Thu.Feb 29, 2024

article thumbnail

Stages of LockBit Grief: Anger, Denial, Faking Resurrection?

Data Breach Today

Is LockBit a Kremlin Sock Puppet? Is Moscow using the Russian-speaking LockBit ransomware group as a tool to disrupt critical infrastructure and democracy in the West? While no publicly available evidence reveals direct ties, what are the chances that the prolific, trash-talking group has escaped authorities' attention - or demands?

article thumbnail

How the “Frontier” Became the Slogan of Uncontrolled AI

Schneier on Security

Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration will drive the next era of growth, wealth, and human flourishing. It’s a scary metaphor. Throughout American history, the drive for expansion and the very concept of terrain up for grabs—land grabs, gold rushes, new frontiers—have provided a permission structure for imperialism and exploitation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: White House Calls for Memory-Safe Languages

Data Breach Today

Also: Malware Campaign Hits GitHub, Affects Over 100,000 Repos This week, the Biden administration urged software developers to adopt memory-safe programming languages and moved to restrict Chinese connected cars, a pharma giant was breached, researchers found malicious repos in GitHub, the Phobos RaaS group is targeting the U.S., and Zyxel patched devices.

130
130
article thumbnail

Renewable energy in action: Examples and use cases for fueling the future

IBM Big Data Hub

As more countries, companies and individuals seek energy sources beyond fossil fuels, interest in renewable energy continues to rise. In fact, world-wide capacity for energy from solar, wind and other renewable sources increased by 50% in 2023. More than 110 countries at the United Nations’ COP28 climate change conference agreed to triple that capacity by 2030, and global investment in clean energy transition hit a record high of USD 1.8 trillion in 2023.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cryptohack Roundup: FTX Updates

Data Breach Today

Also: Bitcoin Fog Case Testimony; Axie Infinity Co-Founder Hack This week, progress was made in the FTX case, a hacker testified in the Bitcoin Fog case, an Axie Infinity co-founder and a MicroStrategy account were hacked, the KyberSwap hacker moved funds, the EU has a new AMLA office, and Aleo was breached.

130
130

More Trending

article thumbnail

FBI Is Focused on Election Integrity, Misinformation Threats

Data Breach Today

Agent Robert K. Tripp on FBI's Approach to Deepfakes, Nation-State Election Threats The U.S. presidential election is still eight months away, but the FBI is already seeing its share of cyberattacks, nation-state threats and AI-generated deepfakes. According to FBI Agent Robert K. Tripp, "We're no longer considering threats as a what-if situation; it's happening now.

IT 130
article thumbnail

Is the LockBit gang resuming its operation?

Security Affairs

Experts warn that the LockBit ransomware group has started using updated encryptors in new attacks, after the recent law enforcement operation. The LockBit ransomware group appears to have fully recovered its operations following the recent law enforcement initiative, code-named Operation Cronos , which aimed to disrupt its activities. Researchers from Zscaler first observed the ransomware group using new ransom notes referencing the new Tor infrastructure.

IT 67
article thumbnail

The White House Warns Cars Made in China Could Unleash Chaos on US Highways

WIRED Threat Level

As Chinese automakers prepare to launch in the US, the White House is investigating whether cars made in China could pose a national security threat.

article thumbnail

New SPIKEDWINE APT group is targeting officials in Europe

Security Affairs

A new threat actor, tracked as dubbed SPIKEDWINE, has been observed targeting officials in Europe with a previously undetected backdoor WINELOADER. Zscaler researchers warn that a previously unknown threat actor dubbed SPIKEDWINE has been observed targeting European officials. The cyberspies used a bait PDF document masqueraded as an invitation letter from the Ambassador of India, inviting diplomats to a wine-tasting event in February 2024.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FTC Announces $16.5 Million Settlement Against UK Service Provider and Ban from Selling Browsing Data for Advertising Purposes

Hunton Privacy

On February 22, 2024, the Federal Trade Commission announced a settlement order against Avast Limited (“Avast”) requiring Avast to pay $16.5 million and prohibiting Avast from selling or licensing any web browsing data for advertising purposes. This ban is to settle charges that the company and its subsidiaries sold such information to third parties after promising that its products would protect consumers from online tracking.

