Fri.Sep 29, 2023

article thumbnail

IronNet Ceases Operations, Terminates All Remaining Staffers

Data Breach Today

End Comes Just 25 Months After Threat Detection Firm Went Public At $1.2B Valuation The firm founded by retired four-star Gen. Keith Alexander and once valued at $1.2 billion has officially turned off the lights. IronNet Friday ceased business operations and terminated remaining employees after probing strategic alternatives and finding additional sources of liquidity unavailable.

282
282
article thumbnail

A still unpatched zero-day RCE impacts more than 3.5M Exim servers

Security Affairs

Experts warn of a critical zero-day vulnerability, tracked as CVE-2023-42115, in all versions of Exim mail transfer agent (MTA) software. A critical zero-day vulnerability, tracked as CVE-2023-42115 (CVSS score 9.8), affects all versions of Exim mail transfer agent (MTA) software. A remote, unauthenticated attacker, can exploit the vulnerability to gain remote code execution (RCE) on Internet-exposed servers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulns Found In Another Progress Software File Transfer App

Data Breach Today

'There's a 10-out-10 severity bug you need to patch right now!' Progress Software is again sending customers on a scramble to install emergency patches, this time for its secure FTP server software. The advisory comes months after hackers took advantage of a zero day in the company's MOVEit file transfer software in a hack affecting tens of millions.

Security 278
article thumbnail

Misconfigured WBSC server leaks thousands of passports

Security Affairs

The World Baseball Softball Confederation (WBSC) left open a data repository exposing nearly 50,000 files, some of which were highly sensitive, the Cybernews research team has discovered. On June 5th, our researchers discovered a misconfigured Amazon Web Services (AWS) bucket storing nearly 48,000 files. A bucket is a container for storing data within AWS’s cloud storage system.

Risk 125
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

CrowdStrike Boosts Israeli Startup Ties With AWS Partnership

Data Breach Today

AWS & CrowdStrike Cybersecurity Startup Accelerator Will Incubate Early-Stage Firms CrowdStrike has joined forces with Amazon Web Services to familiarize themselves with more Israeli cyber startups earlier in their development lifecycle. The Cybersecurity Startup Accelerator will provide EMEA-based companies with mentorship, technical expertise and partnership opportunities.

More Trending

article thumbnail

Inside Look: FDA's Cyber Review Process for Medical Devices

Data Breach Today

Medical device makers in their premarket submissions to the Food and Drug Administration under the agency's new refuse to accept policy for cybersecurity should pay close attention to details such as a product's software bill of materials and vulnerability management, said Jessica Wilkerson of FDA.

article thumbnail

Real-time transaction data analysis with IBM Event Automation

IBM Big Data Hub

As the pace and volume of digital business continue to increase, organizations are facing mounting pressure to accelerate the speed at which they do business. The ability to quickly respond to shifting customer and market dynamics has become key for contending with today’s growing digital economy. In a survey run by IDC, a leading provider of global IT research and advice, 43% of technology leaders indicated that they were “planning to deliver innovative digital products and services

Marketing 115
article thumbnail

NSA Stands Up New Organization to Harness AI

Data Breach Today

A US Advantage on AI Should 'Not Be Taken For Granted,' Says NSA Head Paul Nakasone The NSA has set up a new organization to oversee artificial intelligence in national security systems. Dubbed the AI Security Center, the unit will consolidate the agency's AI activities and support the government's effort to "maintain its competitive edge in AI," said Army Gen.

article thumbnail

Move Over, MOVEit: Critical Progress Bug Infests WS_FTP Software

Dark Reading

In the wake of Cl0p's MOVEit rampage, Progress Software is sending file-transfer customers scrambling again — this time to patch a critical bug that is easily exploitable with a specially crafted HTTPS POST request.

110
110
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Editors' Panel: What Impact Will Cisco's Splunk Acquisition Have on Industry?

Data Breach Today

Also: OT Security Trends, Challenges; FDA Medical Device Guidance In our latest weekly update, ISMG editors discuss key takeaways from a forum on developing a strategy for OT security, guidance issued by the U.S. Food and Drug Administration on cybersecurity in medical devices, and how the acquisition of Splunk by Cisco might impact the cybersecurity industry.

article thumbnail

People Still Matter in Cybersecurity Management

Dark Reading

Cybersecurity's constant stream of shiny new things shouldn't distract managers from their focus on the people they're protecting.

article thumbnail

Your KnowBe4 Fresh Content Updates from September 2023

KnowBe4

Check out the 66 new pieces of training content added in September, alongside the always fresh content update highlights, events and new features.

article thumbnail

Cybersecurity Gaps Plague US State Department, GAO Report Warns

Dark Reading

The federal department that oversees the US diplomatic corps abroad suffers a serious lack of visibility into the cyber threats it faces and the security vulnerabilities it's harboring.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

