Fri.Nov 03, 2023

article thumbnail

How the Healthcare Sector Can Boost Credential Management

Data Breach Today

Stolen and compromised credentials continue to be the crux of major health data security incidents involving cloud environments. But stronger credential management practices and a focused approach to "least privilege engineering" would help, said Taylor Lehmann of Google Cloud.

Cloud 276
article thumbnail

Takeaways from the Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence

AIIM

In the U.S., President Joe Biden’s administration issued an executive order on artificial intelligence, which “establishes new standards for AI security.” The Executive Order issued on October 30, 2023 directs several actions designed to “protect Americans from the potential risks of AI systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FusionAuth Receives $65M to Safeguard New Identity Domains

Data Breach Today

First-Ever Outside Investment Will Allow CIAM Provider to Better Authenticate Users A Colorado-based customer identity platform hauled in $65 million to effectively identify and authenticate users with government IDs or mobile phones. The growth equity investment from Updata Partners will allow FusionAuth to better serve businesses in regions other than the U.S. and Europe.

article thumbnail

Russian FSB arrested Russian hackers who supported Ukrainian cyber operations

Security Affairs

The FSB arrested two Russian hackers who are accused of having helped Ukrainian entities carry out cyberattacks on critical infrastructure targets. The Russian intelligence agency Federal Security Service (FSB) arrested two individuals who are suspected of supporting Ukrainian entities to carry out cyberattacks to disrupt Russian critical infrastructure.

Security 134
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Atlassian Urges Patching Against Data Loss Vulnerability

Data Breach Today

Exploit Goes Public But No Sign of Active Exploitation Atlassian added new urgency Thursday to a warning that customers with on-premises Confluence servers should patch immediately to protect against a vulnerability that attackers could exploit to destroy data. A publicly available exploit now exists for the vulnerability, tracked as CVE-2023-22518.

260
260

More Trending

article thumbnail

Convicted: 'King of Crypto' Bankman-Fried Now King of Fraud

Data Breach Today

Jury Convicts Sam Bankman-Fried of All 7 Fraud and Money Laundering Charges The guilty verdicts returned by a jury against Sam Bankman-Fried confirmed that the one-time cryptocurrency wunderkind now stands as one of America's biggest fraudsters. His sentencing is scheduled for March 28, 2024. The statutory maximum sentences for his crimes total over 100 years in prison.

252
252
article thumbnail

ZDI discloses four zero-day flaws in Microsoft Exchange

Security Affairs

Researchers disclosed four zero-day flaws in Microsoft Exchange that can be remotely exploited to execute arbitrary code or disclose sensitive information on vulnerable installs. Trend Micro’s Zero Day Initiative (ZDI) disclosed four zero-day vulnerabilities in Microsoft Exchange that can be remotely exploited by an authenticated attacker to execute arbitrary code or disclose sensitive information on vulnerable installs.

article thumbnail

ICE Employees Downloaded Banned Apps on Government Devices

Data Breach Today

New Report Identifies ‘Risky’ Unauthorized Apps That Pose National Security Risks The Department of Homeland Security inspector general found U.S. Immigration and Customs Enforcement employees had downloaded "risky user-installed mobile applications" onto government devices despite the devices being banned from federal information systems for posing national security risks.

article thumbnail

Multiple WhatsApp mods spotted containing the CanesSpy Spyware

Security Affairs

Kaspersky researchers are warning of multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. Kaspersky researchers discovered multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. mods are modifications or alterations made to an application, often by third-party developers or users. These modifications can serve various purposes, such as adding new features, customizing the app’s behavior, or enhancing its performance.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Election Officials Plead for Federal Cybersecurity Funding

Data Breach Today

Local Election Offices Face Critical Lack of Cyber Resources, Officials Warn Secretaries of state and election administrators told the Senate Committee on Rules and Administration that local election offices are facing a critical lack of resources and funding to support essential cybersecurity measures ahead of the upcoming voting cycle.

article thumbnail

Ace Hardware Still Reeling From Weeklong Cyberattack

Dark Reading

Cyberattackers downed a quarter of the hardware giant's entire IT apparatus. Now, before the company can recover, they're going after individual branches.

