Fri.May 12, 2023

article thumbnail

Toyota Exposed Auto Location of 2M Japanese Customers

Data Breach Today

Undetected Cloud Misconfiguration Exposed Vehicle Information for Over Ten Years Toyota on Friday disclosed that it exposed online for a decade car location data belonging to more than two million Japanese customers. The data by itself cannot be used to identify individual car owners, the carmaker said. Also exposed: video taken outside the vehicle with an onboard recorder.

Cloud 274
article thumbnail

New York Attorney General Proposes Crypto Regulation, Protection, Transparency, and Oversight (CRPTO) Act

Hunton Privacy

On May 5, 2023, New York Attorney General Letitia James released proposed legislation that seeks to regulate all facets of the cryptocurrency industry. Entitled the “Crypto Regulation, Protection, Transparency, and Oversight (CRPTO) Act,” if enacted the bill would substantially expand New York’s oversight of crypto enterprises conducting business in the Empire State, including as to matters involving privacy and cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Enigmatic Hacking Group Operating in Ukraine

Data Breach Today

Attackers Target both Ukraine and pro-Russian Actors A newly uncovered hacking group with a string of cyberespionage successes is targeting Ukrainian and pro-Russian targets alike. Malwarebytes in a Wednesday dubs the threat actor "Red Stinger," saying the group is the same as the "Bad Magic" threat actor revealed by Kaspersky in March.

180
180
article thumbnail

Biden-Harris Administration Announces New Actions to Promote Responsible Artificial Intelligence Innovation

Hunton Privacy

On May 4, 2023, the Biden-Harris Administration announced new actions to promote responsible American innovation in artificial intelligence (“AI”). The Administration also met with the CEOs of Alphabet, Anthropic, Microsoft and OpenAI as part of the Administration’s broader, ongoing effort to engage with advocates, companies, researchers, civil right organizations, not-for-profit organizations, communities, international partners, and others on critical AI issues.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Editors' Panel: How Feds Hacked Russia's 'Snake' Operation

Data Breach Today

Also: APAC Privacy Law Trends; Another Company Bans ChatGPT In the latest weekly update, ISMG editors discuss how the Feds have dismembered Russia's 'Snake' cyberespionage operation; the ongoing debate over privacy laws and regulations in the APAC region; and why more companies are banning the use of generative AI tool ChatGPT.

Privacy 154

More Trending

article thumbnail

Building True Cyber Resilience in 2023

Data Breach Today

CISO Amit Basu Shares Practical Steps to Test Cyber Resilience Cyber resilience is "even more critical in the post pandemic world," said Amit Basu, CISO of International Seaways. The NIST framework is a useful tool for developing, testing and maintaining cyber resilience, but too often security teams neglect the "detect" and "respond" functions, he added.

Security 143
article thumbnail

Vulnerability Management Policy: Steps, Benefits, and a Free Template

eSecurity Planet

A vulnerability management policy sets the ground rules for the process, minimum standards, and reporting requirements for vulnerability management. An effective vulnerability management policy can help with the cyclical process of discovering and managing vulnerabilities found within IT hardware, software, and systems. A documented policy enables IT teams to create a trackable and repeatable process that meets the expectations of executives and conforms to compliance requirements.

article thumbnail

Closing Privacy 'Loopholes' in Reproductive Healthcare Data

Data Breach Today

A recently proposed federal rule would prohibit healthcare organizations from disclosing to law enforcement patient information related to obtaining or providing an abortion. If enacted, it will address longstanding loopholes in healthcare privacy, said attorney Kathleen McGee.

Privacy 143
article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

eSecurity Planet may receive a commission from vendor links. Our recommendations are independent of any commissions, and we only recommend solutions we have personally used or researched and meet our standards for inclusion. How to use this template: Comments intended to guide understanding and use of this template will be enclosed in brackets “[…]” and the ‘company’ will be listed as [eSecurity Planet] throughout the document.

Risk 99
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Crosspoint Capital to Purchase Absolute Software for $657M

Data Breach Today

Crosspoint's $11.50-Per-Share Bid Comes 31 Months After Endpoint Vendor Went Public Crosspoint Capital Partners has joined Thoma Bravo and others in the take-private cybersecurity spree, agreeing to buy endpoint security vendor Absolute Software for $657 million. The deal will allow Absolute Software to expand from asset visibility and control to endpoint resilience and access.

article thumbnail

Leaked source code of Babuk ransomware used by 10 different ransomware families targeting VMware ESXi

Security Affairs

The leak of the source code of the Babuk ransomware allowed 9 ransomware gangs to create their own ransomware targeting VMware ESXi systems. SentinelLabs researchers have identified 10 ransomware families using VMware ESXi lockers based on the source code of the Babuk ransomware that was leaked in 2021. The experts pointed out that these ransomware families were detected through H2 2022 and H1 2023, a circumstance that suggests that an increasing number of threat actors is using the source code

article thumbnail

Safeguarding Cyberspace: Unleashing Mainframe's Fortified Digital Trust through Advanced Authentication

