Sat.Jul 15, 2023 - Fri.Jul 21, 2023

article thumbnail

Google Categorizes 6 Real-World AI Attacks to Prepare for Now

Dark Reading

The models powering generative AI like ChatGPT are open to several common attack vectors that organizations need to understand and get ready for, according to Google's dedicated AI Red Team.

85
article thumbnail

Federal Reserve's FedNow Goes Live With Fast Payments

Data Breach Today

Program Expected to Modernize Country's Payment Systems FedNow, the Federal Reserve's first instant payment service, officially launched on Thursday. FedNow so far has 35 banks and credit unions and 16 service providers certified to use the service including community banks and large lenders such as JPMorgan Chase and Bank of New York Mellon.

246
246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

Many things have changed since 2018, such as the names of the companies in the Fortune 100 list. But one aspect of that vaunted list that hasn’t shifted much since is that very few of these companies list any security professionals within their top executive ranks. The next time you receive a breach notification letter that invariably says a company you trusted places a top priority on customer security and privacy, consider this: Only four of the Fortune 100 companies currently list a sec

Security 207
article thumbnail

Introducing: Ruminant AI (You Heard it Here First)

Weissman's World

It is my pleasure and honor to introduce to you a new buzzword. It’s “Ruminant AI,” which I invented just last week and named after animals like cows and sheep that chew on previously ingested material (the cud). Here’s why: AI engines like ChatGPT ingest information from as many sources as they can be provided… Read More » Introducing: Ruminant AI (You Heard it Here First) The post Introducing: Ruminant AI (You Heard it Here First) appeared first on Holly Group.

IT 156
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

AIIM Comments on AI Accountability

AIIM

Governments around the world have started the arduous process of developing regulations and standards for artificial intelligence. In June 2023, AIIM formally responded to a request for comment from the U.S. National Telecommunications and Information Administration (NTIA) on AI accountability. According to the NTIA website, more than 1,400 responses were submitted.

More Trending

article thumbnail

LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack

Krebs on Security

[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called Defiant Tech Inc. pleaded guilty to running LeakedSource[.]com , a service that sold access to billions of passwords and other data exposed in countless data breaches.

Passwords 190
article thumbnail

News Alert: HostingAdvice poll finds one in three Americans hacked upon visiting sketchy websites

The Last Watchdog

Gainesville, Fla., July 18, 2022 – Around 30,000 websites get hacked every day , with the majority of those cyberattacks due to human error. This has projected costs associated with cybercrimes to hit the tens of trillions by 2025, highlighting the vital need for web hosts to implement staunch security. A new study by HostingAdvice, the premier authority on web hosting, found that 32% of Americans say they’ve gotten hacked from visiting a sketchy website and of those, 53% got a computer virus

Phishing 100
article thumbnail

Living Off the Land Attacks: LOTL Definition & Prevention

eSecurity Planet

Living off the land (LOTL) attacks use legitimate programs that already exist on a computer, rather than installing malware from an external source onto a system. The stealthy nature of these attacks can make them effective — and difficult for security teams to detect and prevent. To prevent LOTL attacks, security teams must use sophisticated detection methods, as well as closing loops in popular computer programs with known vulnerabilities.

article thumbnail

Combat IT Team Burnout by Embracing Automation

Data Breach Today

Expel VP Chris Waynforth on How Security Researchers Can Reduce False Positives Unnecessary cyber alerts are a threat that can overwhelm defenders, leading to burnout and reduced efficiency within the team. Chris Waynforth, vice president and general manager at Expel, said adopting automation solutions to filter and prioritize alerts allows for more effective incident response.

IT 246
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Digital Is Killing Serendipity

John Battelle's Searchblog

The buildings are the same, but the information landscape has changed, dramatically. Today I’m going to write about the college course booklet, an artifact of another time. I hope along the way we might learn something about digital technology, information design, and why we keep getting in our own way when it comes to applying the lessons of the past to the possibilities of the future.

article thumbnail

OCR and FTC Issue a Joint Letter Suggesting Enforcement Actions May Be in the Pipeline

Data Protection Report

On July 20, 2023 HHS and the Federal Trade Commission (“FTC”) issued a joint letter to approximately 130 companies regarding their online data collection processes. The letter follows the much discussed December 1, 2022, Bulletin that expanded the kinds of websites and applications governed by HIPAA (you can read about our analysis of the bulletin here ).

article thumbnail

7 Steps to the Incident Response Process & Frameworks

eSecurity Planet

Incident response frameworks and practices are detailed action plans to resolve security breaches inside a business or organization. They give the business a thorough and proactive approach to security by methodically recording every aspect of an incident, including how it happened and the measures that were taken, and describing the subsequent steps to prevent such incidents in the future.

article thumbnail

Count of Organizations Breached via MOVEit Campaign Hits 400

Data Breach Today

20 Million Individuals' Details Collectively Stolen, Based on 20% of Victim Reports The count of organizations affected by the Clop ransomware group's attack on MOVEit file-transfer software users continues to grow, now numbering over 400 organizations that were directly or indirectly impacted. More than 20 million individuals' personal details were stolen in the attacks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

G2 Summer 2023 Report

Jamf

The phrase “lightning never strikes the same place twice” is a commonly held belief that holds little grounding in science. In fact, lightning can and does strike the same place multiple times and nowhere is that as evident as Jamf solutions once again scoring top marks in G2’s Summer 2023 report.

98
article thumbnail

Embracing responsible AI in the move from automation to creation

CGI

As a data scientist and AI practitioner, I am excited to see so many positive AI use cases happening and being leveraged to bring quick information and insights to experts and business people – the potential of the rapidly evolving AI technology is truly limitless.

