black Basta gang claims the hack of the UK water utility Southern Water

Security Affairs

The Black Basta ransomware gang claimed to have hacked the UK water utility Southern Water, a major player in the UK water industry. Southern Water is a private utility company responsible for collecting and treating wastewater in Hampshire, the Isle of Wight, West Sussex, East Sussex and Kent, and for providing public water supply to approximately half of this area.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Malicious Traffic Distribution System Spotted by Researchers

Data Breach Today

Cybercrime Groups Hire VexTrio to Help Route Victims to Their Malicious Content As if the cybercrime ecosystem wasn't already damaging enough, security researchers have discovered a malicious traffic broker named VexTrio, which affiliates hire to route victims to their malicious content that is often disguised via fake dating site profiles, tech support or browser updates.

Security 279

More Trending

article thumbnail

UK Intelligence Agency Warns of Mounting AI Cyberthreat

Data Breach Today

British Lawmakers Call on Government to Boost Protections From AI Scams Generative artificial intelligence-enabled ransomware and nation-state hacks in the United Kingdom are "almost certainly" likely to surge after this year, the National Cyber Security Center warned. And British lawmakers called on the government to roll out measures to prevent AI scams.

article thumbnail

News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

The Last Watchdog

Washington D.C. Jan. 22, 2024 – Today, the National Cybersecurity Alliance (NCA) , announced the program for its third annual Data Privacy Week campaign, which will take place from January 22nd to January 27th. Throughout the week, NCA will emphasize the critical significance of digital privacy for both consumers and businesses through a series of educational webinars featuring experts from various industries. “Knowing how to safeguard your personal information has never been more i

article thumbnail

AI Automation Won't Steal All Jobs, for Now

Data Breach Today

Study Looks at Impact of AI on Tasks Requiring Visual Processing Artificial intelligence may not steal our jobs just yet, but only because humans are currently cheaper to employ. Many of the human jobs that could be replaced with AI are not "economically beneficial" to automate - at least for now - say researchers at MIT.

article thumbnail

What Should Be on Your AI Wishlist for eDiscovery: Insights from Dave Ruel, VP of Product at Hanzo

Hanzo Learning Center

In the rapidly evolving world of Artificial Intelligence (AI), it's crucial for enterprises to adopt technologies that integrate seamlessly into mission-critical workflows. Understanding the practicalities of this integration, especially in the legal domain, is key. To delve deeper into this topic, I had the opportunity to speak with Dave Ruel, VP of Product at Hanzo.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CISA's Jen Easterly Confirms 'Harrowing' Swatting Attack

Data Breach Today

US Cyber Agency Director Is Latest High-Profile Target of Dangerous Swatting Attack The director of the U.S. Cybersecurity and Infrastructure Security Agency confirmed she was the apparent target of a swatting attack in which police responded to false calls of a shooting at her Virginia residence on Dec. 30, 2023. In a statement, Easterly described the experience as "harrowing.

article thumbnail

UK Government Publishes Draft Code of Practice on Cybersecurity Governance

Hunton Privacy

On January 23, 2024, the UK government announced that it published a draft Code of Practice on cybersecurity governance (the “Code”). The guidelines in the Code are intended to “help directors and senior leaders shore up their defences from cyber threats.” The Code has been designed in partnership with industry directors, cyber and governance experts, and the UK National Cyber Security Centre (NCSC), with a key focus to ensure that organizations have detailed plans in place to respond to and rec

article thumbnail

Hackers Used SIM Swapping to Breach US SEC X Account

Data Breach Today

Hackers Spread Fake News About SEC Approving Spot Bitcoin Exchange-Traded Fund It wasn't a sophisticated hack on Jan. 9 that allowed hackers to briefly take control of an official U.S. Securities and Exchange Commission social media account, the agency said Monday. The hackers simply scammed the account's mobile phone provider in a SIM swap attack.

Security 260
article thumbnail

LoanDepot data breach impacted roughly 16.6 individuals

Security Affairs

Financial services company LoanDepot disclosed a data breach that impacted roughly 16.6 million individuals. LoanDepot is a financial services company that primarily operates as a mortgage lender. It is one of the largest nonbank lenders in the United States. The company provides a range of mortgage and non-mortgage loan products and services. LoanDepot disclosed this week a data breach that impacted roughly 16.6 million individuals.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Unprecedented Cybersecurity Alert: 26 Billion Records Exposed in Mega Data Breach

KnowBe4

Cybernews just reported: In what appears to be a digital tsunami, a colossal data breach has surfaced, unveiling a staggering 26 billion records – a figure that's hard to even fathom.

article thumbnail

Watch out, a new critical flaw affects Fortra GoAnywhere MFT

Security Affairs

Fortra addressed a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) product. Fortra warns customers of a new authentication bypass vulnerability tracked as CVE-2024-0204 (CVSS score 9.8), impacting the GoAnywhere MFT (Managed File Transfer) product. Fortra GoAnywhere Managed File Transfer is a comprehensive solution for secure file transfer, data encryption, and compliance management.

article thumbnail

Side Channels Are Common

Schneier on Security

Really interesting research: “ Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.” Abstract: We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression.

