Fri.Dec 15, 2023

article thumbnail

UK AI National Institute Urges 'Red Lines' For Generative AI

Data Breach Today

Alan Turing Institute Calls for 'Shift in Mindset' to Tackle National Security Risk The U.K. national institute for artificial intelligence urged the government to establish red lines against the use of generative AI in scenarios in which the technology could take an irreversible action without direct human oversight. The U.K. government has sought to cultivate responsible AI.

article thumbnail

New NKAbuse malware abuses NKN decentralized P2P network protocol

Security Affairs

Experts uncovered a new Go-based multi-platform malware, tracked as NKAbuse, which is the first malware abusing NKN technology. Researchers from Kaspersky’s Global Emergency Response Team ( GERT ) and GReAT uncovered a new multiplatform malware dubbed NKAbuse. The malicious code is written in Go language, it is the first malware that relies on the NKN technology for data exchange between peers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Decoding BlackCat Ransomware's Downtime Drama

Data Breach Today

Also: Fraud Trends; Cryptocurrency Regulatory Developments In the latest weekly update, editors at ISMG discuss whether police have seized ransomware group Alphv/BlackCat's data leak site, how fraudsters are adapting their tactics and techniques to exploit advancements in technology, and which cryptocurrency stories shaped the industry this year.

article thumbnail

Multiple flaws in pfSense firewall can lead to arbitrary code execution

Security Affairs

Security flaws in Netgate pfSense firewall solution can potentially lead to arbitrary code execution on vulnerable devices. pfSense is a popular open-source firewall solution maintained by Netgate, researchers discovered multiple security issues affecting it. Researchers from SonarCloud discovered several security issues, Cross-Site Scripting (XSS) vulnerabilities and a Command Injection vulnerability in pfSense CE ( CVE-2023-42325 , CVE-2023-42327 , CVE-2023-42326 ).

Phishing 143
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA Urges Health Sector to Apply Critical Cyber Measures

Data Breach Today

Advice Is Based on Agency's 2-Week Security Assessment of a Large Entity The Cybersecurity and Infrastructure and Security Agency is urging health sector entities to take critical steps in fortifying their environments based on findings from a risk and vulnerability assessment performed by the federal agency on a healthcare industry organization earlier this year.

More Trending

article thumbnail

Cyberspace Solarium Commission Hails NDAA Cyber Provisions

Data Breach Today

Defense Bill Includes Many Critical Cybersecurity Components, CSC Says Co-chairs of the Cyberspace Solarium Commission praised the annual U.S. national defense bill for enacting recommendations from its 2020 report, saying the bill marks "meaningful" advancements for cybersecurity. With the bill, 58 out of the commission's 82 recommendations will have been enacted.

article thumbnail

Snatch ransomware gang claims the hack of the food giant Kraft Heinz

Security Affairs

The Snatch ransomware group announced it had hacked the food giant Kraft Heinz, the company is investigating the claims. Kraft Heinz is an American food company, it is one of the largest food and beverage manufacturers globally. Kraft Heinz produces a wide range of popular food products, including condiments, sauces, cheese, snacks, and ready-to-eat meals.

article thumbnail

45,000 Affected by Breach at Idaho National Laboratory

Data Breach Today

Breach Exposed Names, Social Security Numbers and Salaries The Idaho National Laboratory said hackers stole personal data of more than 45,000 individuals connected with the facility following a self-proclaimed hacktivist group's claims of a breach. The data theft stems from a Nov. 20 incident affecting the organization's off-site Oracle HCM HR system.

article thumbnail

A Robot the Size of the World

Schneier on Security

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats. It had actuators: Drones, autonomous cars. And it had smarts in the middle, using sensor data to figure out what to do and then actually do it. This was the Internet of Things (IoT).

IoT 138
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Federal Agencies Failing to Meet Critical Cyber Deadlines

Data Breach Today

Agencies Lack Capabilities to Track, Investigate and Remediate Threats, Report Says The departments of Commerce, State and Justice are among the 20 agencies identified in a Government Accountability Office report as having failed to meet key cyberthreat incident response deadlines outlined in the 2021 cybersecurity executive order.

article thumbnail

Idaho National Laboratory data breach impacted 45,047 individuals

Security Affairs

The Idaho National Laboratory (INL) announced that it has suffered a data breach impacting more than 45,000 individuals. In November, the hacktivist group SiegedSec claimed responsibility for the hack of The Idaho National Laboratory (INL) and leaked stolen human resources data. SiegedSec is a threat actor that last year carried out multiple attacks against U.S. organizations, especially U.S. municipalities.

article thumbnail

Legal Trends to Watch in 2024

Data Breach Today

CISO Liability, AI, Ransomware and Shadow IT Attorney Jonathan Armstrong examines four cybersecurity legal trends that will shape 2024: heightened personal liability for security leaders, the impact of ransomware, legal and ethical concerns about AI, and the influence of shadow IT, especially regarding messaging apps.

article thumbnail

IRS Warns of Expected Wave of Tax Scams

KnowBe4

Urging taxpayers and tax professionals to be vigilant, the Internal Revenue Service (IRS) provides some simple guidance on how to spot new scams aimed at being able to file fake tax returns.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Weekly Update 378

Troy Hunt

I'd say the balloon fetish segment was the highlight of this week's video. No, seriously, it's a moment of levity in an otherwise often serious industry. It's still a bunch of personal info exposed publicly and that suchs regardless of the nature of the site, but let's be honest, the subject matter did make for some humorous comments 🤣 References Sponsored by: Identity theft isn’t cheap.

