Mon.Jan 15, 2024

article thumbnail

Exclusive: Cloud Vendor Returns Stolen Hospital Data

Data Breach Today

Alliance Had Sued LockBit Gang to Force Cloud Firm to Release Affected Patient Data A cloud services firm has turned over to a New York hospital alliance the patient data stolen in a ransomware attack by LockBit. The hospital group had filed a lawsuit against LockBit as a legal maneuver to force the storage firm to return data the cybercriminals had stashed on the vendor's servers.

Cloud 315
article thumbnail

Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack

Security Affairs

Researchers from Bishop Fox found over 178,000 SonicWall next-generation firewalls (NGFW) publicly exploitable. SonicWall next-generation firewall (NGFW) series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities, tracked as CVE-2022-22274 and CVE-2023-0656 , that could potentially lead to remote code execution. Despite a proof-of-concept exploit for the flaw CVE-2023-0656 was publicly released, the vendor is not aware of attack in the wild exploiting the vulner

IT 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Spot Critical Security Flaw in Bosch Thermostats

Data Breach Today

Bitdefender Finds Vulnerability in Popular IoT Device Thermostats sold across the globe by German multinational engineering company Bosch contained a flaw allowing hackers to cut power to the heating system and override the firmware, warn researchers from cybersecurity firm Bitdefender. Bosch pushed an over-the-air update in October.

IoT 310
article thumbnail

Experts warn of a vulnerability affecting Bosch BCC100 Thermostat

Security Affairs

Researchers warn of high-severity vulnerability affecting Bosch BCC100 thermostats. Researchers from Bitdefender discovered a high-severity vulnerability affecting Bosch BCC100 thermostats. The researchers discovered a vulnerability, tracked as CVE-2023-49722 (CVSS score: 8.3), that can be exploited by an attacker on the same network to replace the device firmware with a rogue version.

IoT 112
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Busted: Cryptojacking; UndeadApes NFT Rug Pull Suspects

Data Breach Today

Ukraine Nabs Suspected Cryptojacker; US Air Force Cyber Analyst Accused of Rug Pull Cryptocurrency schemes continue to generate alleged returns for criminals, as two separate cases highlight. One centers on a Ukrainian accused of earning $2 million via cryptojacking, while another involves a U.S. Air Force cyber analyst charged with perpetrating an UndeadApes NFT rug pull.

294
294

More Trending

article thumbnail

Mississippi Health System Ransomware Attack Affects 253,000

Data Breach Today

Report to State Regulators Indicates Big Jump in Number of Patients Affected A Mississippi health system is notifying nearly 253,000 individuals that their data was potentially compromised in a "malicious and sophisticated ransomware" attack last August that also took IT systems offline. The cybercriminal gang Rhysida had claimed responsibility for the assault.

article thumbnail

Attackers target Apache Hadoop and Flink to deliver cryptominers

Security Affairs

Researchers devised a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners. Cybersecurity researchers from cyber security firm Aqua have uncovered a new attack targeting Apache Hadoop and Flink applications. The attacks exploit misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency cryptocurrency miners.

Big data 106
article thumbnail

DOD Unveils First-Ever National Defense Industrial Strategy

Data Breach Today

Pentagon Warns Failure to Modernize Defense Industrial Base Will Hinder US Globally The Department of Defense released a 60-page strategy that aims to modernize the defense industrial ecosystem and focuses on four long-term strategic priorities: improving supply chain resilience, enhancing workforce readiness, streamlining acquisitions and refining economic deterrence measures.

287
287
article thumbnail

Phemedrone info stealer campaign exploits Windows smartScreen bypass

Security Affairs

Threat actors exploit a recent Windows SmartScreen bypass flaw CVE-2023-36025 to deliver the Phemedrone info stealer. Trend Micro researchers uncovered a malware campaign exploiting the vulnerability CVE-2023-36025 (CVSS score 8.8) to deploy a previously unknown strain of the malware dubbed Phemedrone Stealer. The vulnerability was addressed by Microsoft with the release of Patch Tuesday security updates for November 2023.

Archiving 106
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Generative AI Concerns Grow in Record Election Year

Data Breach Today

Davos Forum Highlights Worries About AI-Enabled Misinformation Artificial intelligence-enabled voter misinformation campaigns and voter database hacking are some of the largest threats to election security in a year when more than half of the world's populace will take to the ballot box in elections ranging from free to flawed.

article thumbnail

Analysis of Phishing Emails Shows High Likelihood They Were Written By AI

KnowBe4

It’s no longer theoretical; phishing attacks and email scams are leveraging AI-generated content based on testing with anti-AI content solutions.

