Fri.Jun 21, 2024

article thumbnail

UEFICANHAZBUFFEROVERFLOW flaw in Phoenix SecureCore UEFI firmware potentially impacts hundreds of PC and server models

Security Affairs

A serious vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI firmware potentially impacts hundreds of PC and server models. Firmware security firm Eclypsium discovered a vulnerability, tracked as CVE-2024-0762 (CVSS of 7.5), in the Phoenix SecureCore UEFI firmware. The issue, called UEFIcanhazbufferoverflow , potentially impacts hundreds of PC and server models that use Intel Core desktop and mobile processors.

Security 335
article thumbnail

Corpay, UHN Secure Hybrid Cloud Infrastructure With Gigamon

Data Breach Today

How Gigamon's Technical Capabilities Boost Organizations' Cybersecurity Network security threats are ever-evolving, and all types of organizations work hard to face down emerging threats while maintaining robust performance across their hybrid cloud infrastructure. In this quest, Gigamon stands out as a critical ally.

Cloud 293
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT Nobelium targets French diplomatic entities

Security Affairs

French information security agency ANSSI reported that Russia-linked threat actor Nobelium is behind a series of cyber attacks that targeted French diplomatic entities. The French information security agency ANSSI reported that Russia-linked APT Nobelium targeted French diplomatic entities. Despite the French agency linked the attacks to the cyberespionage group Nobelium (aka APT29 , SVR group , Cozy Bear , Midnight Blizzard , BlueBravo , and The Dukes ), ANSSI differentiates these groups i

Phishing 332
article thumbnail

Australia Optus 2022 Data Breach 'Not Highly Sophisticated'

Data Breach Today

Hackers Exploited Coding Error, Says Australian Communications and Media Authority Hackers behind the leak of 10 million records from Australia's second-largest telecommunications carrier Optus exploited a vulnerability the company unwittingly inserted four years earlier into a web portal access control, said the Australian Communications and Media Authority.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Perplexity Plagiarized Our Story About How Perplexity Is a B t Machine

WIRED Threat Level

Experts aren't unanimous about whether the AI-powered search startup's practices could expose it to legal claims ranging from infringement to defamation—but some say plaintiffs would have strong cases.

IT 277

More Trending

article thumbnail

Can AI detectors save us from ChatGPT? I tried 6 online tools to find out

Collaboration 2.0

With the sudden arrival of ChatGPT, educators and editors face a worrying surge of automated content submissions. We look at the problem and what can be done about it.

Education 190
article thumbnail

Court: HHS Overstepped HIPAA Authority in Web Tracking Guide

Data Breach Today

Agency Must Drop Updated Guidance Provisions Regarding Certain PHI 'Combinations' A Texas federal court ruled the U.S. Department of Health and Human Services overstepped its authority in guidance warning HIPAA-regulated entities that it's unlawful to use online tracking tools to capture IP addresses in visits to websites containing information about maladies.

IT 275
article thumbnail

News Alert: 1inch partners with Blockaid to enhance Web3 security through the 1inch Shield

The Last Watchdog

Dubai, UAE, June 20, 2024, CyberNewsWire — 1inch , a leading DeFi aggregator that provides advanced security solutions to users across the entire space, has announced today the launch of the 1inch Shield. This solution, that is offering enhanced protection against a wide range of potential threats, was completed in partnership with Blockaid , a major provider of Web3 security tools.

article thumbnail

Apple to Delay AI Rollout in Europe

Data Breach Today

Smartphone Giant Fingers Regulation Meant to Restrain Big Tech Apple said it will delay the rollout of artificial intelligence-powered features on smartphones in Europe in a Friday statement citing European law meant to rein in the power of large tech companies. The smartphone giant said continental customers won't have access this year to Apple Intelligence.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ross Anderson’s Memorial Service

Schneier on Security

The memorial service for Ross Anderson will be held on Saturday, at 2:00 PM BST. People can attend remotely on Zoom.

Security 122
article thumbnail

As Britain's NHS Faces Data Leak, Never Normalize Ransomware

Data Breach Today

Battle the Business Model With Business Resilience Planning, Failover Capabilities Never let ransomware become normalized. Businesses today are more likely that not to be hit by ransomware, but this doesn't mean we should ever let ransomware seem like a new normal, akin to death or taxes. We need expert business resilience and failover capabilities.

article thumbnail

Hacked London NHS hospitals data allegedly published online

The Guardian Data Protection

Cyber-attack earlier this month led to cancellation of almost 1,600 operations and outpatient appointments Data from a ransomware attack has allegedly been published online weeks after the attack halted operations and tests in major London hospitals, NHS England has said. A Russian group carried out the cyber-attack on Synnovis, a private pathology firm that analyses blood tests for Guy’s and St Thomas’ NHS foundation trust (GSTT) and King’s College trust, on 3 June, forcing hospitals in the cap

article thumbnail

ISMG Editors: How Did Medibank's Lack of MFA Cause a Breach?

Data Breach Today

Also: Critical Infrastructure Security and Fortinet's Latest Acquisition In the latest weekly update, ISMG editors discussed critical infrastructure security challenges, a report on the 2022 Medibank breach compromising personal data for 10 million people, and Fortinet's acquisition to integrate Lacework's cloud-native security into its Security Fabric and SASE platform.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Keeper vs Dashlane: Which Should You Use in 2024?

eSecurity Planet

Keeper and Dashlane are top password managers prioritizing multi-layered encryption systems for secure password sharing. Keeper emphasizes extensive security measures and is a more affordable option, while Dashlane promotes a user-friendly interface and robust administrative tools perfect for streamlining logins. To assist you in making your decision, I’ve compared the two solutions, focusing on their distinctive features, use cases, benefits, pros, and cons.

