Mon.Mar 06, 2023

article thumbnail

Why Are Security Fears About ChatGPT So Overblown?

Data Breach Today

Expert Etay Maor Says Limitations, Biases Make the AI Bot Unreliable - for Now Technologists were quick to point out that popular AI-based chatbot, ChatGPT, could lower the bar for attackers in phishing campaigns and even write malware code, but Cato Networks' Etay Maor advises taking these predictions "with a grain of salt" and explores the pros and cons of ChatGPT.

Phishing 268
article thumbnail

Hong Kong’s data privacy law reform may come in 2023

Data Protection Report

The reform of Hong Kong’s Personal Data (Privacy) Ordinance (Cap.486) (the PDPO ) is back on the agenda. In our earlier post in 2020, we reported that the Constitutional and Mainland Affairs Bureau published a discussion paper (the Discussion Paper ) seeking the Legislative Council’s Panel on Constitutional Affairs’ (the Panel ) views on proposed changes to the PDPO.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Play Ransomware Partially Leaks Stolen City of Oakland Data

Data Breach Today

Group Threatens Full Data Dump If Its Extortion Demands Are Not Met Play ransomware hackers attempting to extort the San Francisco Bay Area city of Oakland dumped 10 gigabytes of stolen information over the weekend and threatened that more dumps may come. Researchers have spotted similarities between the Play, Hive and Nokoyawa ransomware groups.

article thumbnail

FTC Announces Proposed Order against BetterHelp for Disclosing Sensitive Mental Health Information to Third Parties for Targeted Advertising Purposes

Hunton Privacy

On March 2, 2023, the FTC announced a proposed order against BetterHelp, Inc., an online mental health counseling service, for sharing consumer data, including sensitive mental health information, with third parties for targeted advertising and other purposes. The FTC’s proposed order is notable, in that it is the first such order that would return funds to consumers whose health data was affected.

Privacy 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

BlackCat Leaking Patient Data and Photos Stolen in Attack

Data Breach Today

Russia-Linked RaaS Group Attacked Pennsylvania Healthcare Group Last Month Russian-speaking ransomware gang BlackCat is leaking data stolen from a Pennsylvania-based healthcare group, including photos of breast cancer patients. The gang posted screenshots of patient diagnoses of a handful of patients and pictures of breast cancer patients disrobed from the waist up.

More Trending

article thumbnail

Publicity Stunt: Criminals Dump 2 Million Free Payment Cards

Data Breach Today

Credit Card Market BidenCash Again Leaks Free Data as Marketing Ploy Here's further proof many cybercriminals are rampant self-promoters: Credit card market BidenCash, which sells compromised payment card data, dumped 2 million payment cards for free. This shows that competition between carder markets - and increasingly, Telegram-based vendors - is fierce.

Marketing 147
article thumbnail

Blockchain For The Common Good

Information Governance Perspectives

Most people associate blockchain with cryptocurrency, and the buzz around distributed ledger technology continues to make news. Presently, Samuel Bankman-Fried of FTX Trading is being prosecuted for allegedly using the tool, or at least exploiting its allure, to defraud investors around the world out of billions of dollars. But fortunately, entrepreneurs and computer scientists like Ashish Gadnis have demonstrated that you can also use blockchain for the common good.

article thumbnail

European Police Nab Suspected DoppelPaymer Operators

Data Breach Today

Germany Issues Arrest Warrants for 3 Suspected Russian DoppelPaymer Operators Police in Germany and Ukraine detained two suspected core members of a ransomware criminal group with a track record of attacking hospitals and emergency services. Seized electronics may lead to additional arrests of members of the group, who are accused of spreading DoppelPaymer ransomware.

article thumbnail

Belgium: Belgian data protection authority clarifies the public interest legal basis in the context of decision on a vehicle tracking system

DLA Piper Privacy Matters

Authors: Heidi Waem and Simon Verschaeve On 21 February 2023, the Litigation Chamber of the Belgian Data Protection Authority ruled on a case relating to the lawfulness of a geolocation tracking system for employee vehicles used by a public authority. The decision not only sets out the conditions for the use of such systems, but also includes interesting considerations of the Litigation Chamber on the interpretation of the ‘public interest’ legal basis of article 6.1(e) GDPR.

GDPR 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Palo Alto, Versa, Cisco Lead First-Ever SASE Tech Evaluation

Data Breach Today

KuppingerCole Report Taps Broad Security Platforms, Pure-Play SD-WAN, SSE Vendors Platform players such as Cisco and Palo Alto Networks and pure-play vendors such as Lookout and Versa Networks top the first-ever vendor evaluation of the SASE market. Versa edged out Palo Alto Networks in product leadership, and Cisco was a distant third, the KuppingerCole Leadership Compass found.

