Fri.Nov 17, 2023

article thumbnail

Security Firm COO Hacked Hospitals to Drum Up Business

Data Breach Today

Atlanta Man Pleads Guilty, Is Ordered to Pay $818,000 Restitution, May Avoid Prison The chief operating officer of an Atlanta-based cybersecurity firm has pleaded guilty and agreed to pay restitution of more than $818,000 in a federal criminal case in which he admitted hacking a Georgia medical center in 2018 in an effort to drum up business for his company.

Security 328
article thumbnail

Artificial Intelligence in education

Jamf

We use artificial intelligence in our every day lives — so why not take advantage of it in schools? In this blog, we discuss the benefits, drawbacks and the future of artificial intelligence in education.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AT&T Forms Joint Venture for Managed Cybersecurity Business

Data Breach Today

WillJam Ventures Standing Up Joint Venture With AT&T for Managed Cybersecurity Unit AT&T will split its managed cybersecurity services practice from its core connectivity business by standing up a joint venture with Chicago-area investor WillJam Ventures. AT&T will move its security software, managed security operations and cyber consulting into an entity owned by WillJam and AT&T.

article thumbnail

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

Dark Reading

For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enforcement, and others.

article thumbnail

LLMs in Production: Tooling, Process, and Team Structure

Speaker: Dr. Greg Loughnane and Chris Alexiuk

Technology professionals developing generative AI applications are finding that there are big leaps from POCs and MVPs to production-ready applications. They're often developing using prompting, Retrieval Augmented Generation (RAG), and fine-tuning (up to and including Reinforcement Learning with Human Feedback (RLHF)), typically in that order. However, during development – and even more so once deployed to production – best practices for operating and improving generative AI applications are le

article thumbnail

Proof of Concept: Assessing the US Executive Order on AI

Data Breach Today

Also: Improving Security Review Processes, AI Talent Acquisition Challenges In the latest "Proof of Concept," Zscaler's Sam Curry and Venable's Heather West join ISMG editors to discuss the implications of President Biden's executive order on AI, how AI enhances security review processes, the potential for AI to spot software flaws, and challenges of AI talent acquisition.

Security 285

More Trending

article thumbnail

UK Privacy Watchdog Pursues Clearview AI Fine After Reversal

Data Breach Today

ICO Seeks Permission to Challenge Ruling Vacating 7.5 Million-Pound Fine Britain's privacy watchdog on Friday said it will continue fighting to impose a fine on Clearview AI for allegedly violating the privacy rights of Britons after a tribunal sided with the facial recognition company by vacating a 7.5 million-pound penalty.

Privacy 277
article thumbnail

Scattered Spider Casino Hackers Evade Arrest in Plain Sight

Dark Reading

The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes?

118
118
article thumbnail

Insights From Israel: Ami Daniel, Windward

Data Breach Today

CEO Details Efforts to Rescue Hostages From Terrorist Attackers Following the Oct. 7 terrorist attack on Israel, Ami Daniel got a note from the father of a girl in hiding. Daniel messaged the girl, who said, "Just get me out of here." Daniel's reply: "On it." He details his efforts to rescue scores of Israeli citizens from hiding places surrounded by terrorists.

IT 268
article thumbnail

A critical OS command injection flaw affects Fortinet FortiSIEM

Security Affairs

Fortinet warns of a critical OS command injection vulnerability in FortiSIEM report server that could be exploited to execute arbitrary commands. Fortinet is warning customers of a critical OS command injection vulnerability, tracked as CVE-2023-36553 (CVSS score 9.3), in FortiSIEM report server. A remote, unauthenticated attacker can exploit the flaw to execute commands by sending specially crafted API requests. “An improper neutralization of special elements used in an OS Command vulnera

Security 114
article thumbnail

Your Expert Guide to CX Orchestration & Enhancing Customer Journeys

Speaker: Keith Kmett, Principal CX Advisor at Medallia

Join Keith Kmett, Principal CX Advisor, in this new webinar that will focus on: Understanding CX Orchestration Fundamentals: Gain a solid understanding of what CX orchestration is, its significance in the customer experience landscape, and how it plays a crucial role in shaping customer journeys. This includes the key concepts, strategies, and best practices involved in CX orchestration. 🔑 Connection to Customer Journey Maps: How to effectively integrate customer journey mapping into the

article thumbnail

OpenAI Fires CEO Sam Altman for Lying to Board of Directors

Data Breach Today

CTO Mira Murati Becomes Interim CEO; President Greg Brockman Ousted as Chairman The organization behind ChatGPT carried out a shocking firing of its high-profile chief executive for being "not consistently candid in his communications with the board." OpenAI's board said Friday that it "no longer had confidence" in Sam Altman's ability to continue leading the AI juggernaut.

article thumbnail

The Bin Laden Letter Is Being Weaponized by the Far Right

WIRED Threat Level

Far-right influencers and right-wing lawmakers are using the spread of Osama bin Laden’s “Letter to America” to call for a TikTok ban and boost decades old conspiracies.

Security 112
article thumbnail

Insights From Israel: Guy Shafir, WideOps

Data Breach Today

Cloud Security Vendor CTO on Response to Cyberattacks on Critical Services DDoS and other cyberattacks against media outlets and critical services are what Guy Shafir, CTO of Israeli tech vendor WideOps, has been dealing with since the start of the terrorist attacks in Israel on Oct. 7. Shafir shared details about the response to these intense attacks.