Securing AI: What You Should Know

Dark Reading

Securing AI within your organization starts with understanding how AI differs from traditional business tools. Google's Secure AI Framework provides a model for what to do next.

article thumbnail

Weekly Update 367

Troy Hunt

Ah, home 😊 It's been more than a month since I've been able to sit at this desk and stream a weekly video. And now I'm doing it with the glorious spring weather just outside my window, which I really must make more time to start enjoying. Anyway, this week is super casual due to having had zero prep time, but I hope the discussion about the ABC's piece on HIBP and I in particular is interesting.

article thumbnail

Security Awareness Is Dead. Long Live Security Awareness

KnowBe4

Awareness, behavior, and culture remain key pillars of any security awareness program aiming to win hearts and change behavior. Read more on our blog.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IBM Cloud inactive identities: Ideas for automated processing

IBM Big Data Hub

Regular cleanup is part of all account administration and security best practices, not just for cloud environments. In our blog post on identifying inactive identities , we looked at the APIs offered by IBM Cloud Identity and Access Management (IAM) and how to utilize them to obtain details on IAM identities and API keys. Some readers provided feedback and asked on how to proceed and act on identified inactive identities.

Cloud 88
article thumbnail

DHS: Physical Security a Concern in Johnson Controls Cyberattack

Dark Reading

An internal memo cites DHS floor plans that could have been accessed in the breach.

Security 114
article thumbnail

How can organizations approach AI ethically?

OpenText Information Management

Meet Skye, a trusted partner for your AI journey. This AI-generated and very well-dressed llama will help you make the most of AI innovations while staying true to your organization’s values. She’s bright-eyed, sure-footed, and wired up to assist you in solving your business challenges efficiently and ethically. This llama is your guide to realizing … The post How can organizations approach AI ethically?

76
article thumbnail

Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain

Dark Reading

The Israeli company developed highly-targeted, mobile malware that would make any APT jealous.

104
104
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

FTC Bureau Director Outlines FTC’s Proactive Approach to AI Regulation

Hunton Privacy

On September 19, 2023, the Director of the Federal Trade Commission Bureau of Consumer Protection, Samuel Levine, delivered remarks that provided insight into the FTC’s ongoing strategy for regulating artificial intelligence (“AI”) during the National Advertising Division’s annual conference. Levine emphasized that the FTC is taking a more proactive approach to protect consumers from the harmful uses of AI, while ensuring the market remains fair, open, and competitive.

article thumbnail

Attacks on Azerbaijan Businesses Drop Malware via Fake Image Files

Dark Reading

Images purporting to be of the Armenia and Azerbaijan conflict were malware downloaders in disguise.

94
article thumbnail

Don’t Sleep on the EU’s Digital Markets and Digital Services Acts

John Battelle's Searchblog

(This is a preview of a piece I’m working on for Signal360 , to be published next week.) “The US litigates, the EU legislates.” That’s what one confidential source told me when I asked about the Digital Services Act and the Digital Markets Act , the European Union’s twin set of Internet regulations coming into force this year.

article thumbnail

1xBet Az?rbaycan: 100 dollar bonus, t?tbiqetm?, apk, qeydiyyat

Armstrong Archives

Content Hansı versiya daha yaxşıdır – köhnə və ya yeni? Bet tətbiqetməsindən necə pul çıxarmaq olar Yeni bahisçilər üçün xoş gəlmisiniz bonusu Bet idman mərcləri üçün mərc növləri və mövcud imkanlar Bukmeker kontorunda hesabı necə maliyyələşdirmək olar? Bet saytında qeydiyyat şərtləri və üsulları Sosial şəbəkələr vasitəsilə sürətli avtorizasiya Bet-də təhlükəsiz mərc və güvənli ortam Bet Azərbaycan – Onlayn İdman Mərcləri və Casino Saytı Bet Az Promos və Bonuslar Proqramı PlayMarket-dən yü

52
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New NARA Bulletin on Collaboration Platforms

National Archives Records Express

We are pleased to announce the release of NARA Bulletin 2023-04, Managing Records Created on Collaboration Platforms. We are issuing this bulletin to address agencies’ increased use of intra/inter-agency collaboration platforms to accomplish their missions. The capabilities of collaboration platforms are increasingly robust and can be used when working from any location.

article thumbnail

Green Libraries Week is Live!

CILIP

Green Libraries Week is Live! Green Libraries week starts today. This year Libraries Week - the annual event that helps libraries across the country run engagement events for their communities – has gone green! Libraries from Jersey to John O’Groats are taking part with activities that include, ‘Make A Bird Feeder’, ‘Turn Trash into Treasure’ and a drop-in session to learn about carbon footprint calculations and reduction ideas.

article thumbnail

How to Create Jamf Manifests or Custom Configuration Profiles

Jamf

Learn how to create Jamf Pro manifests for custom configuration profiles that manage applications or Mac settings not included in Jamf Pro’s default set of payloads.

52