Phishing 113
article thumbnail

Voice Cloning with Very Short Samples

Schneier on Security

New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds. Research paper.

Paper 106
article thumbnail

Women CyberSecurity Society Targeted by Smishing Campaign

KnowBe4

The Canada-based Women CyberSecurity Society (WCS2) has warned that its leadership, members, and volunteers are being targeted by an SMS phishing (smishing) campaign, IT World Canada reports.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Weekly Update 382

Troy Hunt

Geez it's nice to be back in Oslo! This city has such a special place in my heart for so many reasons, not least of which by virtue of being Charlotte's home town we have so many friends and family here. Add in NDC Security this week with so many more mutual connections, beautiful snowy weather, snowboarding, sledging and even curling, it's just an awesome time.

Access 77
article thumbnail

Three-Quarters of Organizations Have Experienced Phishing Attack in the Last 12 Months

KnowBe4

Regardless of whether your environment remains on-premise, resides in the cloud, or is a hybrid configuration, new data makes it clear that your biggest risk is phishing attacks.

article thumbnail

Unlocking value: Top digital transformation trends

IBM Big Data Hub

While digital transformation has been a trend for some years, emerging technologies have made this movement even more important. Companies are rethinking their business models to become more digital and competitive. They face an ever-increasing cadre of startups and established organizations, all of whom are also trying to keep up to date on digital transformation trends to achieve a competitive edge.

article thumbnail

The Enduring Legacy of Martin Luther King Jr.: A Beacon of Hope and History

Hanzo Learning Center

As we observe Martin Luther King Jr. Day, it's more than a commemoration of a great leader; it's a vital reminder of our ongoing journey toward equality and justice. This reflection explores the importance of this holiday in the context of our collective history and the imperative of civil rights as a foundational element of society.

IT 62
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

How IBM process mining unleashed new efficiencies in BoB-Cardif Life

IBM Big Data Hub

Enterprises now recognize the importance of leveraging innovative technologies to drive digital transformation and achieve cost efficiency. However, a lack of precise top-level planning and a narrow focus on technology without integration with business needs led to significant investments with suboptimal results for many companies. The path of digital transformation is fraught with challenges.

Mining 76
article thumbnail

Jo Cornish to become Interim CEO of CILIP

CILIP

Jo Cornish to become Interim CEO of CILIP Jo Cornish will be stepping into the position of Interim CEO on 1st February 2024, and work with current CEO Nick Poole before he leaves at the end of March. The CILIP Board has requested Jo Cornish, Chief Development Officer at CILIP, to step in as interim Chief Executive, following CILIP's Chief Executive, Nick Poole's announcement that he will leave CILIP at at the end of March for a new role.

article thumbnail

5 key areas for governments to responsibly deploy generative AI

IBM Big Data Hub

In 2024, the ongoing process of digitalization further enhances the efficiency of government programs and the effectiveness of policies, as detailed in a previous white paper. Two critical elements driving this digital transformation are data and artificial intelligence (AI). AI plays a pivotal role in unlocking value from data and gaining deeper insights into the extensive information that governments collect to serve their citizens.

article thumbnail

CILIP welcomes new members to Board of Trustees

CILIP

CILIP welcomes new members to Board of Trustees Portraits from top left: Jonathan Waterfield, Cornelia Andersson, Corin Peacock, Surash Patel, Andrew Praeter, Kate Robinson Five new members will join the CILIP Board on 25 January 2024, with a new Chair and a presidential team reshuffle. Together they bring a unique and diverse skillset from libraries, finance, and brand management, that will help steer the direction of CILIP as we implement our We are CILIP strategy and action plan , during this

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SymphonyAI Teams Up With Microsoft to Bring AI-Powered Solutions to Retailers

Information Matters

New York – SymphonyAI, a leader in enterprise AI software, announced an expanded collaboration with Microsoft at the National Retail Federation’s annual conference. The partnership aims to provide retailers and Read more The post SymphonyAI Teams Up With Microsoft to Bring AI-Powered Solutions to Retailers appeared first on Information Matters - Where AI Meets Knowledge Management.

Retail 52
article thumbnail

Financial Supervision in a Digital World

Thales Cloud Protection & Licensing

Financial Supervision in a Digital World madhav Tue, 01/16/2024 - 05:44 If you’ve been working in the finance sector over the past few years, you will have noticed some big changes in the world of financial supervision. A new generation of Fintech players, as well as major regulatory changes regarding GDPR, KYC and AML have meant that Financial Supervision continues to evolve in our increasingly digitalised world.