Cloud 205
article thumbnail

CISA adds Sophos Web Appliance bug to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added three new vulnerabilities (tracked as CVE-2023-36584 , CVE-2023-1671 , and CVE-2023-2551 ) to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added three new vulnerabilities to its Known Exploited Vulnerabilities catalog. Below is the list of the three added vulnerabilities: CVE-2023-36584 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability CVE-2023-1671 Sophos Web Appliance Command Injection

IT 108
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

Dark Reading

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.

article thumbnail

The board of directors of OpenAI fired Sam Altman

Security Affairs

OpenAI fired its CEO Sam Altman, and the Chief technology officer Mira Murati appointed interim CEO to lead the company. Sam Altman has been removed as CEO of OpenAI. The company announced that Mira Murati, the Chief Technology Officer, has been appointed as interim CEO. He was distrusted by the board for his behavior, for this reason, it is believed that he is no longer fit to lead the company. “Mr.

article thumbnail

Johnny Jet's $3,000 Podcast Scam Nightmare – Unveiling the Elaborate Con that Hijacked his Facebook Kingdom

KnowBe4

Travel influencer Johnny Jet has disclosed that he fell victim to a scam that caused him to lose access to his Facebook account, which has tens of thousands of followers. The scammers began by contacting him and asking if he would be a guest on their podcast.

Access 100
article thumbnail

Hands Off the Security Budget! Find Efficiencies to Reduce Risk

Dark Reading

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.

article thumbnail

Use Cases for Apache Cassandra®

There’s a good reason why Apache Cassandra® is quickly becoming the NoSQL database of choice for organizations of all stripes. In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid. From understanding its distributed architecture to unlocking its incredible power for industries like healthcare, finance, retail and more, experience how Cassandra® can transform your entire data operations.

article thumbnail

KnowBe4 Integrates With Cisco Duo To Streamline Secure Sign Ins

KnowBe4

Social engineering remains one of the top attack vectors that cybercriminals use to execute malicious acts. KnowBe4’s security awareness training and simulated phishing platform allows workforces to make smarter decisions, strengthen an organization’s security culture and human risk by protecting their organization from phishing, social engineering and ransomware.

article thumbnail

EU Moving Closer to an AI Act?

Data Matters

On 24 October 2023, the European Parliament and Member States concluded a fourth round of trilogue discussions on the draft Artificial Intelligence Regulation (AI Act). Policymakers agreed on provisions to classify high-risk AI systems and also developed general guidance for the use of “enhanced” foundation models. However, the negotiations did not lead to substantial progress on provisions for prohibitions in relation to the use of AI by law enforcement.

article thumbnail

QR Code Phishing Attacks Surging

KnowBe4

The massive uptick in QR Code phishing is an indicator that scammers are seeing success in taking victims from the initial attack medium to one under the attacker’s control.

article thumbnail

Catches of the Month: Phishing Scams for November 2023

IT Governance

Welcome to our November 2023 catches of the month feature, which examines recent phishing scams and the tactics criminals use to trick people into compromising their data. This month, we look at a recent phishing attack on Booking.com, an NCSC warning about Black Friday scams, a Google Cloud report into how AI will drive phishing in the future, and a Europol and Eurojust takedown of a phishing gang.

article thumbnail

Reimagining CX: How to Implement Effective AI-Driven Transformations

Speaker: Steve Pappas

As businesses strive for success in an increasingly digitized world, delivering an exceptional customer experience has become paramount. To meet this demand, enterprises are embracing innovative approaches that captivate customers and fuel their loyalty. 💥 Enter conversational AI - an absolute game-changer (if done right) in redefining CX norms.

article thumbnail

British Library Confirms Ransomware Attack Caused Outages

Dark Reading

The library said that it expects many of its services to be restored in the forthcoming weeks.

Libraries 118
article thumbnail

[Keynote Announcement] See Rachel Tobac at KB4-CON 2024!

KnowBe4

We can’t keep this a secret any longer! Rachel Tobac will be joining us live at KB4-CON 2024, happening in Orlando, Florida March 4-6. She’s an ethical hacker and three time winner of DEF CON's Social Engineering Capture the Flag contest.

84
article thumbnail

Actions to Take to Defeat Initial Access Brokers

Dark Reading

Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.

Access 89
article thumbnail

Weekly Update 374

Troy Hunt

Think about it like this: in 2015, we all lost our proverbial minds at the idea of the Kazakhstan government mandating the installation of root certificates on their citizens' devices. We were outraged at the premise of a government mandating the implementation of a model that could, at their bequest, allow them to intercept traffic without any transparency or accountability.

article thumbnail

Lessons Learned in PostgreSQL®

In today's digital landscape, the threat of ransomware demands proactive defense. This paper, inspired by a real PostgreSQL® database incident, offers vital strategies for effective mitigation. Instaclustr expert Perry Clark outlines immediate actions to minimize risks, ensuring a swift response to ransomware threats and protecting critical data assets.

article thumbnail

Detection & Response That Scales: A 4-Pronged Approach

Dark Reading

Building a resilient incident response team requires more than a simple combination of tools and on-call rotations.

99
article thumbnail

How to Extend Enterprise IT Security to the Mainframe

OpenText Information Management

While organizations with mainframes aim to establish consistency throughout the enterprise via modernization technologies, the challenge often faced is the tools used are not suitable for both mainframe and enterprise environments. This results in disparate solutions, training methods, and user experiences – highlighting the urgent need for greater uniformity across the entire enterprise.

article thumbnail

Spotlight AI: The story behind the feature

Hanzo Learning Center

Discover the journey behind Hanzo's Spotlight AI, from its inception to its potential to transform the legal industry with AI-powered decision-making. Learn about the key philosophies and practical features that drive Spotlight AI's innovation.

IT 64