Thu.Nov 30, 2023

article thumbnail

Breach Roundup: Ukraine Hacks Russian Aviation Agency

Data Breach Today

Also, Cyberattack Targets Japan's Space Agency JAXA This week, Ukraine's intelligence service hacked Russian aviation agency, a cyberattack targeted Japan's space agency, Google addressed another zero-day, a French-led operation dismantled a Ukrainian ransomware group, and spyware targeted Serbian civil society.

article thumbnail

Critical Zoom Room bug allowed to gain access to Zoom Tenants

Security Affairs

A critical vulnerability in Zoom Room allowed threat actors to take over meetings and steal sensitive data. Researchers at AppOms discovered a vulnerability in Zoom Room as part of the HackerOne live hacking event H1-4420. Zoom Rooms is a feature of the Zoom video conferencing platform designed to enhance collaboration in physical meeting spaces, such as conference rooms or huddle rooms.

Access 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Okta Delays New Products, Projects 90 Days to Boost Security

Data Breach Today

Push Comes After Okta Said Hacker Had Stolen Every Customer Support User's Details Okta has paused product development and internal projects for 90 days to beef up its security architecture and operations for applications, hardware and third-party vendors. Okta will move to strengthen its cyber posture, including a security action plan and engaging with third-party cyber firms.

Security 297
article thumbnail

Apple addressed 2 new iOS zero-day vulnerabilities

Security Affairs

Apple released emergency security updates to fix two actively exploited zero-day flaws impacting iPhone, iPad, and Mac devices. Apple released emergency security updates to address two zero-day vulnerabilities impacting iPhone, iPad, and Mac devices. The flaws are actively exploited in attacks in the wild, both issues reside in the WebKit browser engine.

Security 126
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Capital Health in NJ Is Responding to a Cyberattack

Data Breach Today

2 Hospitals, Medical Groups Still Caring for Patients But Some Services Unavailable New Jersey-based hospital group Capital Health is dealing with a network outage, caused by a cyberattack earlier this week, which is affecting some patient services. Capital Health is at least the second healthcare provider in the Garden State responding to a cyberattack this week.

290
290

More Trending

article thumbnail

Good Governance: 'It's All Hygiene'

Data Breach Today

In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security.

article thumbnail

Extracting GPT’s Training Data

Schneier on Security

This is clever : The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the model responds ( complete transcript here ). In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. This happens rather often when running our attack.

Paper 120
article thumbnail

NY AG Warns of ID Theft Risk in Medical Transcription Hack

Data Breach Today

Crouse Health Reveals It's Among PJ&A Clients Hit by Incident Affecting Millions New York regulators are warning millions of individuals of identity theft risks involving a data theft at a medical transcriber that has now affected patients of at least two major healthcare groups, including Crouse Health and Northwell Health in the state. Lawsuits in the case are also piling up.

Risk 281
article thumbnail

How to build a successful employee experience strategy

IBM Big Data Hub

Ever since the pandemic changed the corporate world, organizations have rededicated themselves to excelling at employee experience strategy. A successful employee experience strategy (EX strategy) is the best way to recruit and retain top talent , as employees increasingly make decisions on where to work based on how they respond to employee needs. Organizations can prioritize overall employee experience by being thoughtful about how to serve their workers during all stages of the employee journ

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

US Sanctions North Korean Cyber Unit After Satellite Launch

Data Breach Today

Kimsuky Cyberespionage Unit Hit With Sanctions From US and Foreign Partners The United States on Thursday sanctioned North Korean cyberespionage threat actor Kimsuky, known for its social engineering campaigns against targets it suspects of holding intelligence on geopolitical events and negotiations affecting the Hermit Kingdom.

IT 274
article thumbnail

6 climate change adaptation strategies every organization needs today

IBM Big Data Hub

There’s a lot of talk about how organizations can and should reduce their negative impact on the environment. While staying focused on mitigating our current and future contributions to climate change is crucial, we cannot ignore the dire impacts of existing climate hazards. Risks from wildfires, floods, heat, drought and wind have always been a concern, but climate change has intensified these risks, making them more frequent and unpredictable for organizations.

article thumbnail

NIST Says Federal Agencies Struggling to Achieve Zero Trust

Data Breach Today

Agencies Face Array of Implementation Challenges While Racing Toward 2024 Deadline A National Institute of Standards and Technology official said agencies are facing a variety of challenges in implementing enterprisewide zero trust architectures, from a lack of insight into their network components to difficult decisions around legacy systems and costly procurement initiatives.

271
271
article thumbnail

Your KnowBe4 Fresh Content Updates from November 2023

KnowBe4

Check out the 49 new pieces of training content added in November, alongside the always fresh content update highlights, events and new features.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptohack Roundup: KyberSwap Hacker Demands Control

Data Breach Today

Also: Treasury Calls for Stronger Sanctions Powers; Aerodrome, Velodrome Hacks This week, a KyberSwap hacker demanded total control, the U.S. Treasury called for additional tools to sanction crypto baddies, the Aerodrome and Velodrome DeFi platforms' front ends were hacked, a scam-as-a-service wallet drainer shut down, Indexed Finance thwarted hijacking attempts, and more.

