Fri.May 17, 2024

article thumbnail

US SEC Approves Wall Street Data Breach Reporting Regs

Data Breach Today

Covered Financial Institutions Have 30 Days to Notify Customers of Data Breaches The Securities and Exchange Commission unanimously approved updated regulations for covered financial institutions requiring entities such as fund companies and investment advisers to notify customers within 30 days of a cyber incident that compromised their data.

article thumbnail

Turla APT used two new backdoors to infiltrate a European ministry of foreign affairs

Security Affairs

Russia-linked Turla APT allegedly used two new backdoors, named Lunar malware and LunarMail, to target European government agencies. ESET researchers discovered two previously unknown backdoors named LunarWeb and LunarMail that were exploited to breach European ministry of foreign affairs. The two backdoors are designed to carry out a long-term compromise in the target network, data exfiltration, and maintaining control over compromised systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Health Plan Services Firm Notifying 2.4 Million of PHI Theft

Data Breach Today

Data Stolen Over a Year Ago, But WebTPA Didn’t Discover Hack Until December A Texas-based firm that provides health plan administration services is notifying more than 2.4 million individuals of a hacking incident and data theft that happened more than a year ago. Why did it take WebTPA so long to report that a breach occurred?

IT 177
article thumbnail

Wingardium Trivia-osa! On-Device Sorting Hatbot Powered by Gemma, Ollama, USearch, and RETSim

Elie

Exploring the societal impact of the GenAI workforce entering the market.

Marketing 149
article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

Healthcare Identity Security: What to Expect from Your Solution

Data Breach Today

What are the key elements of a successful identity security program, and what are common pitfalls organizations experience when launching one? SailPoint healthcare experts Matthew Radcliffe and Rob Sebaugh detail myths and realities of today’s cloud-based identity security deployment strategies.

Security 169

More Trending

article thumbnail

Hackers Target US AI Experts With Customized RAT

Data Breach Today

Hackers Sought Specific Generative AI Software at Leading US Firm: Proofpoint A possible Chinese threat actor is using a variant of the Gh0st RAT malware to steal information from artificial intelligence experts in U.S. companies, federal agencies and academia. On the criminal group's target list was a "leading U.S.-based AI organization.

article thumbnail

North Korea-linked Kimsuky APT attack targets victims via Messenger

Security Affairs

North Korea-linked Kimsuky APT group employs rogue Facebook accounts to target victims via Messenger and deliver malware. Researchers at Genius Security Center (GSC) identified a new attack strategy by the North Korea-linked Kimsuky APT group and collaborated with the Korea Internet & Security Agency (KISA) for analysis and response. The nation-state actor attack used a fake account posing as a South Korean public official in the North Korean human rights sector.

article thumbnail

Achieving cloud excellence and efficiency with cloud maturity models

IBM Big Data Hub

Business leaders worldwide are asking their teams the same question: “Are we using the cloud effectively?” This quandary often comes with an accompanying worry: “Are we spending too much money on cloud computing?” Given the statistics—82% of surveyed respondents in a 2023 Statista study cited managing cloud spend as a significant challenge—it’s a legitimate concern.

Cloud 97
article thumbnail

City of Wichita disclosed a data breach after the recent ransomware attack

Security Affairs

The City of Wichita disclosed a data breach after the ransomware attack that hit the Kansas’s city earlier this month. On May 5th, 2024, the City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. The city immediately started its incident response procedure to prevent the threat from spreading and announced an investigation into the attack.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

FBI Seizes BreachForums Website

Schneier on Security

The FBI has seized the BreachForums website, used by ransomware criminals to leak stolen corporate data. If law enforcement has gained access to the hacking forum’s backend data, as they claim, they would have email addresses, IP addresses, and private messages that could expose members and be used in law enforcement investigations. […] The FBI is requesting victims and individuals contact them with information about the hacking forum and its members to aid in their investigation.

article thumbnail

CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog

Security Affairs

CISA adds two Chrome zero-day vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added [ 1 , 2 ] the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-4761 Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page.

IT 99
article thumbnail

Verizon: The Human Element is Behind Two-Thirds of Data Breaches

KnowBe4

Despite growing security investments in prevention, detection and response to threats, users are still making uninformed mistakes and causing breaches.

article thumbnail

CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

CISA adds two D-Link DIR-600 and DIR-605 router vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following D-Link router vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2014-100005 Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev.

IT 96
article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

Elevate your potential

OpenText Information Management

Technology innovation moves at a breakneck pace. Professionals who stay up to date with the latest developments have the opportunity to boost their job skills and become invaluable to their organizations. That’s why we’re making training and certification a central focus of OpenText World 2024. Join us this November at The Venetian Resort Las Vegas to quickly get up to speed with the latest skills that are in high demand, then demonstrate your proficiency with certification.

article thumbnail

AI in commerce: Essential use cases for B2B and B2C

IBM Big Data Hub

Key takeaways By implementing effective solutions for AI in commerce, brands can create seamless, personalized buying experiences that increase customer loyalty, customer engagement, retention and share of wallet across B2B and B2C channels. Poorly run implementations of traditional or generative AI in commerce—such as models trained on inadequate or inappropriate data—lead to bad experiences that alienate consumers and businesses.

B2C 65
article thumbnail

Zero Trust Network Security Explained

Adapture

As cyberattacks have become more complex, new strategies and philosophies around cybersecurity have developed to counter these threats. IT leaders have come to accept a harsh reality—stopping every cyberattack might not be possible. Instead, strategies have developed around mitigating attacks, limiting the damage a bad actor can cause. One such strategy that has become increasingly popular is the Zero Trust model.

article thumbnail

96% of hospitals share website data: Study via Becker’s Health IT

IG Guru

Check out the article here. The post 96% of hospitals share website data: Study via Becker’s Health IT first appeared on IG GURU.

IT 61
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Top US Cyber Defense Official Eric Goldstein to Step Down

Data Breach Today

Eric Goldstein Stepping Down in June After 3 Years at US Cyber Defense Agency Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency, is stepping down from the top post at the nation’s cyber defense agency after serving more than three years in the Biden administration.

article thumbnail

Friday Squid Blogging: Emotional Support Squid

Schneier on Security

When asked what makes this an “emotional support squid” and not just another stuffed animal, its creator says: They’re emotional support squid because they’re large, and cuddly, but also cheerfully bright and derpy. They make great neck pillows (and you can fidget with the arms and tentacles) for travelling, and, on a more personal note, when my mum was sick in the hospital I gave her one and she said it brought her “great comfort” to have her squid tucked up

article thumbnail

A new era in BI: Overcoming low adoption to make smart decisions accessible for all

IBM Big Data Hub

Organizations today are both empowered and overwhelmed by data. This paradox lies at the heart of modern business strategy: while there’s an unprecedented amount of data available, unlocking actionable insights requires more than access to numbers. The push to enhance productivity, use resources wisely, and boost sustainability through data-driven decision-making is stronger than ever.

Access 79