Wed.Dec 13, 2023

article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

Notable progress was made in 2023 in the quest to elevate Digital Trust. Related: Why IoT standards matter Digital Trust refers to the level of confidence both businesses and consumers hold in digital products and services – not just that they are suitably reliable, but also that they are as private and secure as they need to be. We’re not yet at a level of Digital Trust needed to bring the next generation of connected IT into full fruition – and the target keeps moving.

article thumbnail

Ransomware Groups' Latest Tactic: Weaponized Marketing

Data Breach Today

'Oxygen of Publicity' Helps Intimidate Victims and Recruit Affiliates, Experts Warn Seeking to maximize profits no matter the cost, ransomware groups have been bolstering their technical prowess and psychological shakedowns with a fresh strategy: attempting to control the narrative. Experts are warning security researchers and journalists to beware being co-opted.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Reaches Historical Agreement on AI Act

Data Matters

On 8 December 2023 — following three days of lengthy and intensive negotiations — EU legislators reached political agreement on the world’s first stand-alone law regulating AI: the EU’s AI Act. The EU considers the AI Act as one of its key pieces of legislation and fundamental to ensuring the EU becomes the world’s leading digital economy. The EU aims for the AI Act to have the same ‘Brussels effect’ as the GDPR — in other words, to have a significant impact on global markets and practices.

GDPR 166
article thumbnail

FCC Approves Major Updates to Data Breach Notification Rules

Data Breach Today

New FCC Disclosure Rules Cover All Personal Information of Telecom Customers The FCC approved new guidelines that note how data breaches "have only grown in frequency and severity" since the commission adopted its privacy protection policies 16 years ago. The new rules aim to provide customers and law enforcement with real-time information about critical security incidents.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

China-linked APT Volt Typhoon linked to KV-Botnet

Security Affairs

Researchers linked a sophisticated botnet, tracked as KV-Botnet, to the operation of the China-linked threat actor Volt Typhoon. The Black Lotus Labs team at Lumen Technologies linked a small office/home office (SOHO) router botnet, tracked as KV-Botnet to the operations of China-linked threat actor Volt Typhoon. The botnet is comprised of two complementary activity clusters, the experts believe it has been active since at least February 2022.

More Trending

article thumbnail

December 2023 Microsoft Patch Tuesday fixed 4 critical flaws

Security Affairs

Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products, including a zero-day. Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products. The vulnerabilities addressed by the company impact Microsoft Windows and Windows Components; Office and Office Components; Azure, Microsoft Edge (Chromium-based); Windows Defender; Windows DNS and DHCP server; and Microsoft Dynamic.

Security 119
article thumbnail

Congressional Watchdog Finds Gaps in US Federal AI Efforts

Data Breach Today

Agencies Plan More than 1,200 AI Use Cases Major government agencies in the United States intend to apply artificial intelligence, but the majority of planned use cases are still at the planning stage, a congressional watchdog said. Missing from those efforts is governmentwide guidance on the acquisition and use of AI technologies.

article thumbnail

Phishing Remains the Most Common Attack Technique, With Malicious URL Use Increasing 144%

KnowBe4

Analysis of nearly a year’s worth of emails brings insight into exactly what kinds of malicious content are being used, who’s being impersonated, and who’s being targeted.

Phishing 118
article thumbnail

Harry Coker to Serve as Second National Cyber Director

Data Breach Today

Senate Confirms Career Naval Officer, Former Head of NSA to Serve in Critical Role Harry Coker is now the second permanent national cyber director after the Senate voted 59-40 to confirm President Joe Biden’s pick to lead the Office of the National Cyber Director. In his new role, Coker will be tasked with implementing the administration’s national cybersecurity strategy.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK Home Office is ignoring the risk of ‘catastrophic ransomware attacks,’ report warns

Security Affairs

A Joint Committee on the National Security Strategy (JCNSS) warns of the high risk of a catastrophic ransomware attack on the UK government. The British government is accused of failing to mitigate the risk of ransomware attacks. According to a parliamentary report published by the Joint Committee on the National Security Strategy (JCNSS) the UK government can face a ‘catastrophic ransomware attack at any moment.’ The report highlighted the superficial approach to cyber security of S

article thumbnail

Microsoft Warns of OAuth Attacks Tied to Cryptomining

Data Breach Today

Microsoft Details OAuth Tactics, Says Losses Reached Up to $1.5M Per Victim Hackers are exploiting OAuth applications to compromise user accounts, manipulate and confer elevated privileges, and set up cryptomining operations, which has cost some organizations up to $1.5 million in losses, according to Microsoft's Threat Intelligence team.

266
266
article thumbnail

Sophos backports fix for CVE-2022-3236 for EOL firewall firmware versions due to ongoing attacks

Security Affairs

Sophos backports the patch for CVE-2022-3236 for end-of-life (EOL) firewall firmware versions due to ongoing attacks exploiting the issue. Sophos backports the fix for the critical code injection vulnerability CVE-2022-3236 for end-of-life (EOL) firewall firmware versions after discovering that threat actors are actively exploiting the flaw in attacks in the wild.

Security 101
article thumbnail

Ukraine Fingers Russian Military Hackers for Kyivstar Outage

Data Breach Today

Telecom Operator Slowly Restores Voice Service Ukraine's domestic security agency on Wednesday fingered Russian military hackers as being responsible for hacking Kyivstar, in a statement acknowledging damage to the telecom operator's digital infrastructure. Ukraine's top telecom operator was the target of a Tuesday cyberattack.