IT 100
article thumbnail

Australian government announced sanctions for Medibank hacker

Security Affairs

The Australian government announced sanctions for a member of the REvil ransomware group for the Medibank hack that occurred in 2022. The Australian government announced sanctions for Aleksandr Gennadievich Ermakov (aka GustaveDore, aiiis_ermak, blade_runner, JimJones), a Russian national who is a member of the REvil ransomware group. The man is responsible for the cyber attacks that in 2022 hit the Australian insurance provider Medibank. “This morning I can announce that Australia has use

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HP CEO Says They Brick Printers That Use Third-Party Ink Because of … Hackers

WIRED Threat Level

The company says it wants to protect you from “viruses.” Experts are skeptical.

IT 123
article thumbnail

Reimagine work with Cloud Editions 24.1

OpenText Information Management

We, at OpenText, are leading the charge in innovative digital transformation, equipping our customers with essential tools to tackle today’s most complex business challenges. The next generation of innovation will be driven by artificial intelligence (AI) and built on information management. We’ve already taken flight with groundbreaking AI capabilities unveiled in Cloud Editions (CE) 23.4, … The post Reimagine work with Cloud Editions 24.1 appeared first on OpenText Blogs.

Cloud 62
article thumbnail

CyberheistNews Vol 14 #04 'Swatting' Becomes the Latest Extortion Tactic in Ransomware Attacks

KnowBe4

'Swatting' Becomes the Latest Extortion Tactic in Ransomware Attacks

article thumbnail

High-volume, scalable, cloud BI service now available on OpenText Public Cloud

OpenText Information Management

Scalable cloud BI service now available In a recent release, we announced that you would soon be able to scale high-volume BI at lightning speed thanks to a new cloud BI service coming soon. Well, that time has come. With release 24.1, OpenText Magellan BI and Reporting – Public Cloud is now available as a … The post High-volume, scalable, cloud BI service now available on OpenText Public Cloud appeared first on OpenText Blogs.

Cloud 62
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Creating an IT Disaster Recovery Plan

Record Nations

Businesses of all sizes create and manage extensive amounts of electronic data. Unexpected events, ranging from natural disasters to cyberattacks, can cripple operations and jeopardize sensitive data. To safeguard your business against such threats, it is crucial to develop a well-thought-out IT disaster recovery plan. In this blog, we will guide you through the key.

IT 59
article thumbnail

OpenText Introduces New ‘COBOL Webinar Wednesdays’ Series 

OpenText Information Management

If mainframe and COBOL are at the heart of your operations, breaking the bounds of mainframe architecture to scale and innovate at speed can seem daunting. Fortunately, you can accelerate your digital transformation journey while staying agile in today’s fast-paced multi-cloud world.  Starting Wednesday, January 24, 2024, OpenText’s Application Modernization experts will launch the first … The post OpenText Introduces New ‘COBOL Webinar Wednesdays’ Series appeared first on OpenText Blogs.

article thumbnail

AI set to transform business – but risks must be addressed

Information Matters

Artificial intelligence is rapidly progressing from a promising technology to an integral part of business, changing how humans and machines interact. With recent advances in AI like chatbots powered by Read more The post AI set to transform business – but risks must be addressed appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

OpenText expands delivery for private generative AI

OpenText Information Management

Cloud (SaaS) and off-cloud SMAX customers can elevate user experiences and cut support costs with OpenText™ IT Operations Aviator. Generative AI Generative AI is a trending topic in ITOps. As Harvard Business Review put it, “AI won’t replace humans—but humans with AI will replace humans without AI.” This quote caught my eye because it succinctly … The post OpenText expands delivery for private generative AI appeared first on OpenText Blogs.

Cloud 57
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Harnessing the Potential of AI to Drive Business Growth

Information Matters

A recent BCG survey of over 1,400 C-suite executives worldwide reveals that while 89% rank AI and generative AI (GenAI) as a top-three priority for 2024, most companies have yet Read more The post Harnessing the Potential of AI to Drive Business Growth appeared first on Information Matters - Where AI Meets Knowledge Management.

52
article thumbnail

Empower QA teams with a modern web user interface

OpenText Information Management

In an era of fast-paced software delivery, you are facing the challenges of reducing costs, accelerating time to market, and sourcing from a diverse and distributed workforce. Testing and quality assurance teams—a critical part of the software delivery organization—demand a productive and flexible work environment. With the latest release of OpenText ALM/Quality Center (ALM/QC), a leading … The post Empower QA teams with a modern web user interface appeared first on OpenText Blogs.

article thumbnail

Tracking the Pulse of Generative AI Adoption: Excitement and Opportunity Tempered by Uncertainty

Information Matters

A quarterly survey of over 2,800 AI leaders by Deloitte reveals persistent excitement about generative AI’s potential paired with uncertainty on managing emerging challenges. Key insights include: High expectations for Read more The post Tracking the Pulse of Generative AI Adoption: Excitement and Opportunity Tempered by Uncertainty appeared first on Information Matters - Where AI Meets Knowledge Management.

52