Fri.Jun 21, 2024

article thumbnail

Australia Optus 2022 Data Breach 'Not Highly Sophisticated'

Data Breach Today

Hackers Exploited Coding Error, Says Australian Communications and Media Authority Hackers behind the leak of 10 million records from Australia's second-largest telecommunications carrier Optus exploited a vulnerability the company unwittingly inserted four years earlier into a web portal access control, said the Australian Communications and Media Authority.

article thumbnail

News Alert: 1inch partners with Blockaid to enhance Web3 security through the 1inch Shield

The Last Watchdog

Dubai, UAE, June 20, 2024, CyberNewsWire — 1inch , a leading DeFi aggregator that provides advanced security solutions to users across the entire space, has announced today the launch of the 1inch Shield. This solution, that is offering enhanced protection against a wide range of potential threats, was completed in partnership with Blockaid , a major provider of Web3 security tools.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Auto Dealerships Using CDK Global Hit With Cyber Disruptions

Data Breach Today

Auto Dealership Tech Firm Confirms System Shutdowns After Multiple Cyber Incidents CDK Global, a leading software and solutions providers for thousands of car dealerships across the United States and Canada, has launched investigations into consecutive cyber incidents that caused disruptions and shutdowns for several days at companies across the North Americas.

248
248
article thumbnail

Perplexity Plagiarized Our Story About How Perplexity Is a B t Machine

WIRED Threat Level

Experts aren't unanimous about whether the AI-powered search startup's practices could expose it to legal claims ranging from infringement to defamation—but some say plaintiffs would have strong cases.

IT 131
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Change Healthcare Begins to Notify Clients Affected by Hack

Data Breach Today

The Company Will Start Notifying Individuals Affected by the Breach in Late July Change Healthcare says it has begun to notify customers whose data was compromised in the February ransomware attack that affected scores of healthcare providers, health insurance plans and other organizations. The company will begin to notify affected individuals in late July.

Insurance 249

More Trending

article thumbnail

Court: HHS Overstepped HIPAA Authority in Web Tracking Guide

Data Breach Today

Agency Must Drop Updated Guidance Provisions Regarding Certain PHI 'Combinations' A Texas federal court ruled the U.S. Department of Health and Human Services overstepped its authority in guidance warning HIPAA-regulated entities that it's unlawful to use online tracking tools to capture IP addresses in visits to websites containing information about maladies.

IT 226
article thumbnail

Russia-linked APT Nobelium targets French diplomatic entities

Security Affairs

French information security agency ANSSI reported that Russia-linked threat actor Nobelium is behind a series of cyber attacks that targeted French diplomatic entities. The French information security agency ANSSI reported that Russia-linked APT Nobelium targeted French diplomatic entities. Despite the French agency linked the attacks to the cyberespionage group Nobelium (aka APT29 , SVR group , Cozy Bear , Midnight Blizzard , BlueBravo , and The Dukes ), ANSSI differentiates these groups i

Phishing 111
article thumbnail

Corpay, UHN Secure Hybrid Cloud Infrastructure With Gigamon

Data Breach Today

How Gigamon's Technical Capabilities Boost Organizations' Cybersecurity Network security threats are ever-evolving, and all types of organizations work hard to face down emerging threats while maintaining robust performance across their hybrid cloud infrastructure. In this quest, Gigamon stands out as a critical ally.

Cloud 225
article thumbnail

UEFICANHAZBUFFEROVERFLOW flaw in Phoenix SecureCore UEFI firmware potentially impacts hundreds of PC and server models

Security Affairs

A serious vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI firmware potentially impacts hundreds of PC and server models. Firmware security firm Eclypsium discovered a vulnerability, tracked as CVE-2024-0762 (CVSS of 7.5), in the Phoenix SecureCore UEFI firmware. The issue, called UEFIcanhazbufferoverflow , potentially impacts hundreds of PC and server models that use Intel Core desktop and mobile processors.

Security 100
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Apple to Delay AI Rollout in Europe

Data Breach Today

Smartphone Giant Fingers Regulation Meant to Restrain Big Tech Apple said it will delay the rollout of artificial intelligence-powered features on smartphones in Europe in a Friday statement citing European law meant to rein in the power of large tech companies. The smartphone giant said continental customers won't have access this year to Apple Intelligence.

article thumbnail

Ross Anderson’s Memorial Service

Schneier on Security

The memorial service for Ross Anderson will be held on Saturday, at 2:00 PM BST. People can attend remotely on Zoom.

Security 115
article thumbnail

As Britain's NHS Faces Data Leak, Never Normalize Ransomware

Data Breach Today

Battle the Business Model With Business Resilience Planning, Failover Capabilities Never let ransomware become normalized. Businesses today are more likely that not to be hit by ransomware, but this doesn't mean we should ever let ransomware seem like a new normal, akin to death or taxes. We need expert business resilience and failover capabilities.

article thumbnail

Hacked London NHS hospitals data allegedly published online

The Guardian Data Protection

Cyber-attack earlier this month led to cancellation of almost 1,600 operations and outpatient appointments Data from a ransomware attack has allegedly been published online weeks after the attack halted operations and tests in major London hospitals, NHS England has said. A Russian group carried out the cyber-attack on Synnovis, a private pathology firm that analyses blood tests for Guy’s and St Thomas’ NHS foundation trust (GSTT) and King’s College trust, on 3 June, forcing hospitals in the cap

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

ISMG Editors: How Did Medibank's Lack of MFA Cause a Breach?

