Wed.Sep 20, 2023

article thumbnail

Don't Let AI Frenzy Lead to Overlooking Security Risks

Data Breach Today

Successful AI Implementation Requires a Secure Foundation, Attention to Regulations The private sector's frenzy to incorporate generative AI into products is leading companies to overlook basic security practices, a Google executive warned Tuesday. "Most people are still struggling with the basics," said John Stone, whose title at Google Cloud is "chaos coordinator.

Risk 305
article thumbnail

Black Hat Fireside Chat: Flexxon introduces hardened SSD drives as a last line defense

The Last Watchdog

Creating ever smarter security software to defend embattled company networks pretty much sums up the cybersecurity industry. Related: The security role of semiconductors Cutting against the grain, Flexxon , a Singapore-based supplier of NAND memory drives and storage devices, arrived at Black Hat USA 2023 calling for a distinctive hardware approach to repelling cyber attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: London Summit - AI Tech and Incident Response

Data Breach Today

Also: The CISO's Role in AI Rollouts; Responding to Ransomware; Liability Concerns This week, ISMG editors covered the hot topics at ISMG's London Cybersecurity Summit 2023, including the technical landscape of AI, executive liability, incident response strategies in the face of a global ransomware attack and how to build personal resilience to avoid burnout.

article thumbnail

Mac in the enterprise: a CIO’s perspective by the numbers

Jamf

Fletcher Previn, SVP and CIO at Cisco, returned to JNUC to enlighten us about Cisco’s employee choice program. Previn presents data gathered from Cisco’s workforce of 130,000 people over the 12 months of the program, diving into the impact the program had on their employees’ happiness and performance, IT department and security strength of the business.

Security 138
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Why Palo Alto Is Eyeing Secure Browser Firm Talon for $600M

Data Breach Today

Talon Is in Line for a 9-Figure Deal Just 29 Months After Emerging From Stealth Last year's winner of RSA Conference's prestigious Innovation Sandbox contest could soon be acquired by Palo Alto Networks, according to Calcalist. The platform security behemoth is in advanced negotiations to purchase enterprise browser startup Talon Cyber Security for $600 million, Calcalist said.

Security 278

More Trending

article thumbnail

Feds Warn Health Sector of Lazarus Group Attacks

Data Breach Today

HHS: North Korean-Sponsored Group Is Exploiting Critical Zoho ManageEngine Flaw Federal authorities are warning of "significant risk" for potential attacks on healthcare and public health sector entities by the North Korean state-sponsored Lazarus Group involving exploitation of a critical vulnerability in 24 Zoho ManageEngine products.

Risk 277
article thumbnail

Experts found critical flaws in Nagios XI network monitoring software

Security Affairs

Researchers discovered multiple vulnerabilities in the Nagios XI network and IT infrastructure monitoring and management solution. Researchers discovered four vulnerabilities (CVE-2023-40931, CVE-2023-40932, CVE-2023-40933, CVE-2023-40934) in the Nagios XI network and IT infrastructure monitoring solution that could lead to information disclosure and privilege escalation.

Passwords 132
article thumbnail

UK Parliament Approves Online Safety Bill

Data Breach Today

Cabinet Ministers Call on Facebook to Stop Rollout of Encrypted Messaging A day after the British Parliament approved a bill intended to eradicate child abuse content, cabinet officials called on social media giant Meta to halt a rollout of end-to-end encryption. Meta hasn't provided assurances that it will safeguard users, charged Home Secretary Suella Braverman.

article thumbnail

The dark web drug marketplace PIILOPUOTI was dismantled by Finnish Customs

Security Affairs

Finnish police announced the takedown of the dark web marketplace PIILOPUOTI which focuses on the sale of illegal narcotics. Finnish Customs announced the seizure of the dark web marketplace Piilopuoti as part of an international law enforcement operation. The dark web marketplace PIILOPUOTI has been active since May 18, 2022. “The site operated as a hidden service in the encrypted Tor network.

Sales 119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Financially Motivated Hacks by Chinese-Speaking Actors Surge

Data Breach Today

These Hackers May Equal or Surpass Threat Posed by Russian Hackers, Researchers Say Chinese-speaking hackers associated with criminal activity have redoubled efforts to target compatriots with malware to remotely control victim computers, pointing to a worrying surge in financially driven activity in the Sino cyber underworld, say researchers at Proofpoint.

259
259
article thumbnail

Fake WinRAR PoC Exploit Conceals VenomRAT Malware

Dark Reading

A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.

Archiving 122
article thumbnail

WatchGuard Buys CyGlass to Bring NDR to Midmarket Customers

Data Breach Today

M&A Gives WatchGuard Clients More Visibility Into East-West Traffic, Cloud Activity WatchGuard purchased a Massachusetts company to extend network detection and response capabilities traditionally reserved for high-end enterprises to the midmarket through MSPs. The deal gives WatchGuard clients more visibility into east-west network traffic and activity taking place on the cloud.

