Tue.Nov 28, 2023

article thumbnail

Generative AI Technology Leads AWS Agenda at re:Invent 2023

Data Breach Today

CEO Adam Selipsky Unveils AI Assistant, Projects With Salesforce, NVIDIA, Anthropic In an effort to upstage Microsoft in the AI space, AWS CEO Adam Selipsky invited NVIDIA CEO Jensen Huang and Dario Amodei, co-founder of Anthropic, to share the stage at AWS re:Invent 2023. Selipsky committed to integrating generative AI across AWS solutions and guardrails to secure customer data.

Security 289
article thumbnail

How Generative AI Can Improve Enterprise Search

AIIM

I was inspired to write this post after listening to an episode of “This Week in Windows” on Leo Laporte’s TWIT.TV podcast network. Leo and one of his co-hosts got into an interesting discussion on the use of Generative AI like ChatGTP with respect to search on the internet. Leo seemed to be making the same mistake many do, and confusing the concepts of using a search engine to answer a query by finding sources of information, and asking a Generative AI system based on a Large Language Model (LL

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Police Bust Suspected Ransomware Group Ringleader in Ukraine

Data Breach Today

5 Suspects Arrested; Group Tied to Ransomware Attacks Against 1,800 Victims Police have arrested a group of criminals in Ukraine, including their alleged ringleader, who they suspect launched ransomware attacks against organizations across 71 countries, amassing at least 1,800 victims, from which they demanded ransoms collectively worth hundreds of millions of dollars.

article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

San Francisco, Calif., Nov. 28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. The study, conducted by independent research firm Propeller Insights, dives into how IT business leaders feel about their security posture in a world where the technologies they embrace to grow and thrive are also vulnerable to constant and increasing threats.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CrowdStrike SIEM Demand Rises Amid Cisco-Splunk, Legacy Woes

Data Breach Today

LogScale Reaches $100M ARR As EY Builds 150-Person Practice Around CrowdStrike SIEM Discontent with legacy SIEM offerings and Cisco's proposed acquisition of Splunk has driven "a significant and pronounced increase in interest" in CrowdStrike's SIEM offering. It hit the $100 million ARR milestone last quarter thanks to LogScale's search speed, data gravity and cost efficiency.

IT 289

More Trending

article thumbnail

Iranian Hacking Group Attacks Pennsylvania Water Authority

Data Breach Today

CISA Investigating Iranian Hacking Group Attack on Pennsylvania Water Authority The U.S. Cybersecurity and Infrastructure Security Agency is investigating a cyberattack from an Iranian hacking group known as "Cyber Av3ngers" that targeted a small municipal water authority in Pennsylvania over its use of Israeli-owned software, according to officials.

article thumbnail

A Civil Rights Firestorm Erupts Around a Looming Surveillance Power Grab

WIRED Threat Level

Dozens of advocacy groups are pressuring the US Congress to abandon plans to ram through the renewal of a controversial surveillance program that they say poses an “alarming threat to civil rights.

Privacy 130
article thumbnail

Apparent GE Hack Raises National Security Concerns

Data Breach Today

Prominent Threat Actor Advertises Access to GE's Military Projects General Electric says it is aware of claims made by "a bad actor" about gaining unauthorized access to its sensitive data and taking "appropriate measures to help protect the integrity of our systems" after a hacker known as IntelBroker advertised access to its networks and data.

Military 274
article thumbnail

Threat actors started exploiting critical ownCloud flaw CVE-2023-49103

Security Affairs

Threat actors started exploiting a critical ownCloud vulnerability (CVE-2023-49103) that can lead to sensitive information disclosure. ownCloud is an open-source software platform designed for file synchronization and sharing. It allows individuals and organizations to create their own private cloud storage services, giving them control over their data while facilitating collaboration and file access across multiple devices.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Second Front Raises $40M to Support More Classified Networks

Data Breach Today

Series B Funding Will Help Second Front Pursue US Civilian, International Business A vendor focused on fast-tracking government access to commercial software closed its Series B funding round to support more classified and regulated environments. The $40 million will allow Second Front Systems to support additional bespoke networks in the U.S. Defense and National Security space.

