Thu.Jan 05, 2023

article thumbnail

Critical Vulnerabilities Found in Luxury Cars Now Fixed

Data Breach Today

Ferrari, BMW, Rolls Royce, Porsche Software Flaws Exposed Data, Vehicle Controls Software vulnerabilities installed by luxury car manufacturers including Ferrari, BMW, Rolls Royce and Porsche that could allow remote attackers to control vehicles and steal owners' personal details have been fixed. Cybersecurity researchers uncovered the vulnerabilities while vacationing.

article thumbnail

Security Outlook 2023: Cyber Warfare Expands Threats

eSecurity Planet

After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized. “In 2022, governments fought wars online, businesses were affected by multiple ransomware gangs, and regular users’ data was constantly on hackers’ radars,” said NordVPN CTO Marijus Briedis. 2023, he predicted, “will not be any easier when it comes to keeping users’

Security 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lawsuit Claims LastPass Breach Caused $53K Bitcoin Theft

Data Breach Today

Class Action Lawsuit Says Security Company Failed to Safeguard Customer Data A class action lawsuit against LastPass alleges that a data breach in August resulted in the theft of $53,000 in bitcoin. An unnamed plaintiff alleges that negligence in the password management company's data security practices led to the Thanksgiving weekend theft.

article thumbnail

Is the Most Creative Act a Human Can Engage in the Formation of a Good Question?

John Battelle's Searchblog

Wise, Kevin Kelly is. Today I’d like to ponder something Kevin Kelly – a fellow co-founding editor of Wired – said to me roughly 30 years ago. During one editorial conversation or another, Kevin said – and I’m paraphrasing here – “The most creative act a human can engage in is forming a good question.” That idea has stuck with me ever since, and informed a lot of my career.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Banks Find It Hard to Tackle Authorized Fraud

Data Breach Today

Authorized payment scams are on the rise, and banking regulators are putting pressure on financial institutions to do more to protect customers. The biggest challenge is that the customers are driving the process, says Bradley Haacke, vice president and financial crimes director at Fifth Third Bank.

IT 130

More Trending

article thumbnail

Why Is Meta Choosing to Settle Over Cambridge Analytica?

Data Breach Today

The latest edition of the ISMG Security Report analyzes why Meta has agreed to pay $725 million to settle a class-action lawsuit over users' personal data, how the median stock price dropped 40% among publicly traded security firms in 2022, and why an infrastructure change is needed in SOCs.

article thumbnail

Criminal Hackers Leak Email Addresses of 220 Million Twitter Users

IT Governance

Twitter is in the middle of yet another PR disaster after a criminal hacker leaked more than 220 million users’ email addresses. The fraudster, who goes by the name ‘Ryushi’, initially demanded $200,000 (about £166,000) to hand over or delete the stolen information. A week later – after presumably being rebuffed by Twitter – the hacker put the data up for sale on the hacking forum Breached.

Sales 109
article thumbnail

AML, Cybersecurity Noncompliance Costs Coinbase $100M

Data Breach Today

Crypto Exchange to Pay $50M Penalty, Invest $50M to Boost AML Compliance Coinbase agreed to a $100 million settlement with the New York financial regulator on Wednesday over cybersecurity lapses and failure to comply with anti-money laundering guidelines that allowed criminals to use the platform for fraud, money laundering and other illicit activities.

article thumbnail

Top predictions for financial services in 2023

OpenText Information Management

With inflation, rising interest rates and general economic uncertainty, last year presented several challenges for financial services institutions (FSIs). As we move into 2023, FSIs will need to focus their increasing IT spend and direct their attention to delivering on the total experience for their customers and employees and on environmental, social and governance initiatives … The post Top predictions for financial services in 2023 appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Third-Party Risk Management Strategies for Data Breaches

Data Breach Today

How to Defend Against Cyberattacks in Healthcare Organizations Hackers can strike any industry, but there has been an alarming increase in targeted and successful cyberattacks in healthcare. Now, more than ever, it's essential that your healthcare organization is prepared and has strategies in place for managing data breaches. Here are seven strategies to use.

article thumbnail

These grim figures show that the ransomware problem isn't going away

KnowBe4

ZDNet summarized the problem as follows: "Up to 1,981 schools, 290 hospitals, 105 local governments and 44 universities and colleges were hit with ransomware in the US alone during 2022, demonstrating how ransomware attacks remain a significant cyber threat to the public sector and civil society.

article thumbnail

Apple Fined 8 Million Euros for Privacy Violations in France

Data Breach Today

French Data Protection Agency Says Apple Lacked Consent for Ad Personalization The French data privacy agency has fined Apple 8 million euros for an ad personalization tracker that violated the country's privacy laws. The fine against Apple was announced on the same day the Irish Data Protection agency fined Meta Ireland for similar violations.

Privacy 130
article thumbnail

Accenture and Collibra: Accelerating the data mesh journey

Collibra

We are at an inflection point. Despite all the innovations of the last decade — Hadoop, data lakes, Spark, Python, TensorFlow, the ascendancy of AI — businesses still struggle deriving value from data. Data initiatives begin with great promise and lead to crushing disappointments when they aren’t scalable or reliable. . The truth is the way we organize the people and the process around data needs to change.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Data Breach: CircleCI Says Immediately 'Rotate Your Secrets'

Data Breach Today

Continuous Integration Software Development Platform Suspects 2-Week Intrusion CircleCI, which is used by over 1 million developers to build, test and deploy software, has issued a brief security alert warning all customers to immediately "rotate any secrets stored in CircleCI" as it continues to probe a suspected two-week intrusion.

article thumbnail

New Crypto Scam Targets Flipper Zero Buyers Impersonating Legitimate Shops

KnowBe4

Interest in the handheld open-source multi-function cybersecurity tool by techies has risen to a new campaign seeking to steal crypto funds through illegitimate “sales” of the device.