Privacy 61
article thumbnail

3 tips for success in Application Delivery Management

OpenText Information Management

Success in Application Delivery Management (ADM) hinges on the ability to adapt to evolving technologies and methodologies. As we get into the swing of things in 2024, three key strategies emerge as essential for thriving in this area: embracing automation, prioritizing performance monitoring, and cultivating a culture of collaboration. Let’s dive into each of these … The post 3 tips for success in Application Delivery Management appeared first on OpenText Blogs.

57
article thumbnail

A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

WIRED Threat Level

Every time someone in the UK searched for child abuse material on Pornhub, a chatbot appeared and told them how to get help.

article thumbnail

HHS Targets Small Behavioral Health Clinic for HIPAA Violations Following Ransomware Investigation

Hunton Privacy

On February 21, 2024, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement and corrective action plan with Green Ridge Behavioral Health LLC (“GRBH”) stemming from the organization’s failure to comply with the Privacy and Security Rules of the Health Insurance Portability and Accountability Act (“HIPAA”) and subsequent failure to protect against a 2019 ransomware attack that impacted the personal health information (“PHI”) of more

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Businesses Cautiously Embrace Generative AI Amid Concerns Over Ethics, Jobs

Information Matters

A new study by EY reveals growing corporate investment in generative AI (GenAI) technology, though concerns persist around ethics and potential job losses. The survey of 1,405 companies found 43% Read more The post Businesses Cautiously Embrace Generative AI Amid Concerns Over Ethics, Jobs appeared first on Information Matters - Where AI Meets Knowledge Management.

52
article thumbnail

Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’

WIRED Threat Level

Several of the strikes occurred far from the front lines of the conflict, indicating possible war crimes. Researchers say the attacks likely had devastating impacts on civilians.

IT 53
article thumbnail

HID Connects Podcast Season 2 Episode 2: What's Workplace Experience Got to Do With It?

HID Global

In this podcast episode, we delve into the most recent trends and advancements in security systems tailored for commercial real estate.

IT 52
article thumbnail

Here Are the Google and Microsoft Security Updates You Need Right Now

WIRED Threat Level

Plus: Mozilla patches 12 flaws in Firefox, Zoom fixes seven vulnerabilities, and more critical updates from February.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

This DVD-sized disk can store a massive 125,000 gigabytes of data via Popular Science

IG Guru

Check out the article here. It can hold the same amount of information as 10,000 Blu-rays. The post This DVD-sized disk can store a massive 125,000 gigabytes of data via Popular Science first appeared on IG GURU.

IT 56
article thumbnail

Empowering the digital-first business professional in the foundation model era 

IBM Big Data Hub

In the fast-paced digital age, business professionals constantly seek innovative ways to streamline processes, enhance productivity and drive growth. Today’s professionals, regardless of their fields, must fluently use advanced artificial intelligence (AI) tools. This is especially important given the application of foundation models and large language models (LLMs) in Open AI’s ChatGPT and IBM’s advances with IBM watsonx ™ Professionals must keep up with rapid technologi

article thumbnail

Modern Device Management: the future of MDM

Jamf

Modern Device Management is the method of managing any Apple devices, OSs and apps in a unified, secure way natively from the cloud. Learn more.

MDM 40
article thumbnail

GRC Market Leader Gimmal Launches Comprehensive Legal Hold Solution with Microsoft 365 Integration for Content Preservation

Gimmal

HOUSTON, TX — February, 29, 2024 — Gimmal, the market’s only end-to-end information governance platform, announced the launch of its Legal Hold solution , a comprehensive and centralized Software-as-a-Service (SaaS) platform for streamlining complex legal hold workflows and custodian notifications. When it comes to legal holds, organizations have long struggled to control the compounding costs of complex litigation, as well as minimizing their data storage footprint and expenses asso

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Think inside the box: Container use cases, examples and applications

IBM Big Data Hub

Container management has come a long way. For decades, managing containerized environments was a relatively simple affair. The modern idea of a computer container originally appeared back in the 1970s, with the concept first being used to help define application code on Unix systems. Modern containerization technology has moved on steadily from those early beginnings, and when companies run containers now, they’re getting a lot more utility for their investment.

Cloud 52
article thumbnail

The Mysterious Case of the Missing Trump Trial Ransomware Leak

WIRED Threat Level

The notorious LockBit gang promised a Georgia court leak "that could affect the upcoming US election.” It didn't materialize—but the story may not be over yet.