Marketing 130
article thumbnail

Malicious Automation is driving API Security Breaches

The Security Ledger

Removing the ability to automate against a vulnerable API is a huge step forward, as automation is a key enabler for both the exploitation and the extraction of large amounts of sensitive data. The post Malicious Automation is driving API Security Breaches appeared first on The Security Ledger with Paul F. Roberts. Related Stories Episode 248: GitHub’s Jill Moné-Corallo on Product Security And Supply Chain Threats Forget the IoT.

article thumbnail

Hatch Bank data breach caused by the exploitation of the GoAnywhere MFT zero-day

Security Affairs

Fintech platform Hatch Bank disclosed a data breach, hackers exploited a recently discovered zero-day in Fortra GoAnywhere MFT secure file-sharing platform. Hatch Bank is a fintech firm that provides services to other fintech companies. The company disclosed a data breach and revealed that the attackers have exploited a recently discovered zero-day vulnerability in the company’s Fortra GoAnywhere MFT secure file-sharing system, reported Techcrunch.com.

article thumbnail

A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

KnowBe4

Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which determined hackers can exploit at will. There’s even a term for it: Assume Breach.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ransom House ransomware attack hit Hospital Clinic de Barcelona

Security Affairs

Hospital Clinic de Barcelona, one of the main hospitals in the Spanish city, suffered a cyber attack that crippled its computer system. On Sunday, a ransomware attack hit the Hospital Clinic de Barcelona, one of the main hospitals of the Catalan city. The attack crippled the center’s computer system, 150 nonurgent operations and up to 3,000 patient checkups were canceled due to the cyber attack.

article thumbnail

Executive Impersonation Business Email Compromise Attacks Go Beyond English Worldwide

KnowBe4

Despite hearing mostly about BEC attacks in English-speaking countries , analysis of new attack groups highlight the threat of these kinds of attacks in other languages.

94
article thumbnail

The Role of Verifiable Credentials In Preventing Account Compromise

Dark Reading

As digital identity verification challenges grow, organizations need to adopt a more advanced and forward-focused approach to preventing hacks.

91
article thumbnail

Ransomware Attacks on Industrial Infrastructure Climb 87% Despite Security Improvements to ICS Environments

KnowBe4

Since the goal of ransomware is to initially disrupt operations, the targeting of industrial control systems has been an increasing focus for specific ransomware groups.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

NIST's Quantum-Proof Algorithm Has a Bug, Analysts Say

Dark Reading

A team has found that the Crystals-Kyber encryption algorithm is open to side-channel attacks, under certain implementations.

article thumbnail

Coping With “Double-Extortion” Royal Ransomware

KnowBe4

The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI last week issued a joint advisory on Royal ransomware. Royal is noteworthy for its ability to disable various anti-virus tools in the course of exfiltrating data in its double-extortion attacks.

article thumbnail

European police dismantled the DoppelPaymer ransomware gang

Security Affairs

German police announced to have dismantled an international cybercrime gang behind the DoppelPaymer ransomware operation. Europol has announced that an international operation conducted by law enforcement in Germany and Ukraine, with help of the US FBI and the Dutch police, targeted two key figures of the DoppelPaymer ransomware group. “On 28 February 2023, the German Regional Police (Landeskriminalamt Nordrhein-Westfalen) and the Ukrainian National Police (Націона́льна полі́ція Украї́ни),

article thumbnail

FCC Proposes Updated Data Breach Reporting Requirements, Comment Period Ongoing

Data Matters

On January 6, 2023, the Federal Communications Commission (the Commission) released a unanimously adopted Notice of Proposed Rulemaking , “In the Matter of Data Breach Reporting Requirements” (Proposed Rule). The Commission sought comments through February 22, 2023 on the Proposed Rule which will update its current data breach reporting rule. Reply comments are due on or before March 24, 2023.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

This Algorithm Could Ruin Your Life

WIRED Threat Level

A system used by the Dutch city of Rotterdam ranked people based on their risk of fraud. The results were troubling.

Risk 89
article thumbnail

Shein Shopping App Glitch Copies Android Clipboard Contents

Dark Reading

The Android app unnecessarily accessed clipboard device contents, which often includes passwords and other sensitive data.

article thumbnail

The need for need

CILIP

The need for need The pandemic pushed people into new technology at speed. Beth Montague-Hellen, the new Head of Library and Information Services at the Francis Crick Institute, asks how big changes like this can be achieved without the help of a crisis. HUMANS will always struggle when the tools they use are upgraded. “When I’m in my sixties, at the end of my career I’m sure there will be some other new massive technology and I’ll be saying ‘oh no, can’t we just use Teams?’”.

article thumbnail

Police Raid Rounds Up Core Members of DoppelPaymer Ransomware Gang

Dark Reading

This is the latest in a line of law-enforcement actions busting up the ransomware scene.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SINGAPORE: First decision on the Legitimate Interest Exception under the Personal Data Protection Act (PDPA) issued

DLA Piper Privacy Matters

Authors: Carolyn Bigg , Yue Lin Lee and Daisy Wong Singapore’s Personal Data Protection Commission (“PDPC”) has issued its first decision on the Legitimate Interests Exception under the PDPA. While the PDPA remains largely a consent-based regime, the Legitimate Interests Exception is one of the exceptions from consent available under the PDPA. This RedMart decision illustrates how organisations may rely on the Legitimate Interests Exception to collect personal data, as well as the steps which mu

article thumbnail

Name That Edge Toon: Domino Effect

Dark Reading

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

85
article thumbnail

How Safe Is Your Visitor Management Policy?

HID Global

HID Visitor Management Solutions ensure your visitor management policies are safe and secure for you, your staff and your visitors in an organized environment.