Tue.Sep 26, 2023

article thumbnail

Sony Investigating Potential Data Breach

Data Breach Today

Two Online Threat Actors Claim Responsibility Sony is investigating an apparent leak of internal data posted onto the dark web and a criminal hacking board by separate criminal actors. Sony is saying little other than "we are currently investigating the situation, and we have no further comment at this time.

article thumbnail

Risk of a US Government Shutdown Is Fueled by Very Online Republicans

WIRED Threat Level

Egged on by a far-reaching conservative media ecosystem, right-wing hardliners are forcing Washington to bend to their reality as the federal government careens toward a possible shutdown.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Urges Americans to Apply MFA, 'Think Before They Click'

Data Breach Today

Director Jen Easterly: Password Managers, Automatic Software Updates Key to Defense CISA Director Jen Easterly urged citizens to boost their defenses by choosing strong passwords, opting for multi-factor authentication, reporting phishing and enabling automatic software updates. Easterly said users should choose passwords that are complex and unique to each sensitive account.

Passwords 282
article thumbnail

Signal Will Leave the UK Rather Than Add a Backdoor

Schneier on Security

Totally expected, but still good to hear : Onstage at TechCrunch Disrupt 2023, Meredith Whittaker, the president of the Signal Foundation, which maintains the nonprofit Signal messaging app, reaffirmed that Signal would leave the U.K. if the country’s recently passed Online Safety Bill forced Signal to build “backdoors” into its end-to-end encryption. “We would leave the U.K. or any jurisdiction if it came down to the choice between backdooring our encryption and betrayin

article thumbnail

LLMs in Production: Tooling, Process, and Team Structure

Speaker: Dr. Greg Loughnane and Chris Alexiuk

Technology professionals developing generative AI applications are finding that there are big leaps from POCs and MVPs to production-ready applications. They're often developing using prompting, Retrieval Augmented Generation (RAG), and fine-tuning (up to and including Reinforcement Learning with Human Feedback (RLHF)), typically in that order. However, during development – and even more so once deployed to production – best practices for operating and improving generative AI applications are le

article thumbnail

London Cybersecurity Summit Spotlights AI and Ransomware

Data Breach Today

Experts Emphasize Proactive Security Measures and Resilience to Mitigate Threats Information Security Media Group recently concluded its Cybersecurity Summit: London, which brought together industry leaders for a day of informative sessions covering a diverse range of critical cybersecurity topics, including CISOs' vulnerability to liability, ransomware threats and burnout.

More Trending

article thumbnail

Xenomorph Android Malware Campaign Targets US Banks

Data Breach Today

Enhanced Malware Exerts Even More Control Over Mobile Devices Android banking Trojan Xenomorph has resurfaced in a new campaign targeting cryptocurrency wallets and various financial institutions. The malware has been actively targeting users in Europe for more and is now focused on institutions in the United States, Canada, Spain, Italy, Portugal and Belgium.

263
263
article thumbnail

News Alert: i2Coalition launches ‘VPN Trust Initiative’ to promote VPN operators’ best practices

The Last Watchdog

Washington, DC, Sept.26, 2023 — The Internet Infrastructure Coalition (i2Coalition) launched the VPN Trust Initiative (VTI) in 2020 to establish a baseline for how virtual private network (VPN) providers should operate. The goal is to help avoid oversights, misunderstandings, or vague legislation that could invite abuses of power and short-sighted legislation of helpful technology.

Privacy 100
article thumbnail

US, South Korea Pledge Strengthened Tech Collaboration

Data Breach Today

Officials Discuss Governance for AI, 5G, Cloud Computing The United States and South Korea reaffirmed a commitment to mitigate the risks in technologies including AI, 5G networks and cloud computing, while developing an "inclusive approach" to govern their use. The two countries said governance must support the development of trustworthy AI.

Cloud 249
article thumbnail

Canadian Flair Airlines left user data leaking for months

Security Affairs

Researchers discovered that Canadian Flair Airlines left credentials to sensitive databases and email addresses open for at least seven months Canadian Flair Airlines left credentials to sensitive databases and email addresses open for at least seven months, the Cybernews research team has discovered. This increases the risk of passengers’ personal information, such as emails, names, or addresses, ending up in the wrong hands.