IT 127
article thumbnail

Europe Clamps Down on Meta Ad Personalization

Data Breach Today

Company Rolls Out a Paid Subscription for Ad-Free Use Social media giant Meta faces a possible ban within the next 10 days across Europe on the consent-free use of personal data for ad personalization. A Meta spokesperson said the company does not face a "blanket ban" on the use of personal data and is introducing a subscription option.

article thumbnail

New York Increases Cybersecurity Rules for Financial Companies

Schneier on Security

Another example of a large and influential state doing things the federal government won’t: Boards of directors, or other senior committees, are charged with overseeing cybersecurity risk management, and must retain an appropriate level of expertise to understand cyber issues, the rules say. Directors must sign off on cybersecurity programs, and ensure that any security program has “sufficient resources” to function.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind

Lenny Zeltser

The notion that security is everyone’s responsibility in computer systems dates back to at least the early 1980s when it was included in a US Navy training manual and hearings in the US House of Representatives. Behind the pithy slogan is the idea that every person in the organization contributes to its security program. Even if the company has employees with “security” in their title, they cannot safeguard information assets on their own.

article thumbnail

Critical Atlassian Bug Exploit Now Available; Immediate Patching Needed

Dark Reading

In-the-wild exploit activity from dozens of cyberattacker networks is ramping up for the security vulnerability in Confluence, tracked as CVE-2023-22518.

Security 104
article thumbnail

Data Breaches and Cyber Attacks in October 2023 – 867,072,315 Records Breached

IT Governance

IT Governance’s research has discovered the following for October 2023: 114 publicly disclosed security incidents. 867,072,315 records known to be breached. Introducing our Data Breach Dashboard We’re excited to introduce our new monthly Data Breach Dashboard – a one-page overview of this month’s key findings that you can download for free. Our first downloadable Dashboard is going live next week.

article thumbnail

To Improve Cyber Defenses, Practice for Disaster

Dark Reading

Trained teams can implement and test security measures and protocols to prevent and mitigate cyber breaches.

Security 122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apache Kafka and Apache Flink: An open-source match made in heaven

IBM Big Data Hub

In the age of constant digital transformation, organizations should strategize ways to increase their pace of business to keep up with — and ideally surpass — their competition. Customers are moving quickly, and it is becoming difficult to keep up with their dynamic demands. As a result, I see access to real-time data as a necessary foundation for building business agility and enhancing decision making.

article thumbnail

'KandyKorn' macOS Malware Lures Crypto Engineers

Dark Reading

Posing as fellow engineers, the North Korean state-sponsored cybercrime group Lazarus tricked crypto-exchange developers into downloading the hard-to-detect malware.

95
article thumbnail

Mastering Ingress in the UI: Elevating your app visibility

IBM Big Data Hub

When scaling up the number of applications you manage, it can feel like there are a lot of moving parts to ensure that your APIs are going through to the right applications in a secure manner. To make this easier, IBM Cloud® Kubernetes exposes various API integrations, which are already available through the command line interface (CLI) and Terraform.

Cloud 81
article thumbnail

Okta Customer Support Breach Exposed Data on 134 Companies

Dark Reading

1Password, BeyondTrust, and Cloudflare were among five customers directly targeted with stolen Okta session tokens, the company's CSO says.

102
102
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Seiko watches 60K personal data records tick away in BlackCat ransomware heist via TheRegister

IG Guru

Check out the article here. The post Seiko watches 60K personal data records tick away in BlackCat ransomware heist via TheRegister first appeared on IG GURU.

article thumbnail

Ransomware Readiness Assessments: One Size Doesn't Fit All

Dark Reading

Tailored ransomware readiness assessments help organizations develop comprehensive response plans that minimize damage and restore operations quickly.

article thumbnail

Why Prime Time TV Might Make a Comeback

John Battelle's Searchblog

I hate to admit it, but I miss prime time. For those of you born after Seinfeld went off the air, “prime time” dominated an era when television viewers only had three or four choices at any given time. Before streaming took over our devices, before cable devolved to 500 channels with nothing to see, there was “prime time television.” If you’re old enough to remember when Friends ruled “Must-See TV,” you (and tens of millions of others) likely spent a fai

article thumbnail

Considerations for Managing Digital Sovereignty: The Executive Perspective

Dark Reading

Business leaders must frequently balance the advantages of cloud computing and the free flow of data across geographic borders with the need to abide by local laws and regulations.

Cloud 81
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ombudsman argues against allowing journalists access to their own search warrants

The Guardian Data Protection

Four-year appeal to obtain information on secret trawling of journalists’ data by law enforcement agencies continues Follow our Australia news live blog for latest updates Get our morning and afternoon news emails , free app or daily news podcast Journalists whose data has been secretly trawled by law enforcement agencies are unable to determine if they have been the subject of search warrants because it would breach their own privacy, the commonwealth ombudsman has argued.

Access 60
article thumbnail

Spyware Designed for Telegram Mods Also Targets WhatsApp Add-Ons

Dark Reading

Researchers discovered spyware designed to steal from Android devices and from Telegram mods can also reach WhatsApp users.

101
101
article thumbnail

Jamf After Dark: Jamf Pro 11, JNUC and IT horror stories

Jamf

Explore IT horror stories, platform updates, and insights from Jamf’s Katie English and Henry Patel on enhancing device management and security.

IT 52