Sales 97
article thumbnail

Episode 248: GitHub’s Jill Moné-Corallo on Product Security And Supply Chain Threats

The Security Ledger

In this episode of the Security Ledger Podcast, Paul speaks with Jill Moné-Corallo, the Director of Product Security Engineering Response at GitHub. Jill talks about her journey from a college stint working at Apple’s Genius bar, to the information security space - first at product security at Apple and now at GitHub, a massive development. Read the whole entry. » Click the icon below to listen.

article thumbnail

How hackers might be exploiting ChatGPT

Security Affairs

The popular AI chatbot ChatGPT might be used by threat actors to hack easily hack into target networks. Original post at [link]. Cybernews research team discovered that the AI-based chatbot ChatGPT – a recently launched platform that caught the online community’s attention – could provide hackers with step-by-step instructions on how to hack websites.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Weekly Update 329

Troy Hunt

Strap yourself in, this is a big one! Big video, big breach (scrape?), and a big audience today. The Twitter incident consumed a heap of my time before, during and after this live stream, but then I go and get a sudden itch to do stuff like the number plate capturing and, well, there goes even more hours I don't have. But hey, I love what I do and I have no regrets, I hope you enjoy watching this week's vid 😊 Oh - one more thing: today I set up an official Mastodon account for

article thumbnail

Irish Data Protection Commission fined Meta $414 Million

Security Affairs

The Irish Data Protection Commission (DPC) fined Meta Platforms €390 million over data processing operations for the delivery of its services. The Data Protection Commission (DPC) concluded two inquiries into the data processing operations of Meta Platforms Ireland Limited (“Meta Ireland”) over the delivery of its Facebook and Instagram services. DPC fined Meta Platforms a total of €390 million (roughly $414 million). “Final decisions have now been made by the DPC in which it has fined Met

GDPR 85
article thumbnail

Rackspace Sunsets Email Service Downed in Ransomware Attack

Dark Reading

The hosting services provider shared new details on the breach that took down its Hosted Exchange Email service.

article thumbnail

Threat actors stole Slack private source code repositories

Security Affairs

Enterprise collaboration platform Slack disclosed a data breach, hackers stole some of its private source code repositories. The enterprise collaboration platform Slack has announced to have suffered a security breach, threat actors have stolen some of its private source code repositories. The company pointed out that its customers were not affected. “We recently became aware of a security issue involving unauthorized access to a subset of Slack’s code repositories.” reads the securi

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Phishing Campaigns Impersonate the UK Government

KnowBe4

The UK’s National Cyber Security Centre (NCSC) has outlined the top six most impersonated UK government agencies in 2022. The most impersonated entity was the National Health Service (NHS), followed by TV Licensing, HM Revenue & Customs, Gov.uk, DVLA, and Ofgem.

article thumbnail

Zoho urges fixing a critical SQL Injection flaw in ManageEngine

Security Affairs

Zoho is warning its customers of a critical vulnerability, tracked as CVE-2022-47523, affecting multiple ManageEngine products. Zoho is urging its customers to address a critical SQL Injection vulnerability, tracked as CVE-2022-47523, that affects multiple ManageEngine products. “This security advisory is to let you know that a high severity vulnerability was detected in ManageEngine Password Manager Pro.” reads the advisory published by Zoho. “An SQL Injection vulnerability(CV

article thumbnail

6 predictions for the public sector industry in 2023

OpenText Information Management

The pandemic has precipitated a fundamental shift in the way citizen services are delivered. In the past year, governments have made strides towards improving citizen experience while ensuring security. However, there is still work to be done. In the year ahead, governments will focus on implementing technology that can help them improve citizen experience, be … The post 6 predictions for the public sector industry in 2023 appeared first on OpenText Blogs.

article thumbnail

Threat Actors Evade Detection Through Geofencing & Fingerprinting

Dark Reading

Security teams may be missing targeted attacks and advanced exploits if attackers are using evasive techniques to avoid detection. Defenders need to up their game.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Turla, a Russian Espionage Group, Piggybacked on Other Hackers' USB Infections

WIRED Threat Level

The infamous, FSB-connected Turla group took over other hackers' servers, exploiting their USB drive malware for targeted espionage.

article thumbnail

Bluebottle Continues Bank Heist Assault With Signed Malware

Dark Reading

The financially motivated threat group, also known as OPERA1ER, demonstrated an evolution in tactics in its compromise of three Francophone financial institutions in Africa, likely adding to its $11 million to-date haul.

IT 70
article thumbnail

Healthcare predictions 2023: It’s all about the patient 

OpenText Information Management

Healthcare organizations face another challenging year in 2023, as many struggle to answer the high demand for care. In the last few months, health systems have faced a flare up in Respitory Syncytial Virus (RSV), the seasonal flu, and ongoing COVID cases that is stretching demand for care to unsustainable levels. In addition, the uncertain economy, … The post Healthcare predictions 2023: It’s all about the patient appeared first on OpenText Blogs.