Tue.Feb 13, 2024

article thumbnail

Hack at Software Services Firm Affects 57,000 BoA Customers

Data Breach Today

InfoSys McCamish Says Incident Involved BoA's Deferred Compensation Plan Customers Bank of America is notifying more than 57,000 customers that their information, including Social Security numbers, was potentially compromised in a hacking incident last November at Atlanta, Georgia-based insurance software firm InfoSys McCamish. BoA says none of its systems were affected.

Insurance 310
article thumbnail

Fat Patch Tuesday, February 2024 Edition

Krebs on Security

Microsoft Corp. today pushed software updates to plug more than 70 security holes in its Windows operating systems and related products, including two zero-day vulnerabilities that are already being exploited in active attacks. Top of the heap on this Fat Patch Tuesday is CVE-2024-21412 , a “security feature bypass” in the way Windows handles Internet Shortcut Files that Microsoft says is being targeted in active exploits.

Phishing 224
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative AI and the Brave New World of Work

Data Breach Today

CyberEd.io's Steve King on How Gen AI Will Disrupt and Transform Careers Generative AI is both the villain in the tale of job displacement and the hero ushering in a new era of enhanced job roles and opportunities. Steve King of CyberEd.io discusses how gen AI will make your career an uncertain journey that demands lifelong learning, skepticism, humor and adaptability.

301
301
article thumbnail

Workshops Work at the AIIM Conference 2024

AIIM

Why do workshops work so well in adult learning? Read on to see how we are incorporating workshops at AIIM24 and how you can use workshops as a powerful tool for adult learning.

175
175
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Europe's AI Act Poised To Become Law After Committees Vote

Data Breach Today

ACt Will Require Developers to Allows A Copyright Holder Opt Out Two key European Parliament committees accepted a political compromise set to govern how trading bloc countries develop and deploy artificial intelligence. The regulation is set to become the globe's first comprehensive AI regulation.

More Trending

article thumbnail

Responsible Use of Artificial Intelligence

Data Breach Today

A Practical Guide for Cybersecurity Professionals Beyond the hype, AI is transforming cybersecurity by automating threat detection, streamlining incident response and predicting attacker behaviors. Organizations are increasingly deploying AI to protect their data, stay ahead of cybercriminals and build more resilient security systems.

article thumbnail

News alert: Kiteworks named as a founding member of NIST’s new AI safety consortium – ‘AISIC’

The Last Watchdog

San Mateo, Calif., Feb. 13, 2023 – The U.S. White House announced groundbreaking collaboration between OpenPolicy and leading innovation companies, including Kiteworks , which delivers data privacy and compliance for sensitive content communications through its Private Content Network. The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) Artificial Intelligence Safety Institute Consortium (AISIC) will act as a collaborative platform where both public sector and

article thumbnail

Apparent Pig-Butchering Crypto Scam Took Down a US Bank

Data Breach Today

Kansas Bank Forced to Close After CEO Allegedly Embezzled Nearly $50 Million A watchdog report reveals how Heartland Tri-State Bank CEO Shan Hanes allegedly defrauded a local church and investment club in Kansas out of $47.1 million through a "pig-butchering" cryptocurrency scam that ultimately caused the bank to fail in 2023.

267
267
article thumbnail

A ransomware attack took 100 Romanian hospitals down

Security Affairs

Authorities in Romania reported that at least 100 hospitals went offline after a ransomware attack hit the Hipocrate platform. Authorities in Romania confirmed that a ransomware attack that targeted the Hipocrate Information System (HIS) has disrupted operations for at least 100 hospitals. Hipocrate Information System (HIS) is a software suite designed to manage the medical and administrative activities of hospitals and other healthcare institutions.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

More Signs of a Qakbot Resurgence

Data Breach Today

Qakbot Wouldn't Be the First Trojan to Come Back After a Takedown Takedowns aren't always forever in cyberspace. Months after a U.S. law enforcement operation dismantled the notorious Qakbot botnet, security researchers said signs are pointing to a resurgence. Someone with access to the Qakbot - also known as Qbot - source code is experimenting with new builds.

Access 264
article thumbnail

Significant amendments to the Singapore Cyber Security Act set to have implications for the cybersecurity landscape

Data Protection Report

On 15 December 2023, the Cyber Security Agency of Singapore ( CSA ) released the draft Cybersecurity (Amendment) Bill ( Draft Bill ), which seeks to amend the Cyber Security Act 2018 ( CS Act ), for public consultation. The public consultation concluded on 15 January 2024. The consultation paper and the Draft Bill can be accessed here. The proposed changes are significant and will have implications for the cybersecurity landscape in Singapore which we consider below.

article thumbnail

Canadian Flipper Zero Planned Crackdown Provokes Backlash

Data Breach Today

A Rash of Canadian Car Thefts Won't Be Solved by Banning Pen-Testing Tools A Canadian effort amid a surge of car thefts to ban pen-testing devices such as the Flipper Zero that grab wireless signals has provoked backlash among security researchers and advocates, who accused Ottawa of finding a scapegoat for bad auto industry security practices.