Cloud 161
article thumbnail

International Criminal Court hit with a cyber attack

Security Affairs

A cyberattack hit the International Criminal Court (ICC) disclosed a cyberattack this week, its systems were compromised last week. The International Criminal Court (ICC) announced that threat actors have breached its systems last week. The experts at the International Criminal Court discovered the intrusion after having detected anomalous activity affecting its information systems.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

What can AI and generative AI do for governments?

IBM Big Data Hub

Few technologies have taken the world by storm the way artificial intelligence (AI) has over the past few years. AI and its many use cases have become a topic of public discussion no longer relegated to tech experts. AI—generative AI, in particular—has tremendous potential to transform society as we know it for good, boost productivity and unlock trillions in economic value in the coming years.

article thumbnail

GitLab addressed critical vulnerability CVE-2023-5009

Security Affairs

GitLab rolled out security patches to address a critical vulnerability, tracked as CVE-2023-5009, that can be exploited to run pipelines as another user. GitLab has released security patches to address a critical vulnerability, tracked as CVE-2023-5009 (CVSS score: 9.6), that allows an attacker to run pipelines as another user. The issue resides in GitLab EE and affects all versions starting from 13.12 and prior to 16.2.7, all versions starting from 16.3 before 16.3.4. “An issue has been

Access 117
article thumbnail

Data Breach Costs Rise, But Cybersecurity Pros Still Take Risks

KnowBe4

The latest data from IBM shows that the average cost of a data breach has gone up by 2% to a whopping $4.45 million. You would think that in the cybersecurity industry, people would be all about safety and security, right? I mean, it's literally in the name.

article thumbnail

FBI, CISA Issue Joint Warning on 'Snatch' Ransomware-as-a-Service

Dark Reading

The group's use of malware that forces Windows computers to reboot into Safe Mode before encrypting files is noteworthy, advisory says.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

TikTok Impersonations of Elon Musk Scam Victims of Their Bitcoin

KnowBe4

There’s been a surge of Elon Musk-themed cryptocurrency scams on TikTok, BleepingComputer reports. The scammers inform the victims that they can claim their reward after spending a small amount of bitcoin (about $132) to activate their account.

article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

In April, Cybersecurity Ventures reported on extreme cybersecurity job shortage: Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 million in 2021, according to Cybersecurity Ventures. The number of unfilled jobs leveled off in 2022, and remains at 3.5 million in 2023, with more than 750,000 of those positions in the U.S.

article thumbnail

Scam-as-a-Service Classiscam Expands Impersonation in Attacks to Include Over 250 Brands

KnowBe4

Now entering its third year in business, the phishing platform, Classicam, represents the highest evolution of an “as a service” cybercrime, aiding more than 1000 attack groups worldwide.

Phishing 112
article thumbnail

Changing Role of the CISO: A Holistic Approach Drives the Future

Dark Reading

The CISO's role has grown far beyond supervising Patch Tuesday to focus on prevention and response and to cover people, processes, and technology.

109
109
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Tighter Policies Mixed with Higher Costs Are Creating a Cyber Insurance Gap

KnowBe4

New data on the state of cyber insurance shows that it’s becoming more difficult to get a policy, and the organizations obtaining one share that circumstances could cause denial of claims.

Insurance 106
article thumbnail

Pro-Iranian Attackers Target Israeli Railroad Network

Dark Reading

The group known as "Cyber Avengers" has targeted other Israeli services in the past and often publishes technical details of its hits.

IT 104
article thumbnail

USPS Customers Become the Latest Target of the Chinese Smishing Group Called “Smishing Triad”

KnowBe4

New SMS-based phishing attack uses a new smishing kit-as-a-service to impersonate the U.S. Postal Service intent on trick victims into giving up credit.

Phishing 114
article thumbnail

'Culturestreak' Malware Lurks Inside GitLab Python Package

Dark Reading

The GitLab code hijacks computer resources to mine Dero cryptocurrency as part of a larger cryptomining operation.

Mining 110
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

“Teams will get smarter and faster”: A conversation with Eli Manning

IBM Big Data Hub

For the last three years, IBM has worked with two-time champion Eli Manning to help spread the word about our partnership with ESPN. The nature of that partnership is pretty technical, involving powerful AI models—built with watsonx —that analyze massive data sets to generate insights that help ESPN Fantasy Football team owners manage their teams.

article thumbnail

GitLab Users Advised to Update Against Critical Flaw Immediately

Dark Reading

The bug has a CVSS score of 9.6 and allows unauthorized users to compromise private repositories.

116
116
article thumbnail

SaaS data security: here’s why enterprises need to focus on this fast-growing challenge now!

Thales Cloud Protection & Licensing

SaaS data security: here’s why enterprises need to focus on this fast-growing challenge now! madhav Thu, 09/21/2023 - 05:05 A perfect storm… For several years now and especially post-pandemic, enterprises have shifted to a distributed business model, where employees, devices, computing and storage systems, applications and data have moved outside the traditional enterprise IT boundaries.

Cloud 71