Tue.Dec 12, 2023

article thumbnail

UK Downplays Ransomware Threat at Its Peril, Says Committee

Data Breach Today

Parliamentary Committee Says UK Must Be More Aggressive A U.K. parliamentary committee investigating ransomware threats recommended a more aggressive stance against threat actors and said the government should consider making incident reporting mandatory and provide government support for public sector victims "to the point of full recovery.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up , just as they have, year-to-year, for the past 20 years. Related: Adopting an assume-breach mindset With that in mind, Last Watchdog invited the cybersecurity experts we’ve worked with this past year for their perspectives on two questions that all company leaders should have top of mind: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Ukrainian Mobile Operator Kyivstar Hit by Cyberattack

Data Breach Today

Ukrainian President Volodymyr Zelenskyy Is in Washington Ukrainian telecom operator Kyivstar was the target of a cyberattack that knocked internet access and mobile communications offline on the same day Ukrainian President Volodymyr Zelenskyy is in Washington to boost the case for additional military aid.

Military 306
article thumbnail

Microsoft Patch Tuesday, December 2023 Edition

Krebs on Security

The final Patch Tuesday of 2023 is upon us, with Microsoft Corp. today releasing fixes for a relatively small number of security holes in its Windows operating systems and other software. Even more unusual, there are no known “zero-day” threats targeting any of the vulnerabilities in December’s patch batch. Still, four of the updates pushed out today address “critical” vulnerabilities that Microsoft says can be exploited by malware or malcontents to seize complete c

IT 238
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Lazarus Exploits Log4Shell to Deploy Telegram-Based Malware

Data Breach Today

North Korean Hackers Deploy Novel Malware Families North Korean hacking group Lazarus Group is exploiting Log4Shell to target manufacturing, agriculture and physical security sectors, resulting in the deployment of a tailored implant on compromised systems. The attack campaign targeted publicly accessible VMware Horizon servers.

More Trending

article thumbnail

Addressing Privacy and Data-Sharing Hurdles in Healthcare AI

Data Breach Today

Workarounds for Advancing AI in Administrative and Clinical Uses AI holds tremendous promise for both the administrative and clinical sides of healthcare, but obstacles still remain. One of the major hurdles is tied to patient privacy and the sharing of vast amounts of data needed to effectively tune AI models. What are some workarounds?

Privacy 257
article thumbnail

New Windows/Linux Firmware Attack

Schneier on Security

Interesting attack based on malicious pre-OS logo images : LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible for booting modern devices that run Windows or Linux… The vulnerabilities are the subject of a coordinated mass disclosure released Wednesday.

article thumbnail

Northern Ireland's Police Service to Revamp Cybersecurity

Data Breach Today

Independent Review Issues 37 Recommendations to Police Service of Northern Ireland Following an information security breach rated as the worst in U.K. policing history, which exposed all serving Northern Ireland police officers' personal details online, officials have promised to implement data protection and cybersecurity changes recommended by an independent review.

article thumbnail

News alert: Detectify’s EASM research reveals top overlooked vulnerabilities from 2023

The Last Watchdog

Stockhom, Sweden & Boston, Mass., Dec. 12, 2023 – Detectify , the External Attack Surface Management platform powered by elite ethical hackers, has today released its “ State of EASM 2023 ” report. The research incorporates insights from Detectify’s customer base and provides a snapshot of the threat landscape faced by core industries and regions that Detectify serves.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Apple released iOS 17.2 to address a dozen of security flaws

Security Affairs

Apple rolled out emergency security updates to backport patches for two actively exploited zero-day flaws to older devices. The company released iOS 17.2 and iPadOS 17.2 which address a dozen of security flaws. The most severe flaw is a memory corruption issue that resides in the ImageIO. Successful exploitation of the flaw may lead to arbitrary code execution.

Security 134
article thumbnail

Navigating the Future: ACEDS and Hanzo Illuminate Collaboration Data Challenges in the Legal Sector

Hanzo Learning Center

In the ever-evolving world of legal technology, the annual webinar co-hosted by the Association of Certified E-Discovery Specialists (ACEDS) and Hanzo has become a beacon of insight and guidance. This year, marking the fourth collaboration between ACEDS and Hanzo, the webinar brought together a panel of seasoned professionals, each offering a unique perspective on the challenges and future of legal industry collaboration data.

article thumbnail

Kyivstar, Ukraine’s largest mobile carrier brought down by a cyber attack

Security Affairs

Kyivstar, the largest Ukraine service provider, was hit by a cyber attack that paralyzed its services. The attack is linked to the ongoing conflict. Kyivstar , the largest Ukraine service provider was down after a major cyber attack. The Ukrainian telecommunications company provides communication services and data transmission based on a broad range of fixed and mobile technologies, including 4G (LTE) in Ukraine.

article thumbnail

Who's Calling? Spam, Scams and Wasted Time

KnowBe4

First ever insight into those annoying spam calls provides enlightening detail into how many calls are there, where are they coming from, and how much time is wasted dealing with them.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

North Korea-linked APT group Lazarus was spotted exploiting Log4j vulnerabilities to deploy previously undocumented remote access trojans. The North Korea-linked APT group Lazarus is behind a new hacking campaign that exploits Log4j vulnerabilities to deploy previously undocumented remote access trojans (RATs). Cisco Talos researchers tracked the campaign as Operation Blacksmith, the nation-state actors are employing at least three new DLang -based malware families.