Passwords 103
article thumbnail

Qilin Ransomware Group Leaks NHS Data

Data Breach Today

The Group Published 104 Files It Says Come From NHS Hospitals in London A ransomware group late Thursday published information stolen during an attack that's led to postponed cancer treatment and organ transplant surgeries at two London National Health Service hospitals. The Qilin ransomware group hit Synnovis, a U.K. provider of medical lab services.

article thumbnail

News Alert: INE Security lays out strategies for optimizing security teams to mitigate AI risks

The Last Watchdog

Cary, NC, June 20, 2024, CyberNewsWire — 2024 is rapidly shaping up to be a defining year in generative AI. While 2023 saw its emergence as a potent new technology, business leaders are now grappling with how to best leverage its transformative power to grow efficiency, security, and revenue. With the near-universal integration of AI into global technology, the need for AI-ready cybersecurity teams is more critical than ever.

Risk 100
article thumbnail

Google's Zero-Day Hunters Test AI for Security Research

Data Breach Today

Project Zero Framework Aims to Boost AI Bug Detection Skills Google's team of zero-day hunters say artificial intelligence can lead to improved automated threat identification and analysis. Researchers say that a framework allows LLMs to mimic the iterative, hypothesis-driven approach of human security experts.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Crowd of 1000 packs Cambridge Theatre for Yoto Carnegie Awards Ceremony 2024

CILIP

Crowd of 1000 packs Cambridge Theatre for Yoto Carnegie Awards Ceremony 2024 Group Photo of the winners, from left Joseph Coelho, Tia Fisher, Aaron Becker Verse novels win Medal for Writing and Shadowers’ Award for Writing at the Yoto Carnegies, one of the last remaining, and longest-running, national awards for books for children and young people. Over 1000 attendees including librarians, publishers, sector leaders, and 600 school children attended the awards ceremony at the Cambridge Theatre i

article thumbnail

US Treasury Moves to Limit Investments in Chinese Tech Firms

Data Breach Today

New Rule Would Restrict Americans From Investing in Chinese AI, Semiconductors The U.S. Treasury Department is proposing a new rule that would restrict Americans from investing in technology companies developing quantum information technology, semiconductors and certain AI systems in countries the White House previously identified as posing potential national security risks.

Risk 130
article thumbnail

Changes coming to IG GURU

IG Guru

Good day! Changes are coming to IG GURU! We appreciate your patience. Have a great day! Team IG GURU The post Changes coming to IG GURU first appeared on IG GURU.

63
article thumbnail

Are CISOs of Security Vendors in Your Community?

Lenny Zeltser

Organizing events that gather cybersecurity leaders requires significant effort and sponsorships. Unfortunately, some events and communities exclude CISOs who work for security vendors. This stance, though well-meaning, harms the industry and allows hidden conflicts of interest to go unchecked. Here's why and how we can address this issue to improve such events and the community at large.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Just the Facts: Why Over 2 Million People Prefer Mobile for Door Access Today

HID Global

Mobile credentials are more secure than their plastic counterparts & provide a variety of benefits. Get all the details in this blog post.

Access 52
article thumbnail

Health resource in the digital age

CILIP

Cilip Conference: Health information from YouTube Dr Vishaal Virani, Head of Health at YouTube, UK & Ireland talks to Rob Mackinlay about health content on YouTube, and the role that librarians can play in navigating individuals towards it, ahead of the CILIP Conference on 10 and 11 July. Book your place now. WITH more than three billion views of YouTube health videos in the UK in 2022, the platform has carved itself a role in the nation’s health information landscape and is increasingly foc

article thumbnail

Technology in education: put learning before tech

Jamf

Discover how to choose and integrate technology in schools to enhance learning outcomes. Learn about the key considerations for technology deployment.

article thumbnail

US Pledges ‘Most Powerful’ Security Deal: Can It Fortify Ukraine’s Cyber Defenses?

eSecurity Planet

The war in Ukraine has transcended the physical battlefield, spilling into the digital realm. Since the conflict began, Ukraine has faced a relentless barrage of cyberattacks targeting its critical infrastructure. From power grids to financial institutions, these attacks have aimed to disrupt essential services and sow chaos within the country. In a significant move to bolster Ukraine’s defenses, the United States recently signed a 10-year security agreement hailed as the “most power

IT 110
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Auto Dealerships Using CDK Global Hit With Cyber Disruptions

Data Breach Today

Auto Dealership Tech Firm Confirms System Shutdowns After Multiple Cyber Incidents CDK Global, a leading software and solutions providers for thousands of car dealerships across the United States and Canada, has launched investigations into consecutive cyber incidents that caused disruptions and shutdowns for several days at companies across the North Americas.

264
264
article thumbnail

Friday Squid Blogging: Squid Nebula

Schneier on Security

Beautiful astronomical photo.

94
article thumbnail

CILIP members awarded OBEs in the King’s birthday honours List

CILIP

CILIP members awarded OBEs in the King’s birthday honours List Image of Buckingham Palace by Jimmy Harris, via Flickr Former CILIP CEO Nick Poole, and Honorary Fellow, Joseph Coelho also received OBEs in the 2024 honours list. The tireless efforts and achievements of librarians and information managers have received royal recognition in the 2024 King’s birthday honours List.