Mon.May 08, 2023

article thumbnail

Hackers Leak Private Keys; Many MSI Products at Risk

Data Breach Today

Leak Includes Intel Boot Guard and OEM Image Signing Keys for Over 200 Products The security of hundreds of MSI products is at risk due to hackers leaking private code signing keys stolen during a data breach last month. The signing keys allow an attacker to push malicious firmware updates under the guise of regular BIOS update processes with MSI update tools.

Risk 264
article thumbnail

GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent

The Last Watchdog

There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning the hiring of the cybersecurity talent their organizations require to safeguard against cyberattacks. According to Cybersecurity Ventures, by 2025 there will exist a gap of over 3.5 million unfilled cybersecurity positions. Moreover, of the current worldwide workforce, surveys conducted by PwC have shown that there is only a 38 percent ‘availability of key skills ’, considering the new an

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit 3.0 Leaks 600 GBs of Data Stolen From Indian Lender

Data Breach Today

Data Leak Comes After Fullerton India Refused to Negotiate With Ransomware Group The LockBit 3.0 ransomware group on Monday leaked 600 gigabytes of critical data stolen from Indian lender Fullerton India two weeks after the group demanded a $3 million ransom from the company. The stolen data includes "loan agreements with individuals and legal companies.

article thumbnail

AIIM23 Conference: The Latest Trends and Insights in Information Management

AIIM

The AIIM 2023 Conference boasted a first-time attendee percentage of 61% and was graced by representatives from 28 countries. The overall agenda featured more than 80 sessions, so many topics and perspectives enriched the attendee experience. All the keynotes and general sessions were well-attended and ranged from discussing orthodox beliefs in the industry; the value of storytelling in IM; perspectives on artificial intelligence; and the C-Suite's take on Information Management.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cloud-Based EHR Vendor Notifying 1 Million of Data Breach

Data Breach Today

NextGen's Breach Follows Claims by BlackCat in an Alleged Earlier Incident Cloud-based electronic health records vendor NextGen Healthcare is notifying more than 1 million individuals of a data compromise involving stolen credentials. The data breach appears to be at least the second alleged data security incident the company has investigated since January.

More Trending

article thumbnail

Feds Slap Another Provider with 'Right of Access' Fine

Data Breach Today

$15,000 Settlement With Psychotherapy Counselor Is HHS OCR's 44th Case Regulators are continuing their campaign to enforce compliance with the HIPAA "right of access" provision. HHS on Monday said it had slapped a solo-practitioner psychotherapy counselor with a $15,000 settlement in a dispute involving a father who sought medical records of his three minor children.

Access 147
article thumbnail

Join us at OpenText World 2023: Top 8 reasons to attend

OpenText Information Management

Working hard delivers results, but working smarter delivers better results, faster. This year’s OpenText World is all about working smarter to focus on what really matters. We’re bringing you world-leading experts, product keynotes, interactive breakouts, and more to help you see the future of information management. Here are the top 8 reasons to join us … The post Join us at OpenText World 2023: Top 8 reasons to attend appeared first on OpenText Blogs.

article thumbnail

Getting started with a data catalog

Collibra

Organizations know they need to continue to innovate and evolve to meet the needs of their customers while staying relevant and competitive in the market. Many of these organizations are sitting on a wealth of data, but may not have the right approach to tap into and unlock its value to put them on a path to becoming a data-driven organization. Getting visibility and insight to your own data shouldn’t be just a nice-to-have, and it shouldn’t require a massive deployment with months of implementa

article thumbnail

Thales 2023 Data Threat Report: Sovereignty, Transformation, and Global Challenges

Thales Cloud Protection & Licensing

Thales 2023 Data Threat Report: Sovereignty, Transformation, and Global Challenges madhav Tue, 05/09/2023 - 05:30 Despite the economic and geopolitical instability in 2022, enterprises continued to invest in their operations and digital transformation. Organizations balanced security and privacy risks with opportunities opened by new technologies and business models.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CERT-UA warns of an ongoing SmokeLoader campaign

Security Affairs

Ukraine’s CERT-UA warns of an ongoing phishing campaign aimed at distributing the SmokeLoader malware in the form of a polyglot file. CERT-UA warns of an ongoing phishing campaign that is distributing the SmokeLoader malware in the form of a polyglot file. Threat actors are using emails sent from compromised accounts with the subject “bill/payment” with an attachment in the form of a ZIP archive.

article thumbnail

AI Hacking Village at DEF CON This Year

Schneier on Security

At DEF CON this year, Anthropic, Google, Hugging Face, Microsoft, NVIDIA, OpenAI and Stability AI will all open up their models for attack. The DEF CON event will rely on an evaluation platform developed by Scale AI, a California company that produces training for AI applications. Participants will be given laptops to use to attack the models. Any bugs discovered will be disclosed using industry-standard responsible disclosure practices.

article thumbnail

NextGen Healthcare suffered a data breach that impacted +1 Million individuals

Security Affairs

NextGen Healthcare suffered a data breach, the security incident exposed the personal information of approximately 1 million individuals. Healthcare solutions provider NextGen Healthcare suffered a data breach that exposed the personal information of informing approximately one million individuals. NextGen Healthcare, Inc. is an American software and services company that develops and sells electronic health record (EHR) software and practice management systems to the healthcare industry.

article thumbnail

CPPA Board to Hold Meeting to Discuss CPRA Regulations Proposals and Priorities

Hunton Privacy

On May 4, 2023, the California Privacy Protection Agency (“CPPA”) Board announced that it will hold a public meeting on May 15, 2023 to discuss California Privacy Rights Act of 2020 (“CPRA”) regulations proposals and priorities, and other CPPA activities. The agenda for the May 15 meeting indicates that the CPPA will discuss the activities of and next steps for its CPRA Rules Subcommittee.