article thumbnail

AI in the workplace: balancing benefits and security

Jamf

Artificial intelligence (AI) is an inevitable part of our future lives, whether at home or at work. In this blog, we'll go over what AI in the workplace looks like, including its benefits and challenges.

article thumbnail

Ukrainian military intelligence service hacked the Russian Federal Taxation Service

Security Affairs

The Ukrainian government’s military intelligence service announced the hack of the Russian Federal Taxation Service (FNS). Hackers of the Main Intelligence Directorate of the Ministry of Defense of Ukraine announced they have compromised the Russian Federal Taxation Service (FNS). The military intelligence service said that the hack was the result of a successful special operation on the territory of Russia.

Military 133
article thumbnail

Unwrapping the Threat: AI-Powered Phishing Attacks Take Center Stage in 2023 Holidays

KnowBe4

As the holiday season approaches, so does the annual surge in online shopping and holiday package tracking. Unfortunately, this joyous time has also become a prime hunting ground for cybercriminals.

Phishing 105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

More in store with IBM Storage Virtualize

IBM Big Data Hub

Managing data is difficult. In today’s hybrid cloud environments, data is spread across a large and complex data fabric encompassing on-premise storage and cloud infrastructure. This can lead to data becoming siloed and difficult to manage. With the ever-present threat of cyberattacks, it is more important than ever to ensure you have full visibility over your data storage and a simple way to configure your data for extreme resilience.

Cloud 74
article thumbnail

How to Effectively Draft Data Processing Agreements to Protect Information Shared with Service Providers – Part 2

Data Protection Report

In our previous post , we discussed specific considerations for common boilerplate provisions in data processing agreements (DPAs). Due to the sensitivity of data transfers and privacy laws, DPAs require careful drafting to ensure the data processor complies with appropriate privacy obligations and is responsible for any non-compliance. This post takes a closer look at DPA-specific obligations relating to the data processing itself.

article thumbnail

Promote resilience and responsible emissions management with the IBM Maximo Application Suite

IBM Big Data Hub

Embracing responsible emissions management can transform how organizations impact the health and profitability of their assets. This opportunity is undeniable. An IBM CEO study , based on interviews with 3,000 CEOs worldwide, reveals that CEOs who successfully integrate sustainability and digital transformation report a higher average operating margin than their peers.

article thumbnail

Thriving in HR: Celebrating Achievements and Navigating Challenges

OpenText Information Management

In HR’s ever-evolving landscape, staying ahead by using technology is imperative in facilitating change. During our recent OpenText customer roundtable on 31st October 2023, a dozen HR technology professionals delved into the achievements and hurdles of integrating OpenText™ Extended ECM for SAP® SuccessFactors® with their SAP SuccessFactors® suite and other supporting HR applications.

ECM 59
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The EU’s AI Act: the position is agreed

Data Protection Report

In the early hours of the morning of Saturday 9 December 2023, the European Parliament (the Parliament) and the Council of the EU (the Council) reached an agreement on the outstanding points on the EU’s Regulation on artificial intelligence (AI Act). Talks had previously stalled over how to regulate AI trained on large amounts of data and able to perform a wide range of functions, referred to as ‘foundation models’ or ‘general purpose AI’.

article thumbnail

10 Essential Strategies for Successful Information Governance and Data Retention for Executives via Robinson+Cole

IG Guru

Check out the article here. The post 10 Essential Strategies for Successful Information Governance and Data Retention for Executives via Robinson+Cole first appeared on IG GURU.

article thumbnail

Adapture Becomes an AWS Well-Architected Partner

Adapture

Atlanta-Based IT Consultancy Proves Its Skill in AWS Cloud Environments ATLANTA, Dec. 12, 2023 – Adapture, a leader in networking, security, and infrastructure consulting, has achieved AWS Well-Architected Partner status, which signifies that the company is well-versed in AWS best practices and is poised to implement them in its clients’ environments.

Cloud 52
article thumbnail

CyberheistNews Vol 13 #50 [Heads Up] Don't Be Fooled by This Sneaky Disney+ Phishing Scam

KnowBe4

[Heads Up] Don't Be Fooled by This Sneaky Disney+ Phishing Scam

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How Google Workspace just made it easier for others to pronounce your name

Collaboration 2.0

Your Google profile card can now hold a recording of your name. The new feature is available to users with certain Workspace accounts.

IT 52
article thumbnail

Happy Holidays blog post

Docuware

2023 has been an exciting and eventful year for our company. We celebrated DocuWare’s 35th anniversary and welcomed our 600th employee. We opened a new US office in Beacon, NY and launched our Instagram channel, @life.at.docuware. We also received industry awards in markets all over the world.

article thumbnail

Russia Weaponizes Israel-Hamas Conflict in Targeted Phishing Attack

KnowBe4

Researchers at IBM X-Force are tracking a phishing campaign that’s using themes related to the Israel-Hamas war to deliver Headlace, a backdoor exclusively used by the suspected Russian state-sponsored threat actor ITG05. ITG05 has overlaps with groups tied to Russia’s GRU, including APT28 (also known as “Fancy Bear.

Phishing 106