Fri.Dec 15, 2023

article thumbnail

UK AI National Institute Urges 'Red Lines' For Generative AI

Data Breach Today

Alan Turing Institute Calls for 'Shift in Mindset' to Tackle National Security Risk The U.K. national institute for artificial intelligence urged the government to establish red lines against the use of generative AI in scenarios in which the technology could take an irreversible action without direct human oversight. The U.K. government has sought to cultivate responsible AI.

article thumbnail

Multiple flaws in pfSense firewall can lead to arbitrary code execution

Security Affairs

Security flaws in Netgate pfSense firewall solution can potentially lead to arbitrary code execution on vulnerable devices. pfSense is a popular open-source firewall solution maintained by Netgate, researchers discovered multiple security issues affecting it. Researchers from SonarCloud discovered several security issues, Cross-Site Scripting (XSS) vulnerabilities and a Command Injection vulnerability in pfSense CE ( CVE-2023-42325 , CVE-2023-42327 , CVE-2023-42326 ).

Phishing 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Decoding BlackCat Ransomware's Downtime Drama

Data Breach Today

Also: Fraud Trends; Cryptocurrency Regulatory Developments In the latest weekly update, editors at ISMG discuss whether police have seized ransomware group Alphv/BlackCat's data leak site, how fraudsters are adapting their tactics and techniques to exploit advancements in technology, and which cryptocurrency stories shaped the industry this year.

article thumbnail

Snatch ransomware gang claims the hack of the food giant Kraft Heinz

Security Affairs

The Snatch ransomware group announced it had hacked the food giant Kraft Heinz, the company is investigating the claims. Kraft Heinz is an American food company, it is one of the largest food and beverage manufacturers globally. Kraft Heinz produces a wide range of popular food products, including condiments, sauces, cheese, snacks, and ready-to-eat meals.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

CISA Urges Health Sector to Apply Critical Cyber Measures

Data Breach Today

Advice Is Based on Agency's 2-Week Security Assessment of a Large Entity The Cybersecurity and Infrastructure and Security Agency is urging health sector entities to take critical steps in fortifying their environments based on findings from a risk and vulnerability assessment performed by the federal agency on a healthcare industry organization earlier this year.

More Trending

article thumbnail

Cyberspace Solarium Commission Hails NDAA Cyber Provisions

Data Breach Today

Defense Bill Includes Many Critical Cybersecurity Components, CSC Says Co-chairs of the Cyberspace Solarium Commission praised the annual U.S. national defense bill for enacting recommendations from its 2020 report, saying the bill marks "meaningful" advancements for cybersecurity. With the bill, 58 out of the commission's 82 recommendations will have been enacted.

article thumbnail

New NKAbuse malware abuses NKN decentralized P2P network protocol

Security Affairs

Experts uncovered a new Go-based multi-platform malware, tracked as NKAbuse, which is the first malware abusing NKN technology. Researchers from Kaspersky’s Global Emergency Response Team ( GERT ) and GReAT uncovered a new multiplatform malware dubbed NKAbuse. The malicious code is written in Go language, it is the first malware that relies on the NKN technology for data exchange between peers.

article thumbnail

45,000 Affected by Breach at Idaho National Laboratory

Data Breach Today

Breach Exposed Names, Social Security Numbers and Salaries The Idaho National Laboratory said hackers stole personal data of more than 45,000 individuals connected with the facility following a self-proclaimed hacktivist group's claims of a breach. The data theft stems from a Nov. 20 incident affecting the organization's off-site Oracle HCM HR system.

article thumbnail

Idaho National Laboratory data breach impacted 45,047 individuals

Security Affairs

The Idaho National Laboratory (INL) announced that it has suffered a data breach impacting more than 45,000 individuals. In November, the hacktivist group SiegedSec claimed responsibility for the hack of The Idaho National Laboratory (INL) and leaked stolen human resources data. SiegedSec is a threat actor that last year carried out multiple attacks against U.S. organizations, especially U.S. municipalities.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Federal Agencies Failing to Meet Critical Cyber Deadlines

Data Breach Today

Agencies Lack Capabilities to Track, Investigate and Remediate Threats, Report Says The departments of Commerce, State and Justice are among the 20 agencies identified in a Government Accountability Office report as having failed to meet key cyberthreat incident response deadlines outlined in the 2021 cybersecurity executive order.

article thumbnail

BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign

Security Affairs

Resecurity has uncovered a meaningful link between three major ransomware groups, BianLian, White Rabbit, and Mario Ransomware. Based on a recent Digital Forensics & Incident Response (DFIR) engagement with a law enforcement agency (LEA) and one of the leading investment organizations in Singapore (and other victims), Resecurity (USA) has uncovered a meaningful link between three major ransomware groups.

article thumbnail

Legal Trends to Watch in 2024

Data Breach Today

CISO Liability, AI, Ransomware and Shadow IT Attorney Jonathan Armstrong examines four cybersecurity legal trends that will shape 2024: heightened personal liability for security leaders, the impact of ransomware, legal and ethical concerns about AI, and the influence of shadow IT, especially regarding messaging apps.

article thumbnail

IRS Warns of Expected Wave of Tax Scams

KnowBe4

Urging taxpayers and tax professionals to be vigilant, the Internal Revenue Service (IRS) provides some simple guidance on how to spot new scams aimed at being able to file fake tax returns.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Weekly Update 378

Troy Hunt

I'd say the balloon fetish segment was the highlight of this week's video. No, seriously, it's a moment of levity in an otherwise often serious industry. It's still a bunch of personal info exposed publicly and that suchs regardless of the nature of the site, but let's be honest, the subject matter did make for some humorous comments 🤣 References Sponsored by: Identity theft isn’t cheap.