Data Breach Today

Broadcom's Mary Ann Furno on Authentication Changes, How Orgs Adapt to Challenges Network boundaries have dissipated while changes in regulation and customer approaches to trust now require more advanced authentication and the ability to treat each authentication in relation to its specific risk level. Broadcom's Mary Ann Furno discusses these issues.

article thumbnail

What the Email Security Landscape Looks Like in 2023

Security Affairs

Email-based threats have become increasingly sophisticated, how is changing the Email Security Landscape? For over a decade, email has been a common source of cybersecurity threats. During that time, email-based threats have become increasingly sophisticated. What started as notes from Nigerian princes that needed large sums of money to help them get home has evolved into bad actors that use refined social engineering tactics to convince the receiver to unknowingly share important information.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

IBM and Microsoft partnership accelerates sustainable cloud modernization

IBM Big Data Hub

A global fast-moving consumer goods (FMCG) enterprise needed to modernize its product portfolio, focusing on high-growth categories like pet care, coffee and consumer health. Its aggressive sustainability goals included achieving net zero emissions by 2050, making all packaging reusable or recyclable by 2025 and investing more than USD 3 billion globally over several years to drive momentum.

Cloud 83
article thumbnail

The Black Basta ransomware gang hit multinational company ABB

Security Affairs

Swiss electrification and automation technology giant ABB suffered a Black Basta ransomware attack that impacted its business operations. Swiss multinational company ABB, a leading electrification and automation technology provider, it the last victim of the notorious Black Basta ransomware group. The company has more than 105,000 employees and has $29.4 billion in revenue for 2022.

article thumbnail

Malicious Chatbots Target Casinos in Southeast Asia

Dark Reading

Dubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies.

108
108
article thumbnail

Bl00dy Ransomware Gang actively targets the education sector exploiting PaperCut RCE

Security Affairs

U.S. CISA and FBI warned of attacks conducted by the Bl00dy Ransomware Gang against the education sector in the country. The FBI and CISA issued a joint advisory warning that the Bl00dy Ransomware group is actively targeting the education sector by exploiting the PaperCut remote-code execution vulnerability CVE-2023-27350. The Bl00dy ransomware has been active since May 2022, it has been the first group that started using the leaked LockBit ransomware builder in attacks in the wild.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

WordPress Plugin Used in 1M+ Websites Patched to Close Critical Bug

Dark Reading

The privilege escalation flaw is one in thousands that researchers have disclosed in recent years.

110
110
article thumbnail

What does “Trusted Access for the physical workplace” mean?

Jamf

Jamf support for digital employee badges is now available via SwiftConnect, integrated with Jamf Trust, for iOS and coming soon for Android

Access 52
article thumbnail

How Cybercriminals Adapted to Microsoft Blocking Macros by Default

Dark Reading

One long-awaited security move caused a ripple effect in the cybercrime ecosystem.

Security 116
article thumbnail

The Value of Subcontracting with NAID AAA Certified Companies via i-SIGMA

IG Guru

Check out the article here.

67
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

AI Is About to Be Everywhere: Where Will Regulators Be?

Dark Reading

Regulators should apply a healthy skepticism to generative AI developments to guarantee a competitive marketplace.

99
article thumbnail

API-driven data quality: Supercharging modern data pipelines for scalability and efficiency

Collibra

After speaking with over 20 clients about data quality in modern data pipelines, I am eager to share my insights on the pros and cons of internal (in-memory) processing versus external (API-based) DQ engine integration. Organizations are increasingly adopting diverse technologies to maintain data quality, making it difficult to choose the most effective strategy.

article thumbnail

Making Sure Lost Data Stays Lost

Dark Reading

Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.

Cloud 86
article thumbnail

Managing AWS S3 pricing and costs with IBM Turbonomic

IBM Big Data Hub

Amazon Simple Storage Service (Amazon S3) is an object storage service that provides organizations with scalability, security, availability and performance while keeping their IT infrastructure management needs at bay. It was launched in 2006 as the first AWS service and manages data as objects instead of a file hierarchy or blocks within sectors and tracks.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

New Competition Focuses on Hardening Cryptosystems

Dark Reading

The Technology Innovation Institute’s year-long cryptographic challenge invites participants to assess concrete hardness of McEliece public-key encryption scheme.

article thumbnail

Friday Squid Blogging: Giant Squid Video

Schneier on Security

A video—authentic, not a deep fake—of a giant squid close to the surface. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

'Very Noisy:' For the Black Hat NOC, It's All Malicious Traffic All the Time

Dark Reading

Black Hat Asia's NOC team gives a look inside what's really happening on the cyber front during these events.

IT 82