Military 264
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Undercover Threat: North Korean Operatives Infiltrate U.S. Companies Through Job Platforms

KnowBe4

Researchers at Nisos warn that North Korean threat actors are impersonating skilled job seekers in order to obtain remote employment at US companies.

Security 106
article thumbnail

Lawmakers Urge HHS to Shield Pharmacy Records From Police

Data Breach Today

Regulators Advised to Protect Patients From 'Warrantless' Requests on Prescriptions Three members of Congress are urging the Department of Health and Human Services to improve HIPAA privacy protections around pharmacy information. The request comes after the lawmakers asked major pharmacy companies how they handle law enforcement requests for patient records.

Privacy 262
article thumbnail

How To Fight Long-Game Social Engineering

KnowBe4

CISA sent out a warning about a Russian advanced persistent threat (APT) called Star Blizzard warning about their long-game social engineering tactics.

Phishing 105
article thumbnail

2023 Fraud Highlights: Check Fraud, Scams, Account Takeover

Data Breach Today

Jack Henry's Rene Perez on How to Tackle Check Fraud as Tactics Change Check fraud, scams and account takeovers dominated the fraud landscape in 2023. Banks and other financial institutions are expected to continue to struggle with account takeovers as fraudsters have changed their modus operandi, making it difficult to track fraudulent proceeds.

IT 256
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hacker Group Linked to Russian Military Claims Credit for Cyberattack on Kyivstar

WIRED Threat Level

A hacker group calling itself Solntsepek—previously linked to Russia’s notorious Sandworm hackers—says it carried out a disruptive breach of Kyivstar, a major Ukrainian mobile and internet provider.

article thumbnail

Surveillance by the US Postal Service

Schneier on Security

This is not about mass surveillance of mail , this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves : To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, hid a camera inside one of the targeted blue post boxes which captured the suspect’s full face as they allegedly helped themselves to swathes of peoples’ mail.

article thumbnail

Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty

Thales Cloud Protection & Licensing

Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty madhav Thu, 12/14/2023 - 05:18 Earlier this year, Oracle launched its External Key Management Service with Hold Your Own Key (HYOK) functionality from Thales. Oracle’s initiatives include the EU Sovereign Cloud service as well as Distributed Cloud Services such as Oracle Alloy and Dedicated Region – Cloud at Customer solutions.

Cloud 83
article thumbnail

Seven customer service types that organizations should provide

IBM Big Data Hub

Conducting the best customer service strategy today requires organizations to invest in several customer service types. This way, organizations can ensure their customer base receives answers to their problems in the format they prefer. Customer service is an integral part of the customer experience. It has increasingly become an omnichannel discipline where every customer prefers to communicate on varying channels.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Ransomware Sanctions: Do They Have Any Impact?

Thales Cloud Protection & Licensing

Ransomware Sanctions: Do They Have Any Impact? madhav Thu, 12/14/2023 - 05:37 Ransomware is one of the most high-profile and high-value cybercrimes that organizations need to watch out for. These attacks have the potential to cause significant financial, operational, and reputational damage to a company: bad actors cut off access to vital systems, ransoms demanded can be in the millions of dollars, and paying the ransom doesn’t guarantee a resolution.

article thumbnail

How to build a successful procurement strategy

IBM Big Data Hub

The role of procurement extends beyond transactional activities. A procurement strategy allows an organization to navigate an increasingly complex global supply chain, adapt swiftly to market fluctuations, and achieve cost optimization, operational efficiency and growth. By assessing and proactively managing risks inherent in the supply chain , organizations can shield themselves from disruptions and strengthen the resilience of their operations.

article thumbnail

Better data drives better AI results

OpenText Information Management

You: Ice, as an expert AI guide, what do you believe is the most important thing to do to prepare for AI? Ice: If I had to name one thing it would be to get your data ready. The expression “Garbage in, garbage out” applies here—if your data hasn’t been well managed to ensure it’s … The post Better data drives better AI results appeared first on OpenText Blogs.

IT 67
article thumbnail

10 reasons you should adopt reliability centered maintenance (RCM) today

IBM Big Data Hub

There are many articles on equipment failure patterns that infer that a majority of all equipment fails at random , regardless of how much preventive maintenance was done. This claim is often used to encourage asset-intensive industries to evolve their maintenance strategies, invest in instrument equipment and leverage analytics to adopt predictive maintenance approaches.

CMS 73
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Top 6 predictions for the Public Sector in 2024

OpenText Information Management

In many ways, the year 2023 seems like a table-setter for a seismic 2024. We have two escalating regional wars with global impact, an economy that can’t seem to find its footing, and a looming U.S. presidential election that seems inevitably headed toward a rematch of two leaders with historically low levels of popularity. Added … The post Top 6 predictions for the Public Sector in 2024 appeared first on OpenText Blogs.

article thumbnail

FCC Adopts Updated Data Breach Notification Rules

Hunton Privacy

On December 13, 2023, the Federal Communications Commission (FCC) voted to update its 16-year old data breach notification rules (the “Rules”). Pursuant to the FCC update, providers of telecommunications, Voice over Internet Protocol (VoIP) and telecommunications relay services (TRS) are now required to notify the FCC of a data breach, in addition to existing obligations to notify affected customers, the FBI and the U.S.

article thumbnail

Jamf After Dark: Microsoft Ignite

Jamf

Get an update on how the Microsoft Ignite conference was an opportunity to showcase how Jamf and MIcrosoft integrations can help your business in this Jamf After Dark podcast.

52