Data Breach Today

Also: Critical Infrastructure Security and Fortinet's Latest Acquisition In the latest weekly update, ISMG editors discussed critical infrastructure security challenges, a report on the 2022 Medibank breach compromising personal data for 10 million people, and Fortinet's acquisition to integrate Lacework's cloud-native security into its Security Fabric and SASE platform.

article thumbnail

Crowd of 1000 packs Cambridge Theatre for Yoto Carnegie Awards Ceremony 2024

CILIP

Crowd of 1000 packs Cambridge Theatre for Yoto Carnegie Awards Ceremony 2024 Group Photo of the winners, from left Joseph Coelho, Tia Fisher, Aaron Becker Verse novels win Medal for Writing and Shadowers’ Award for Writing at the Yoto Carnegies, one of the last remaining, and longest-running, national awards for books for children and young people. Over 1000 attendees including librarians, publishers, sector leaders, and 600 school children attended the awards ceremony at the Cambridge Theatre i

article thumbnail

Qilin Ransomware Group Leaks NHS Data

Data Breach Today

The Group Published 104 Files It Says Come From NHS Hospitals in London A ransomware group late Thursday published information stolen during an attack that's led to postponed cancer treatment and organ transplant surgeries at two London National Health Service hospitals. The Qilin ransomware group hit Synnovis, a U.K. provider of medical lab services.

article thumbnail

Can AI detectors save us from ChatGPT? I tried 6 online tools to find out

Collaboration 2.0

With the sudden arrival of ChatGPT, educators and editors face a worrying surge of automated content submissions. We look at the problem and what can be done about it.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Google's Zero-Day Hunters Test AI for Security Research

Data Breach Today

Project Zero Framework Aims to Boost AI Bug Detection Skills Google's team of zero-day hunters say artificial intelligence can lead to improved automated threat identification and analysis. Researchers say that a framework allows LLMs to mimic the iterative, hypothesis-driven approach of human security experts.

article thumbnail

Are CISOs of Security Vendors in Your Community?

Lenny Zeltser

Organizing events that gather cybersecurity leaders requires significant effort and sponsorships. Unfortunately, some events and communities exclude CISOs who work for security vendors. This stance, though well-meaning, harms the industry and allows hidden conflicts of interest to go unchecked. Here's why and how we can address this issue to improve such events and the community at large.

article thumbnail

US Treasury Moves to Limit Investments in Chinese Tech Firms

Data Breach Today

New Rule Would Restrict Americans From Investing in Chinese AI, Semiconductors The U.S. Treasury Department is proposing a new rule that would restrict Americans from investing in technology companies developing quantum information technology, semiconductors and certain AI systems in countries the White House previously identified as posing potential national security risks.

Risk 130
article thumbnail

Changes coming to IG GURU

IG Guru

Good day! Changes are coming to IG GURU! We appreciate your patience. Have a great day! Team IG GURU The post Changes coming to IG GURU first appeared on IG GURU.

82
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

CILIP members awarded OBEs in the King’s birthday honours List

CILIP

CILIP members awarded OBEs in the King’s birthday honours List Image of Buckingham Palace by Jimmy Harris, via Flickr Former CILIP CEO Nick Poole, and Honorary Fellow, Joseph Coelho also received OBEs in the 2024 honours list. The tireless efforts and achievements of librarians and information managers have received royal recognition in the 2024 King’s birthday honours List.

article thumbnail

Just the Facts: Why Over 2 Million People Prefer Mobile for Door Access Today

HID Global

Mobile credentials are more secure than their plastic counterparts & provide a variety of benefits. Get all the details in this blog post.

Access 52
article thumbnail

Technology in education: put learning before tech

Jamf

Discover how to choose and integrate technology in schools to enhance learning outcomes. Learn about the key considerations for technology deployment.

article thumbnail

Keeper vs Dashlane: Which Should You Use in 2024?

eSecurity Planet

Keeper and Dashlane are top password managers prioritizing multi-layered encryption systems for secure password sharing. Keeper emphasizes extensive security measures and is a more affordable option, while Dashlane promotes a user-friendly interface and robust administrative tools perfect for streamlining logins. To assist you in making your decision, I’ve compared the two solutions, focusing on their distinctive features, use cases, benefits, pros, and cons.

Passwords 103
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Health resource in the digital age

CILIP

Cilip Conference: Health information from YouTube Dr Vishaal Virani, Head of Health at YouTube, UK & Ireland talks to Rob Mackinlay about health content on YouTube, and the role that librarians can play in navigating individuals towards it, ahead of the CILIP Conference on 10 and 11 July. Book your place now. WITH more than three billion views of YouTube health videos in the UK in 2022, the platform has carved itself a role in the nation’s health information landscape and is increasingly foc

article thumbnail

US Pledges ‘Most Powerful’ Security Deal: Can It Fortify Ukraine’s Cyber Defenses?

eSecurity Planet

The war in Ukraine has transcended the physical battlefield, spilling into the digital realm. Since the conflict began, Ukraine has faced a relentless barrage of cyberattacks targeting its critical infrastructure. From power grids to financial institutions, these attacks have aimed to disrupt essential services and sow chaos within the country. In a significant move to bolster Ukraine’s defenses, the United States recently signed a 10-year security agreement hailed as the “most power

IT 109
article thumbnail

US Sanctions 12 Kaspersky Executives

Data Breach Today

Sanctions Comes After Biden Administration Banned the Russian Cybersecurity Firm Senior executives of Russian cybersecurity firm Kaspersky face new restrictions against doing business in Western countries following an announcement Friday morning by the U.S. Department of the Treasury that it sanctioned 12 of them. Those sanctioned do not include company CEO Eugene Kaspersky.