IoT 101
article thumbnail

Types of Records Management Systems

Record Nations

Business transactions create records that need to be stored securely and accessibly. Records include tax returns, employment forms, and financial documents that require a retention period of several years. Records management helps businesses maintain, use, store, and dispose of their records in compliance with retention laws while also supporting business processes.

article thumbnail

OpenText & Salesforce help save the holidays with AI!

OpenText Information Management

This holiday season Santa needs help checking his lists! Santa receives millions of wish list letters from children around the world, and he needs to know what toys to build. The Elves are overwhelmed reading all these letters manually and inputting the data into Salesforce. They are also making sure all these letters are safely … The post OpenText & Salesforce help save the holidays with AI!

Sales 69
article thumbnail

Customer service trends winning organizations need to follow

IBM Big Data Hub

Paying attention to the latest customer service trends ensures that an organization is prepared to meet changing customer expectations. Customer loyalty is waning, spurred on by the COVID-19 pandemic, social influences and the ease of switching brands. More than ever, organizations must stay on top of changes in the customer service experience to improve customer satisfaction and meet increased customer needs.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

ARMA’s Updated myLearning Platform is HERE!

IG Guru

Check out the announcement here. The post ARMA’s Updated myLearning Platform is HERE! first appeared on IG GURU.

66
article thumbnail

Examples of sustainability in business

IBM Big Data Hub

Some of the first teachings about improving the planet seem simple: reduce, reuse, recycle. People have since made lifestyle choices and adjustments, such as biking to work and segregating garbage, to bring this rule to life and help save the environment. Now, climate change is affecting businesses as much as individuals. According to the United Nations Environment Programme (UNEP), both consumers and investors are being turned-off by companies that ignore their environmental impact.

article thumbnail

Reltio's 2023 journey in data management, AI, and digital transformation

Reltio

This year has been pivotal for Reltio and our customers and partners, who have navigated a landscape marked by macroeconomic challenges and an intensifying need to integrate new AI capabilities and realize the potential of digital transformation. Organizations face roadblocks from data fragmentation, quality, and integration. Persistent data management challenges hinder the advancement toward integrating AI solutions.

article thumbnail

Five open-source AI tools to know

IBM Big Data Hub

Open-source artificial intelligence (AI) refers to AI technologies where the source code is freely available for anyone to use, modify and distribute. When AI algorithms, pre-trained models, and data sets are available for public use and experimentation, creative AI applications emerge as a community of volunteer enthusiasts builds upon existing work and accelerates the development of practical AI solutions.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

5 Supply chain predictions for 2024

OpenText Information Management

In the fast-moving landscape of global commerce, the supply chain remains at the heart as businesses strive for efficiency, resilience, and sustainability. As we approach 2024, several trends are set to reshape the supply chain industry, offering new opportunities and challenges. Here are five supply chain predictions that we believe will shape the narrative in … The post 5 Supply chain predictions for 2024 appeared first on OpenText Blogs.

59
article thumbnail

The risks of sideloaded apps

Jamf

Are sideloaded apps safe? Based on new EU legislation, Apple may start allowing for the sideloading of apps from third-party app stores. These apps can bring new risks to your organization's security posture. Read this blog to know what this can look like and how to mitigate the risks.

Risk 52
article thumbnail

Data of over a million users of the crypto exchange GokuMarket exposed

Security Affairs

GokuMarket, a centralized crypto exchange owned by ByteX, left an open instance, revealing the details of virtually all of its users, the Cybernews research team has discovered. The leak comes after the team discovered an unprotected MongoDB instance, which stored information on GokuMarket crypto exchange users. Businesses employ MongoDB to organize and store large swaths of document-oriented information, and in GokuMarket’s case, the details of over a million customers and admin users.

Passwords 139
article thumbnail

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

Schneier on Security

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 109
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

HHS 5-Year Health Data Strategy Prioritizes 'Responsible' AI

Data Breach Today

Biden Plan Aims to 'Harness' Data, AI to Better Patient Outcomes, Cut Cancer Deaths The Biden administration is heavily counting on "responsibly" leveraging AI as part of a five-year strategy that aims to harness data to enhance the health and wellness of Americans. That includes ambitions to drastically improve cancer care and reduce cancer deaths, among other top goals.

289
289
article thumbnail

Disinformation Rages in Russian Cyber Winter of Discontent

Data Breach Today

CISO Ian Thornton-Trump on Information Warfare, Disruptive Cyberattacks, Patching As Russia's all-out invasion of Ukraine continues, Moscow's strategy for targeting Ukrainian allies centers on "painting the picture of incompetent governments that can't protect from the Russian might" via misinformation and disinformation campaigns, said Ian Thornton-Trump, CISO of Cyjax.