Privacy 81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

SafeGraph Lands US Air Force Contract After Targeting Abortion Clinics

WIRED Threat Level

Documents obtained by WIRED show SafeGraph, which sold location data related to Planned Parenthood visits, is now pursuing contracts with the US Air Force.

Privacy 86
article thumbnail

New EU Cyber Law for the Financial Services Industry with Significant Impact on ICT Service Providers

Data Matters

The new EU Regulation on Digital Operational Resilience for the Financial Sector ( DORA ) recently entered into force. DORA establishes cybersecurity requirements for information and communication technology ( ICT ) systems supporting the business processes of financial entities and represents a paradigm shift for the ICT sector. Critical ICT third-party service providers, who are providing services to regulated financial entities, will also be directly regulated under DORA and subject to regul

article thumbnail

Money Message gang leaked private code signing keys from MSI data breach

Security Affairs

The ransomware gang behind the attack on Taiwanese PC maker MSI leaked the company’s private code signing keys on their darkweb leak site. In early April, the ransomware gang Money Message announced to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and internationally.

article thumbnail

New Bazel Ruleset Helps Developers Build Secure Container Images

Dark Reading

A new ruleset from Bazel, an open source build and test tool from Google, allows developers to create Docker images and generate software bills of materials about what is inside the containers.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Western Digital notifies customers of data breach after March cyberattack

Security Affairs

Western Digital is notifying its customers of a data breach that exposed their sensitive personal information, the incident took place in March. In March 2022, Western Digital was hit by a ransomware attack and in response to the incident, it shut down several of its services. The company disclosed that an unauthorized party gained access to multiple systems.

article thumbnail

Government, Industry Efforts to Thwart Ransomware Slowly Start to Pay Off

Dark Reading

Public-private collaboration, law enforcement, and better defenses are helping make inroads in the war against ransomware, according to the Ransomware Task Force.

article thumbnail

Blocking Social Engineering by Foreign Bad Actors: The Role of the New Foreign Malign Influence Center

KnowBe4

The U.S. government created a new office to block disinformation. The new Foreign Malign Influence Center (FMIC) oversees efforts that span U.S. military, law enforcement, intelligence, and diplomatic agencies.

article thumbnail

How To Delete Your Data From ChatGPT

WIRED Threat Level

OpenAI has new tools that give you more control over your information—although they may not go far enough.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The risks and limitations of AI in insurance

IBM Big Data Hub

Artificial intelligence (AI) is polarizing. It excites the futurist and engenders trepidation in the conservative. In my previous post , I described the different capabilities of both discriminative and generative AI, and sketched a world of opportunities where AI changes the way that insurers and insured would interact. This blog continues the discussion, now investigating the risks of adopting AI and proposes measures for a safe and judicious response to adopting AI.

article thumbnail

North Korean APT Uses Malicious Microsoft OneDrive Links to Spread New Malware

Dark Reading

ReconShark, aimed at gaining initial access to targeted systems, is a component of previous malware used by the Kimsuky group.

Access 85
article thumbnail

SEC issued a record award of $279 million to a whistleblower

Security Affairs

The Securities and Exchange Commission (SEC) announced the largest-ever award, approximately $279 million, to a whistleblower. The Securities and Exchange Commission (SEC) paid a record sum of approximately $279 million to a whistleblower. The award was paid to a whistleblower whose information and assistance led to the successful enforcement of SEC and related actions.

article thumbnail

CIPL Publishes Discussion Paper on B2G Data Sharing

Hunton Privacy

On May 4, 2023, the Centre for Information Policy Leadership at Hunton Andrews Kurth published a discussion paper on business-to-government (B2G) data sharing. Entitled “ Data Sharing Between Public and Private Sectors: When Local Governments Seek Information from the Sharing Economy ,” the paper addresses the growing trend of localities requesting (and sometimes mandating) that data collected by the private sector be shared with the localities themselves.

Paper 67
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Why the FTX Collapse Was an Identity Problem

Dark Reading

Cryptocurrency has a valuable role to play in a Web3 world — but only if the public can fully trust it.

IT 91
article thumbnail

Reltio Selects Google Cloud Spanner for Real-time Cloud Database Capability

Reltio

Reltio is pleased to share that we have selected Spanner, Google’s distributed SQL database service, as our primary database for our Google Cloud Platform (GCP) operations. This integration with Google brings many benefits to our customers, including enhanced scalability, performance, reliability, and maintainability through Reltio’s cloud-native MDM offering.

Cloud 52
article thumbnail

Consilient Inc. and Harex InfoTech Partner to Fight Financial Crime in South Korea

Dark Reading

Companies bring generative AI-Federated Learning to the forefront to transform business processes and enable dynamic risk management.

Risk 71