Tue.Jul 09, 2024

article thumbnail

US Busts Russian AI-Driven Disinformation Operation

Data Breach Today

Meliorator Software Generates Social Media Bots U.S. federal authorities seized two web domains they said supported an artificial intelligence-driven disinformation network run by the Russian domestic intelligence agency and affiliates of a state-run propaganda broadcaster. Authorities searched nearly 1,000 accounts on social media platform X.

article thumbnail

Microsoft Patch Tuesday, July 2024 Edition

Krebs on Security

Microsoft Corp. today issued software updates to plug at least 139 security holes in various flavors of Windows and other Microsoft products. Redmond says attackers are already exploiting at least two of the vulnerabilities in active attacks against Windows users. The first Microsoft zero-day this month is CVE-2024-38080 , a bug in the Windows Hyper-V component that affects Windows 11 and Windows Server 2022 systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Million People Affected by Debt Collector Data Theft Hack

Data Breach Today

Stolen Data Includes Patient Medical Information, According to Breach Notification A Pennsylvania-based debt collector originally told regulators in April that a hacker compromised the personal identifiable information of 1.9 million people. Now the company says the data breach affected more than 4 million people and included patient medical information.

article thumbnail

AI and Information Management: Navigating the Intersection of Human Input and Technology

AIIM

As a former Jeopardy Champion, I've experienced firsthand the importance of memorizing and recalling vast amounts of information. This skill set has not only served me well on the game show but has also informed my perspective on the relationship between human input and artificial intelligence (AI) in the realm of information management.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Cryptocurrency Theft Haul Surges Alongside Crypto Value

Data Breach Today

Private Key and Seed Phrase Compromise Remains Top Attack Vector, TRM Labs Reports Heists perpetrated by cryptocurrency-targeting hackers netted twice as much in stolen proceeds in the first half of 2024 as they did in the first half of 2023, as the overall rise in crypto's value appears to be drawing increased hacker focus, said blockchain intelligence platform TRM Labs.

More Trending

article thumbnail

Evolve Discloses That Hackers Stole Data of 7.6M Individuals

Data Breach Today

Stolen Data Includes Names, Social Security and Bank Account Numbers, Contact Info Evolve Bank & Trust disclosed that hackers stole the data of more than 7.6 million individuals in an incident detected in May. The Arkansas firm has been in incident disclosure mode for weeks now, following Evolve's listing on the LockBit leak site in late June.

Security 184
article thumbnail

Avast released a decryptor for DoNex Ransomware and its predecessors

Security Affairs

Avast developed and released a decryptor for the DoNex ransomware family that allows victims to recover their files for free. Avast researchers identified a cryptographic flaw in the DoNex ransomware and its predecessors that allowed them to develop a decryptor. The experts revealed the weakness during the Recon 2024 conference. Avast also released a decryptor that allows victims to recover their files for free since March 2024. “All brands of the DoNex ransomware are supported by the decr

article thumbnail

What Kind of People Do Cybersecurity for a Living?

Data Breach Today

What kind of people do cybersecurity for a living? In the past, there was a formula potential practitioners followed, but today there are many ways to get into the field and having people from diverse backgrounds is valued. The Curry brothers discuss the cybersecurity profession.

article thumbnail

Evolve Bank data breach impacted over 7.6 million individuals

Security Affairs

The Lockbit ransomware attack on Evolve Bank has compromised the personal information of over 7.6 million individuals. At the end of June, the LockBit gang announced that it had breached the systems of the Federal Reserve of the United States and exfiltrated 33 TB of sensitive data, including “Americans’ banking secrets.” Despite the announcement, data leaked data from the group belongs to the Arkansas-based financial organization Evolve Bank & Trust.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Senate NDAA 2025 Boosts Military Cyber and AI Initiatives

Data Breach Today

Military Omnibus Bill Includes Focus on Cybersecurity, Countering Drone Technology The Senate Armed Services Committee's fiscal year 2025 National Defense Authorization Act includes a significant focus on military cyber preparedness, with plans to develop capabilities to prevent threats from drones, as well as investments in quantum and artificial intelligence research.

Military 176
article thumbnail

Reverse-Engineering Ticketmaster’s Barcode System

Schneier on Security

Interesting : By reverse-engineering how Ticketmaster and AXS actually make their electronic tickets, scalpers have essentially figured out how to regenerate specific, genuine tickets that they have legally purchased from scratch onto infrastructure that they control. In doing so, they are removing the anti-scalping restrictions put on the tickets by Ticketmaster and AXS.

94
article thumbnail

What Will Drive the Use of Faster Payments in the US?

Data Breach Today

Faster Payments Council's Reed Luhtanen on the Importance of Well-Defined Practices Awareness of instant payments has grown significantly in the U.S. payments ecosystem since the launch of FedNow last July. Many banks have signed up for FedNow, but transaction volumes remain low because only the receive mode was activated, said Reed Luhtanen of the U.S.