98
article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Kevin Mitnick, who turned legendary hacking exploits and two prison terms into a career as an esteemed cybersecurity leader, died Sunday at age 59 after a 14-month battle with pancreatic cancer, KnowBe4 revealed today. A memorial will be held August 1 in Las Vegas. Once dubbed “the world’s most wanted hacker” after his youthful exploits attacking Digital Equipment Corporation and Pacific Bell, Mitnick completed his decade-long transition to cybersecurity luminary when he joined

article thumbnail

Spanish Police End a Decade on the Run for Ukrainian Hacker

Data Breach Today

Police Also Apprehend a Smishing Fraudster and Break Up a Phishing Nexus Spanish law enforcement officers scored several recent wins against cybercriminals this month. Police nabbed a Ukrainian hacker on the run for 10 years, arrested a fraudster known to have run a smishing campaign that amassed 1.2 million euros, and broke up a phishing nexus - all in two weeks.

Phishing 246
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Teaching with technology is more than web access

Jamf

Unifying the devices in your classroom lets you take advantage of more than what the internet has to offer. Leveraging the capabilties and accessibility of Apple devices gives students, teachers and parents the tools they need to foster a creative education environment — read this blog to learn more.

Access 98
article thumbnail

Russia-linked APT Gamaredon starts stealing data from victims between 30 and 50 minutes after the initial compromise

Security Affairs

Ukraine’s Computer Emergency Response Team (CERT-UA) states that Russia-linked APT Gamaredon starts stealing data 30 minutes after the initial compromise. Ukraine’s Computer Emergency Response Team (CERT-UA) is warning that the Russia-linked APT group Gamaredon (aka Shuckworm, Actinium, Armageddon, Primitive Bear, UAC-0010, and Trident Ursa) use to steal data from victims’ networks in less than an hour after the initial compromise.

article thumbnail

Microsoft Unsure How Chinese Hackers Stole MSA Key to Breach U.S. Agencies

eSecurity Planet

Microsoft has hardened security following a Chinese hack of U.S. government agency email accounts, but some details remain a mystery. Even as the threat has passed, Microsoft officials are still analyzing how a Chinese threat group was able to access U.S. government accounts using a stolen inactive Microsoft account (MSA) consumer signing key. Chinese hacker group Storm-0558 breached an undisclosed number of email accounts belonging to 25 organizations, including U.S. government agencies, over t

article thumbnail

Florida Hospital Says Data Theft Attack Affects 1.2 Million

Data Breach Today

Tampa General Hospital Says Incident Involved Thwarted Ransomware Encryption Attempt A Florida hospital is notifying 1.2 million patients that their information was stolen by hackers in a cybersecurity incident that spanned for nearly three weeks in May as attackers tried to encrypt the entity's systems with ransomware. The hospital repelled the attack but couldn't stop the breach.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Business Email Compromise Now Has a $50 Billion Price Tag

KnowBe4

The latest data from the FBI’s Internet Crime Complaint Center (IC3) ups the estimate for the cost of losses and exposure through business email compromise (BEC) attacks from 2013 through 2023.

96
article thumbnail

Adobe warns customers of a critical ColdFusion RCE exploited in attacks

Security Affairs

Adobe is warning customers of a critical ColdFusion pre-authentication RCE bug, tracked as CVE-2023-29300, which is actively exploited. Adobe warns customers of a critical ColdFusion pre-authentication remote code execution vulnerability, tracked as CVE-2023-29300 (CVSS score 9.8), that is actively exploited in attacks in the wild. “Adobe is aware that CVE-2023-29300 has been exploited in the wild in very limited attacks targeting Adobe ColdFusion,” reads a statement sent by the comp

article thumbnail

NYPD Body Cam Data Shows the Scale of Violence Against Protesters

WIRED Threat Level

A landmark $13 million settlement with the City of New York is the latest in a string of legal wins for protesters who were helped by a video-analysis tool that smashes the “bad apple” myth.

article thumbnail

Security Alert: Exploit Chain Actively Hits ColdFusion

Data Breach Today

Attackers Drop Web Shell; Flaw Is Not Fixed, But Latest Patch Offers Protection Warning: Hackers are actively exploiting a flaw in Adobe's ColdFusion rapid web application development platform to execute malicious code. While Adobe attempted to patch the flaw, researchers say attackers appear to have found a way to bypass it by chaining together multiple flaws.

Security 246
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Norwegian DPA Adopts Measures Regarding Meta’s Behavioral Advertising Activities

Hunton Privacy

On July 14, 2023, the Norwegian Data Protection Authority (“DPA”) ordered Meta Platforms Ireland Limited and Facebook Norway AS (jointly, “Meta”) to temporarily cease the processing of personal data of data subjects in Norway for the purpose of targeting ads on the basis of “observed behavior,” when relying on either the contractual necessity legal basis (Article 6(1)b)) or the legitimate interests legal basis (Article 6(1)(f)) of the GDPR.

GDPR 95
article thumbnail

FIN8 Group spotted delivering the BlackCat Ransomware

Security Affairs

The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group FIN8 (aka Syssphinx) was spotted using a revamped version of a backdoor tracked as Sardonic to deliver the BlackCat ransomware (aka Noberus ransomware). Sardonic is a sophisticated backdoor that supports a wide range of features that was designed to evade detection.

article thumbnail

E-commerce and EDI: What’s the difference?

OpenText Information Management

There are lots of different terms used to describe B2B process automation. These terms can be confusing, partly because they are so inter-related. This article will go into detail on these terms to dispel some of the confusion and explain common terms used within B2B process automation, including the differences between Ecommerce and EDI. First, … The post E-commerce and EDI: What’s the difference?

B2B 95