Tue.Sep 27, 2022

article thumbnail

Assessing Growing Cyberthreats to Africa's Financial Sector

Data Breach Today

Rob Dartnall of Security Alliance Shares Insights on Current and Emerging Trends Financial services firms in Africa are becoming bigger cyber targets as they expand into new mobile payment and financial inclusion products. Rob Dartnall of Security Alliance explains why these firms need to invest in information sharing, training and new cybersecurity practices to avoid breaches.

article thumbnail

FIRESIDE CHAT: Why ‘digital resiliency’ has arisen as the Holy Grail of IT infrastructure

The Last Watchdog

Digital resiliency has arisen as something of a Holy Grail in the current environment. Related: The big lesson of Log4j. Enterprises are racing to push their digital services out to the far edge of a highly interconnected, cloud-centric operating environment. This has triggered a seismic transition of company networks, one that has put IT teams and security teams under enormous pressure.

IT 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Code42's Joe Payne on Why Source Code Theft Is So Prevalent

Data Breach Today

CEO Shares Strategies to Overcome Technical, Cultural Challenges of This Top Threat Too often when software developers change jobs, they take source code they've written with them, feeling the code belongs to them even if it belongs to an employer. Code42's Joe Payne shares the challenges of detecting source code theft and ways to protect intellectual property wherever it resides.

IT 241
article thumbnail

How to Protect Your Organisation from a Cyber Attack

IT Governance

In some circles, cyber security is synonymous with threat protection. After all, an organisation’s main objective is to prevent unauthorised actors from accessing sensitive information, and that means implementing protective measures. That’s certainly true, but there’s a lot more to cyber security than protecting assets. The measures you implement should be part of a cohesive strategy that helps organisations prepare for and respond to security threats.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds: Chinese Hacking Group Undeterred by Indictment

Data Breach Today

Indictment 'Did Not Hinder APT41’s Operations,' says HHS HC3 Two federal indictments against APT41, a Chinese state-sponsored hacking group, haven't slowed down its operations, the U.S. government acknowledges in a warning telling the healthcare sector to be vigilant about the threat actor. The hackers are believed to be at large, likely in China.

More Trending

article thumbnail

OT Security Shorted by Nuclear Weapon Oversight Agency

Data Breach Today

National Nuclear Security Administration Made 'Limited Progress,' Says GAO The U.S. federal agency responsible for the ongoing functionality of the nuclear weapons stockpile hasn't gotten its arms around how to secure operational technology, says the Government Accountability Office. More than 200,000 unique pieces of OT are deployed across nuclear weapon centers.

Security 237
article thumbnail

Russia Planning Cyberattacks on Ukraine's Energy Grid

Dark Reading

Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland and the Baltic states.

article thumbnail

Optus Attacker Halts AU$1.5 Million Extortion Attempt

Data Breach Today

Exclusive: Optus Says It Has Not Paid a Ransom The person who stole nearly 10 million customer records from Australian telco Optus withdrew their AU$1.5 million extortion attempt after suddenly after releasing 10,000 customer records. Also, Optus says it has not paid a ransom as it grapples with one of the largest data breaches in the country.

article thumbnail

Mandiant identifies 3 hacktivist groups working in support of Russia

Security Affairs

Researchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked to the GRU. Mandiant researchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked to the Russian Main Intelligence Directorate (GRU). The experts assess with moderate confidence that moderators of the purported hacktivist Telegram channels “XakNet Team,” “Infoccentr,” and “CyberArmyofRussia_Reborn” are

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

LockBit Publishes Stolen Data as Hospital Rejects Extortion

Data Breach Today

French Government Vows Resistance, Stepped-Up Cybersecurity Funding Ransomware hackers made good on a threat to publish patient and staff data stolen from a French hospital after administrators said they refused on principal to pay out. François Braun, French minister of social affairs and health, said that the government will "not give in to these criminals.

article thumbnail

Erbium info-stealing malware, a new option in the threat landscape

Security Affairs

The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games. Threat actors behind the new ‘Erbium’ information-stealing malware are distributing it as fake cracks and cheats for popular video games to steal victims’ credentials and cryptocurrency wallets. The Erbium info-stealing malware was first spotted by researchers at threat intelligence firm Cluster25 on July 21, 2022.

article thumbnail

Ask A Stupid Question Day: The Cybersecurity Edition

Thales Cloud Protection & Licensing

Ask A Stupid Question Day: The Cybersecurity Edition. divya. Tue, 09/27/2022 - 05:25. Ask a Stupid Question Day is celebrated on September 28, dating back to the 1980s (Oh, now it makes sense - lol). On this day, celebrate and be encouraged not to hold back and to ask more questions. There is no such thing as a stupid questions, they say. So, lighten up!

article thumbnail

Mobile device examination with EnCase

OpenText Information Management

Anyone engaged in DFIR (Digital Forensics & Incident Response) will recognize and understand the field moves and evolves at a rapid rate. There is always something new to learn and understand, with an increasing number of artifacts to parse and examine during a forensic investigation. Forensic software tools have great feature sets for automating the … The post Mobile device examination with EnCase appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Despite Recession Jitters, M&A Dominates a Robust Cybersecurity Market

Dark Reading

Funding has been somewhat lower than last year, but investment remains healthy, analysts say, amid thirst for cloud security in particular.

article thumbnail

From principles to actions: building a holistic approach to AI governance

IBM Big Data Hub

Today AI permeates every aspect of business function. Whether it be financial services, employee hiring, customer service management or healthcare administration, AI is increasingly powering critical workflows across all industries. But with greater AI adoption comes greater challenges. In the marketplace we have seen numerous missteps involving inaccurate outcomes, unfair recommendations, and other unwanted consequences.

article thumbnail

Attorney general says FBI is working on Optus data breach – video

The Guardian Data Protection

Attorney general Mark Dreyfus says the FBI is working with local authorities to investigate the Optus data breach. 'The government, as well as the Australian federal police and other government agencies, are working closely together on the Optus data breach,' he said. 'The Australian federal police is taking this very seriously with a large number of officers involved, working with other federal government agencies and state and territory police, and with the FBI in the United States and with in

article thumbnail

Russia prepares massive cyberattacks on the critical infrastructure of Ukraine and its allies

Security Affairs

The Ukrainian military intelligence warns that Russia is planning to escalate cyberattacks targeting Ukraine and Western allies. The Main Directorate of Intelligence of the Ministry of Defence of Ukraine (HUR MO) warns that Russia is planning to escalate cyberattacks targeting the critical infrastructure of Ukraine and western countries. According to the Ukrainian military intelligence service, the attacks will aim at disrupting operations at critical infrastructure, including electric grids and

Military 103
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.