167
167
article thumbnail

Travelers Beware: Booking.com Warns of Increases in AI-Enabled Travel Scams

KnowBe4

In an interview at the Collision technology conference in Toronto, Booking.com’s CISO sounds the alarm on what she calls “supercharged artificial intelligence (AI) scams.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Samsung Galaxy Ring: Features, price, launch date, and everything else we know

Collaboration 2.0

As we expect Samsung to launch its Galaxy Ring during its summer Unpacked event, new details about the device emerge. Here's everything we know so far.

IT 98
article thumbnail

The Importance of Security Culture: When Telecom Giants Resort to Malware

KnowBe4

I recently read a story about a South Korean telecom company that pushed out malware to over 600,000 of its customers who were using torrents to share files, in a bid to limit their file-sharing capabilities.

article thumbnail

GDPR Article 28 Contracts: What You Need to Know

IT Governance

An overlooked GDPR requirement AND a business enabler Andy Snow has trained thousands of people on the GDPR (General Data Protection Regulation). So, he’s a good person to ask about what areas people find challenging. His response? “The data-sharing aspects of contracts.” As a trainer , Andy regularly receives praise for his engaging delivery style, bringing the subject matter to life with real-world examples.

GDPR 86
article thumbnail

CILIP writes to Secretary of State, Lisa Nandy

CILIP

CILIP writes to new Secretary of State, Lisa Nandy Image of Lisa Nandy, Secretary of State. CILIP Chief Executive Louis Coiffait-Gunn has written to Secretary of State Lisa Nandy MP to highlight the vital role libraries play in our democracy. Louis is writing on behalf of CILIP to relevant appointees in the new government, as well as to all incoming MPs as they settle into their roles.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Samsung Galaxy Watch Ultra: The best specs, features, and everything else we know

Collaboration 2.0

The Galaxy Watch Ultra is expected to follow in Apple's footsteps as a premium wearable with a rugged build, tailored for extreme sports.

94
article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

Text Mining Frees Customer Insights Trapped in Unstructured Content

OpenText Information Management

In a perfect world, every customer would fill out a monthly survey so businesses could easily quantify their experiences. In the real world, things are decidedly messier. Text conveys nuance that numbers simply can’t Customers are constantly dropping clues as to how they are feeling about the brands they do business with, sharing sentiment, emotion, opinions, and intent in emails, chatbots, social media posts, online review sites, and other hard-to-analyze places.

Mining 69
article thumbnail

Phishing Attacks Target High Profile YouTube Accounts

KnowBe4

Researchers at ESET warn of phishing attacks that are attempting to hack high-profile YouTube channels in order to spread scams or malware.

article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Buy a 5-year subscription to AdGuard VPN for $35

Collaboration 2.0

With this AdGuard VPN deal, you can enjoy the benefits of a privacy-enhancing VPN on your mobile devices for the next five years for the equivalent of less than a dollar a month.

Privacy 90
article thumbnail

New Phishing Platform Targets Microsoft 365 Accounts at Financial Firms

KnowBe4

Analysis of the latest phishing-as-a-service (PhaaS) platform - called ONNX Store – highlights just how intricate - and successful.

article thumbnail

The best smart rings of 2024: Expert tested and reviewed

Collaboration 2.0

Samsung is releasing its Galaxy Ring this week, but before the new ring gets all the buzz, we've tested the best smart rings you can buy right now.

IT 75
article thumbnail

No more chasing paper trails – capture all your financial fax with digital precision

OpenText Information Management

The financial services sector, long rooted in traditional methods and complex operations, is experiencing a dramatic transformation. As paper-based processes give way to digital solutions, one area seeing remarkable change is digital fax and capture. Forget the outdated image of clunky fax machines—today’s digital fax and capture offer a sleek, efficient, and secure way to manage information in the modern financial world.

Paper 61
article thumbnail

Thinking About Investing in an XDR? Learn How to Cut Through the Hype

Cybersecurity Detection and Response tools are showing promise in helping reduce an attacker’s dwell time in your network. With reduced dwell time before detection, defenders have time to respond in containing the threat before significant damage can be done to your systems and confidential data. But cutting through the acronym soup and marketing hype can be a daunting task.

article thumbnail

The best projectors of 2024: Expert tested and reviewed

Collaboration 2.0

We've tested some of the best projectors on the market, including those from Xgimi, Samsung, LG, and more, for all your entertainment needs.

article thumbnail

Series intro – The rise of the threat hunter

OpenText Information Management

In the ever-evolving landscape of cyber threats, where automated systems and AI stand as the first line of defense, there exists a critical yet often underappreciated layer of security: the human threat hunter. These vigilant guardians delve deep into device logs and theoretical attacks to uncover hidden dangers and fortify our defenses against relentless threats.

article thumbnail

I tested Motorola's new $699 flip phone and it's full of nostalgic goodness

Collaboration 2.0

Last year, Motorola made headlines for its well-priced Razr foldable flip phone. This year's version is even better, and it costs the same.

IT 73