269
269
article thumbnail

Criminals Are Cautious About Adopting Malicious Generative AI Tools

KnowBe4

Researchers at Sophos have found that the criminal market for malicious generative AI tools is still disorganized and contentious.

Marketing 106
article thumbnail

Revolutionizing database performance monitoring with DBmarlin and IBM Instana 

IBM Big Data Hub

Monitoring database performance can be a daunting task, especially in complex environments with a combination of both self-hosted and cloud-based databases. Thanks to the innovative partnership between DBmarlin and IBM® Instana™, businesses can now achieve granular insights into database performance like never before. The business challenge Businesses face several challenges when it comes to database performance monitoring: Understanding and optimizing database performance to ensure t

Cloud 83
article thumbnail

Anduril’s New Drone Killer Is Locked on to AI-Powered Warfare

WIRED Threat Level

Autonomous drones are rapidly changing combat. Anduril’s new one aims to gain an edge with jet power and AI.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Insights from the IAPP Europe Data Protection Congress: Regulatory Convergence on AI and Sidley’s Women in Privacy Networking Lunch

Data Matters

The International Association of Privacy Professionals ( IAPP ) held its annual Europe Data Protection Congress in Brussels on November 15 & 16, 2023. Whilst the Congress covered a wide range of topics related to privacy, cybersecurity and the regulation of data more broadly, unsurprisingly a recurring theme throughout was the responsible development, commercialization and use of AI.

Privacy 88
article thumbnail

Rallying troops against cybercrime with QRadar SIEM

IBM Big Data Hub

Cybersecurity is everyone’s business—as it should be, given the staggering surge in cyberattacks. Today, these attacks exhibit an unprecedented level of frequency, ingenuity and speed. The cyberthreat landscape is evolving and countries such as India are facing an alarming rate of increase in cyberattacks ( Q2 of 2023 saw a 90% increase ).

article thumbnail

Top information management trends for life sciences in 2024

OpenText Information Management

The life sciences industry has seen monumental change over the past few years. From the Covid-19 pandemic to a spike in investment, coupled with rising inflation and economic instability, the industry has been drenched in uncertainty and unpredictability. However, life sciences leaders remain optimistic about the year ahead. Here are four trends that will continue … The post Top information management trends for life sciences in 2024 appeared first on OpenText Blogs.

article thumbnail

Innovation and authentic demand

IBM Big Data Hub

Arvind Krishna recently spoke with former IBMer and author Danny Sabbah about a new book he co-authored, The Heart of Innovation: A Field Guide for Navigating to Authentic Demand. In their conversation, Arvind and Danny discussed the secret to determining authentic demand and building innovative products that achieve runaway success. Here are five facts about innovation, taken from the book and their conversation, that may surprise you: While major technology breakthroughs dominate our perceptio

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Rev up for Season 10 of the ABB FIA Formula E World Championship

OpenText Information Management

Put on your party shoes, Formula E fans. Season 10 of the ABB FIA Formula E World Championship is right around the corner, and OpenText is proud to be the Official Technical and Analytics Partner of the Jaguar TCS Racing team. It’s a new season, with new racetracks to conquer and new drivers behind the … The post Rev up for Season 10 of the ABB FIA Formula E World Championship appeared first on OpenText Blogs.

article thumbnail

Cyber Security: Insurance Prices Level After Two Years of Brutal Increases via ENR

IG Guru

Check out the article here. The post Cyber Security: Insurance Prices Level After Two Years of Brutal Increases via ENR first appeared on IG GURU.

article thumbnail

How to build a successful talent acquisition strategy

IBM Big Data Hub

The success of any organization relies on its ability to attract, retain and develop top talent. Talent acquisition refers to the ongoing strategy and process an organization and its HR department uses to source, attract, evaluate, hire and retain the highly-qualified new employees it needs to grow. A well-crafted talent acquisition strategy has become a critical component for organizations seeking to secure a competitive edge.

article thumbnail

Google Fixes a Seventh Zero-Day Flaw in Chrome—Update Now

WIRED Threat Level

Plus: Major security patches from Microsoft, Mozilla, Atlassian, Cisco, and more.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Streamline device redeployment workflows with Return to Service Command

Jamf

Redeploying devices or sanitizing shared ones in a secure, efficient manner while ensuring that devices are reenrolled with your MDM solution and are ready to use by new users has never been a simpler process. Learn more about how Apple’s Return to Service Command helps IT achieve this quickly and easily.

MDM 52
article thumbnail

Gilles d’Arpa joins Everteam as DO

Everteam

News Gilles d’Arpa joins Everteam as DO Anne-Claire Girard 30 November 2023 Everteam announces the arrival of Gilles d’Arpa to the Everteam Management Committee as Chief Operating Officer. In this position, effective November 2023, illes will lead all activities from business development to engineering, pre-sales, marketing, customer service (professional services), product management, product marketing and support.

Sales 52
article thumbnail

Microsoft + Jamf introduce new AI tool called Security Copilot

Jamf

Learn about what Microsoft Security Copilot is, what it can do and how Jamf is a launch partner with Microsoft for the shiny new tool. Also, what it means when tools and expertise are combined to make your devices much more secure.