Phishing 119
article thumbnail

Your Expert Guide to CX Orchestration & Enhancing Customer Journeys

Speaker: Keith Kmett, Principal CX Advisor at Medallia

Join Keith Kmett, Principal CX Advisor, in this new webinar that will focus on: Understanding CX Orchestration Fundamentals: Gain a solid understanding of what CX orchestration is, its significance in the customer experience landscape, and how it plays a crucial role in shaping customer journeys. This includes the key concepts, strategies, and best practices involved in CX orchestration. 🔑 Connection to Customer Journey Maps: How to effectively integrate customer journey mapping into the

article thumbnail

Coding the Future: A DevOps Odyssey – Pioneering Automation, Innovation, and Collaboration

Data Breach Today

Discover the power of JFrog Curation's features and benefits in securing and auditing developers open source and third-party package downloads.

Security 264
article thumbnail

Amidst MGM, Caesar's Incidents, Attackers Focus on Luxury Hotels

Dark Reading

A fast-growing cyber campaign solely takes aim at luxury hotel and resort chains, using security-disruptive tactics to spread info-stealing malware.

Security 129
article thumbnail

Live Webinar I Breaking Barriers: Transforming Threat Detection and Response

Data Breach Today

Join Simon Perry, Senior Product Marketing Manager & Security Evangelist, VMware Carbon Black to discover unparalleled data insights with the latest groundbreaking extended detection and response solution (XDR) from VMware Carbon Black.

Security 194
article thumbnail

Spatial computing is the next frontier in airline flight safety

IBM Big Data Hub

Flight delays are a frustrating aspect of flying. It’s a situation most can relate to: sitting in the terminal or on the tarmac wondering why your flight is delayed, with no answers or information. There are dozens of reasons why an aircraft could be delayed with safety being the underpinning reason for many of them. Suppose an aircraft incurs minor damage from a lightning strike or by coming into contact with ground equipment as it’s being towed or refueled, or it sustains damage fr

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

FTC Publishes Staff Paper on the Harm of Blurred Advertising

Hunton Privacy

On September 14, 2023, the Federal Trade Commission issued a press release announcing the publication of a staff paper about blurred advertising. In the staff paper, the FTC describes blurred advertising as the blending of ads with digital media content ( e.g., displaying ads within online games and virtual reality worlds). The FTC warns that these ads are not readily identifiable as marketing by consumers and pose a significant threat to young children who do not have the skills or cognitive de

Paper 107
article thumbnail

Xenomorph malware is back after months of hiatus and expands the list of targets

Security Affairs

A new campaign is spreading Xenomorph malware to Android users in the United States, Spain, Portugal, Italy, Canada, and Belgium. Researchers from ThreatFabric uncovered a new campaign spreading Xenomorph malware to Android users in the United States and all over the world. In February 2022, researchers from ThreatFabric first spotted the Xenomorph malware, which was distributed via the official Google Play Store reaching over 50,000 installations.

Phishing 107
article thumbnail

Researchers Uncover RaaS Affiliate Distributing Multiple Ransomware Strains

Dark Reading

Ransomware-as-a-service affiliate ShadowSyndicate is unusual for the size of its malicious infrastructure and the fact that it's distributing seven different ransomware strains.

article thumbnail

Threat actors claim the hack of Sony, and the company investigates

Security Affairs

Sony launched an investigation into an alleged data breach after the RansomedVC group claimed the hack of the company. Sony announced it is investigating allegations of a data breach after the RansomedVC extortion group claimed to have hacked the company and added the company to its Tor leak site. “We are currently investigating the situation, and we have no further comment at this time.

article thumbnail

Use Cases for Apache Cassandra®

There’s a good reason why Apache Cassandra® is quickly becoming the NoSQL database of choice for organizations of all stripes. In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid. From understanding its distributed architecture to unlocking its incredible power for industries like healthcare, finance, retail and more, experience how Cassandra® can transform your entire data operations.

article thumbnail

Child support systems modernization: The time is now

IBM Big Data Hub

The majority of today’s child support systems are dated, first-generation systems that are now more than 25 years old. These systems need modernization to meet the evolving needs of children and families in the 21 st century. With more than 20% of families and children supported by these systems, the impact is significant. Today’s constituents are interested in engaging with services using modern, consumer-friendly technologies, platforms and devices.