Security 253
article thumbnail

Bank of America customer data compromised after a third-party services provider data breach

Security Affairs

Bank of America revealed that the personal information of some customers was stolen in a data breach affecting a third-party services provider. Bank of America began notifying some customers following a data breach at the third-party services provider Infosys McCamish System (IMS). The bank has sent notification letters to 57,000 customers, informing them that their personal information has been compromised Infosys disclosed the security breach on November 3, 2023, in a filing with SEC the compa

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

They're Back? HHS OCR Is Eyeing the Return of HIPAA Audits

Data Breach Today

The Agency Is Surveying Previous Auditees to Reassess the Dormant Program As U.S. federal regulators fine-tune a strategy to push the healthcare sector into a stronger cybersecurity posture, they appear to be dusting off a HIPAA compliance audit program that's been dormant for the last seven years. Is a new round of HIPAA audits for regulated entities on the horizon?

article thumbnail

Ransomfeed – Third Quarter Report 2023 is out!

Security Affairs

Maintainers behind the Ransomfeed platform have released Q3 Report 2023 including activities of 185 criminal groups operating worldwide. A comprehensive report delving into the intricate landscape of ransomware threats during the last four months of 2023 is out, with a meticulous focus on the monitoring activities conducted by the OSINT Ransomfeed platform ( www.ransomfeed.it ).

article thumbnail

What Is Packet Filtering? Definition, Advantages & How It Works

eSecurity Planet

Packet filtering is a firewall feature that allows or drops data packets based on simple, pre-defined rules regarding IP addresses, ports, or protocols. Once a type of firewall, packet filtering now provides a fundamental feature of nearly all firewalls and some network equipment (routers, smart switches, etc.). The feature involves key principles, as well as pros and cons, and there are four packet filtering types to be aware of, which determine its best use cases.

IT 103
article thumbnail

4 strategic sourcing use cases to strengthen your supply chain

IBM Big Data Hub

In this age of supply chain disruptions that hold the power to upend entire industries, strength and resilience across the entire value chain is no longer a nice-to-have—it’s a survival tactic. For sourcing teams, that means pivoting their mindset around selecting suppliers from a tactical, lowest-cost-above-all approach to a strategic one.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

The European Commission Draft GDPR Procedural Regulation and European Parliament Draft LIBE Report: On the Road to Harmony?

Hunton Privacy

On February 9, 2024, Hunton Andrews Kurth attorneys, David Dumont and Laura Léonard, and Centre for Information Policy Leadership Director of Privacy and Data Policy, Natascha Gerlach, published an op-ed discussing the implications of the European Commission’s proposal for a Regulation laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679 (the “Draft GDPR Procedural Regulation”) and the draft report on the Draft GDPR Procedural Regulation by the European

GDPR 85
article thumbnail

A Hacker’s Mind is Out in Paperback

Schneier on Security

The paperback version of A Hacker’s Mind has just been published. It’s the same book, only a cheaper format. But—and this is the real reason I am posting this—Amazon has significantly discounted the hardcover to $15 to get rid of its stock. This is much cheaper than I am selling it for, and cheaper even than the paperback. So if you’ve been waiting for a price drop, this is your chance.

IT 76
article thumbnail

Application performance optimization: Elevate performance and reduce costs

IBM Big Data Hub

Application performance is not just a simple concern for most organizations; it’s a critical factor in their business’s success. Driving optimal application performance while minimizing costs has become paramount as organizations strive for positive user experiences. These experiences can make or break a business, that’s why prioritizing high performance among applications is non-negotiable.

Cloud 73
article thumbnail

Collaboration tools are critical for digital workplace success

OpenText Information Management

The adage ‘two heads are better than one’ is just about always true. Enabling people to work well together is just smart business. Companies continue to put more productivity applications and collaboration tools at employees’ fingertips and to embrace flexible, modern work environments to support better ways of working. IDC’s 2023 State of Content Services … The post Collaboration tools are critical for digital workplace success appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CyberheistNews Vol 14 #07 Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

KnowBe4

Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

86
article thumbnail

An in-depth review of the Kandji platform from Rocketman Tech

Jamf

Rocketman Tech helps organizations succeed with Jamf, offering consulting and tools to simplify the management process. In this blog, Chris Schasse, — Founder, Owner and Lead Engineer at Rocketman Tech — recaps his in-depth comparison of Kandji and Jamf Pro.

52
article thumbnail

What Is PIAM? Part 3: How PIAM Is Revolutionizing Compliance

HID Global

In part 3 of our physical identity access management (PIAM) series, discover how compliance plays a critical role in a modern PIAM solution.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

On January 18, 2024, the U.S. Federal Trade Commission announced a complaint and proposed consent order with InMarket Media, LLC, a digital marketing platform and data aggregator. Less than two weeks later, on February 1, the FTC announced a complaint and proposed consent order with software licensor and data provider Blackbaud, Inc. In both cases, the FTC’s complaint alleged that the companies retained personal data for longer than was necessary, and that conduct violated Section 5 of the Fed

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

ARMA Mile High Chapter – Denver Spring Seminar on April 16, 2024

IG Guru

Check out the post on LinkedIn here. The post ARMA Mile High Chapter – Denver Spring Seminar on April 16, 2024 first appeared on IG GURU.

article thumbnail

Jamf Safe Internet Adds Custom DNS Support

Jamf

Dive into the Jamf Safe Internet's latest features and workflows. Discover Custom DNS and Internal Services support.

52
article thumbnail

Spotlight: Valentine’s Day Greetings and Dances

Unwritten Record

Happy Valentine’s Day from the National Archives Special Media Division! Did you know that the oldest known printed Valentine’s Day card was published in January 1797? The verse printed on the card reads: “Since on this ever Happy day, All Nature’s full of Love and Play Yet harmless still if my design, ‘Tis but to be your Valentine.” The 1797 card , in addition to over six hundred other Valentine’s cards , are held by the York Museums Trust.