IoT 94
article thumbnail

Data of over a million users of the crypto exchange GokuMarket exposed

Security Affairs

GokuMarket, a centralized crypto exchange owned by ByteX, left an open instance, revealing the details of virtually all of its users, the Cybernews research team has discovered. The leak comes after the team discovered an unprotected MongoDB instance, which stored information on GokuMarket crypto exchange users. Businesses employ MongoDB to organize and store large swaths of document-oriented information, and in GokuMarket’s case, the details of over a million customers and admin users.

article thumbnail

Customer service trends winning organizations need to follow

IBM Big Data Hub

Paying attention to the latest customer service trends ensures that an organization is prepared to meet changing customer expectations. Customer loyalty is waning, spurred on by the COVID-19 pandemic, social influences and the ease of switching brands. More than ever, organizations must stay on top of changes in the customer service experience to improve customer satisfaction and meet increased customer needs.

article thumbnail

Types of Records Management Systems

Record Nations

Business transactions create records that need to be stored securely and accessibly. Records include tax returns, employment forms, and financial documents that require a retention period of several years. Records management helps businesses maintain, use, store, and dispose of their records in compliance with retention laws while also supporting business processes.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Examples of sustainability in business

IBM Big Data Hub

Some of the first teachings about improving the planet seem simple: reduce, reuse, recycle. People have since made lifestyle choices and adjustments, such as biking to work and segregating garbage, to bring this rule to life and help save the environment. Now, climate change is affecting businesses as much as individuals. According to the United Nations Environment Programme (UNEP), both consumers and investors are being turned-off by companies that ignore their environmental impact.

article thumbnail

OpenText & Salesforce help save the holidays with AI!

OpenText Information Management

This holiday season Santa needs help checking his lists! Santa receives millions of wish list letters from children around the world, and he needs to know what toys to build. The Elves are overwhelmed reading all these letters manually and inputting the data into Salesforce. They are also making sure all these letters are safely … The post OpenText & Salesforce help save the holidays with AI!

Sales 67
article thumbnail

Five open-source AI tools to know

IBM Big Data Hub

Open-source artificial intelligence (AI) refers to AI technologies where the source code is freely available for anyone to use, modify and distribute. When AI algorithms, pre-trained models, and data sets are available for public use and experimentation, creative AI applications emerge as a community of volunteer enthusiasts builds upon existing work and accelerates the development of practical AI solutions.

article thumbnail

Reltio's 2023 journey in data management, AI, and digital transformation

Reltio

This year has been pivotal for Reltio and our customers and partners, who have navigated a landscape marked by macroeconomic challenges and an intensifying need to integrate new AI capabilities and realize the potential of digital transformation. Organizations face roadblocks from data fragmentation, quality, and integration. Persistent data management challenges hinder the advancement toward integrating AI solutions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

5 Supply chain predictions for 2024

OpenText Information Management

In the fast-moving landscape of global commerce, the supply chain remains at the heart as businesses strive for efficiency, resilience, and sustainability. As we approach 2024, several trends are set to reshape the supply chain industry, offering new opportunities and challenges. Here are five supply chain predictions that we believe will shape the narrative in … The post 5 Supply chain predictions for 2024 appeared first on OpenText Blogs.

57
article thumbnail

The risks of sideloaded apps

Jamf

Are sideloaded apps safe? Based on new EU legislation, Apple may start allowing for the sideloading of apps from third-party app stores. These apps can bring new risks to your organization's security posture. Read this blog to know what this can look like and how to mitigate the risks.

Risk 52
article thumbnail

ARMA’s Updated myLearning Platform is HERE!

IG Guru

Check out the announcement here. The post ARMA’s Updated myLearning Platform is HERE! first appeared on IG GURU.

82
article thumbnail

HHS 5-Year Health Data Strategy Prioritizes 'Responsible' AI

Data Breach Today

Biden Plan Aims to 'Harness' Data, AI to Better Patient Outcomes, Cut Cancer Deaths The Biden administration is heavily counting on "responsibly" leveraging AI as part of a five-year strategy that aims to harness data to enhance the health and wellness of Americans. That includes ambitions to drastically improve cancer care and reduce cancer deaths, among other top goals.

281
281
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

Schneier on Security

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Disinformation Rages in Russian Cyber Winter of Discontent

Data Breach Today

CISO Ian Thornton-Trump on Information Warfare, Disruptive Cyberattacks, Patching As Russia's all-out invasion of Ukraine continues, Moscow's strategy for targeting Ukrainian allies centers on "painting the picture of incompetent governments that can't protect from the Russian might" via misinformation and disinformation campaigns, said Ian Thornton-Trump, CISO of Cyjax.