Cloud 104
article thumbnail

The Rhysida ransomware group hit the Kuwait Ministry of Finance

Security Affairs

This week the Rhysida ransomware group claimed the hack of the Kuwait Ministry of Finance and added it to its Tor leak site. Last week a ransomware attack hit the Government of Kuwait, the attack took place on September 18 and the government experts immediately started the incident response procedures to block the threat. Below is the message published on Twitter by the official X account of Kuwait’s Ministry of Finance.

article thumbnail

Proactive Security: What It Means for Enterprise Security Strategy

Dark Reading

Proactive Security holds the elusive promise of helping enterprises finally get ahead of threats, but CISOs must come to grips with the technological and philosophical change that it brings.

Security 100
article thumbnail

Collibra a Leader in The Forrester Wave™: Data Governance Solutions, Q3 2023

Collibra

Today’s data-driven organizations depend on data intelligence. But you can’t have data intelligence if your data isn’t governed. Data governance is the process of managing data as a strategic asset so it is accurate, accessible, secure, and consistent. Today, we’re thrilled to share that Forrester just cited Collibra as a data governance Leader in The Forrester Wave : Data Governance Solutions, Q3 2023!

article thumbnail

Reimagining CX: How to Implement Effective AI-Driven Transformations

Speaker: Steve Pappas

As businesses strive for success in an increasingly digitized world, delivering an exceptional customer experience has become paramount. To meet this demand, enterprises are embracing innovative approaches that captivate customers and fuel their loyalty. 💥 Enter conversational AI - an absolute game-changer (if done right) in redefining CX norms.

article thumbnail

Practical Insights To Improve Security Awareness in Higher Education

KnowBe4

Higher education is making important strides in improving cybersecurity readiness, but much is yet to be done. Cybersecurity awareness professionals.

article thumbnail

Top 5 Problems Solved by Data Lineage

Security Affairs

Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle. In an age where data drives decisions and fuels innovation, understanding the journey of data from its inception to its final destination is paramount. Data lineage provides this understanding. Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle, and it offers a host of benefits in solving critical data management challenges.

article thumbnail

4 Pillars for Building a Responsible Cybersecurity Disclosure Program

Dark Reading

Responsible disclosure must strike a balance between the immediate need to protect users and the broader security implications for the entire community.

article thumbnail

BORN Ontario data breach impacted 3.4 million newborns and pregnancy care patients

Security Affairs

The Better Outcomes Registry & Network (BORN), the Ontario birth registry disclosed a data breach affecting some 3.4 million people. The Better Outcomes Registry & Network (BORN) is a program and database used in the healthcare sector, particularly in maternal and child health, to collect, manage, and analyze health information for the purpose of improving patient outcomes and healthcare services.

article thumbnail

Lessons Learned in PostgreSQL®

In today's digital landscape, the threat of ransomware demands proactive defense. This paper, inspired by a real PostgreSQL® database incident, offers vital strategies for effective mitigation. Instaclustr expert Perry Clark outlines immediate actions to minimize risks, ensuring a swift response to ransomware threats and protecting critical data assets.

article thumbnail

Chad Taps Huawei for Digital Modernization Project

Dark Reading

Fiber optic networks and better connectivity for Chad's users are part of the ICT modernization project with the Chinese networking giant.

101
101
article thumbnail

Cisco+ Secure Connect SASE Review & Features 2023

eSecurity Planet

The Cisco+ Secure Connect SASE product builds off of Cisco’s networking expertise to provide a strong secure access service edge (SASE) solution. The rich options and features of their legacy network and SD-WAN offerings, as well as the familiar Umbrella and Duo security features, will continue to be used in the SASE solution and be attractive to current Cisco customers.

article thumbnail

Smishing Triad Stretches Its Tentacles into the United Arab Emirates

Security Affairs

Resecurity research found that the ‘Smishing Triad’ cybercrime group has expanded its phishing campaign into the United Arab Emirates (UAE). Resecurity research recently found that ‘ Smishing Triad ,’ a group specializing in phishing scams conducted via SMS (smishing attacks), has expanded its attack campaign into the United Arab Emirates (UAE).