article thumbnail

Artificial Intelligence (Regulation) Bill: UK Private Members’ Bill underscores wide-spread regulatory concerns

Data Protection Report

A Private Members’ Bill, the Artificial Intelligence (Regulation) Bill (the Bill ), has been introduced into House of Lords (the UK’s upper House of the UK Parliament) and is currently at the second Parliamentary stage. The King’s Speech , which set out the agenda for the current Parliamentary session, did not contain any proposals from the Government for legislation on AI, a point that was highlighted by the House of Commons Science, Innovation and Technology Committee.

article thumbnail

Mapping Access - and Attack - Paths in Active Directory

Data Breach Today

A directory service should be a "source of truth," said Justin Kohler, vice president of products at Spector Ops. But when users are overprivileged or misconfigurations occur, that creates attack hubs. Kohler discusses BloodHound, a solution he says is like Google Maps for Active Directory.

Access 262
article thumbnail

News alert: Hunters’ Team Axon discloses severe privilege escalation flaw in Google Workspace

The Last Watchdog

Boston, Mass. and Tel Aviv, Israel, Nov. 28, 2023 –A severe design flaw in Google Workspace’s domain-wide delegation feature discovered by threat hunting experts from Hunters’ Team Axon , can allow attackers to misuse existing delegations, enabling privilege escalation and unauthorized access to Workspace APIs without Super Admin privileges.

Risk 130
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

DP World Says Australian Employee Data Stolen in Attack

Data Breach Today

Stevedore Says No Ransomware Found in Attack That Disrupted Australian Shipping A cyber incident that incapacitated four major Australian ports for days also resulted in the theft by hackers of employee data, the port operator said Tuesday. Hackers obtained personal information of current and former employees of DP World Australia in an incident first detected on Nov. 10.

article thumbnail

International police operation dismantled a prominent Ukraine-based Ransomware group

Security Affairs

An international law enforcement operation dismantled the core of a ransomware group operating from Ukraine. A joint law enforcement operation led by Europol and Eurojust, with the support of the police from seven nations, has arrested in Ukraine the core members of a ransomware group. Today EUROPOL in conjunction with the Ukraine National Police arrested individuals operating a ransomware group out of Ukraine.

article thumbnail

Proofpoint Snags Former VMware President Sumit Dhawan as CEO

Data Breach Today

Dhawan Is Proofpoint's 3rd CEO Since March 2022; Interim Leader Thomas Back as CFO Proofpoint landed top VMware lieutenant Sumit Dhawan as its new chief executive just days after the cloud and virtualization giant was acquired by Broadcom. The Silicon Valley-based email security firm said it liked Dhawan's track record of building security, cloud and end-user computing businesses.

Cloud 238
article thumbnail

Healthcare provider Ardent Health Services disclosed a ransomware attack

Security Affairs

The US Healthcare provider Ardent Health Services disclosed that it was the victim of a ransomware attack last week. Ardent Health Services is a healthcare company that operates hospitals and other medical facilities in the United States. It is a for-profit health system with a focus on acquiring, managing, and improving hospitals. Ardent Health Services is known for providing a range of healthcare services, including acute care, specialty care, and community health services.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Users Fall for Smishing Attacks 6-10 Times More Than Email-Based Attacks

KnowBe4

With organizations heavily focusing on protecting the corporate endpoint, cybercriminals are switching focus onto mobile devices where users are more prone to fall for their social engineering tactics.

article thumbnail

Taking a page from the Agile playbook to advance artificial intelligence

CGI

Today, there isn’t a discussion on the future that doesn’t include the role of artificial intelligence (AI). The focus is on identifying the opportunities that the responsible adoption of this rapidly evolving technology offers. But, as with any technology, success is found in the strength of your organization’s ability to collaborate and innovate.

article thumbnail

Elon Musk Is Giving QAnon Believers Hope Just in Time for the 2024 Elections

WIRED Threat Level

Musk’s recent use of the term “Q*Anon” is his most explicit endorsement of the movement to date. Conspiracists have since spent days dissecting its meaning and cheering on his apparent support.

IT 106
article thumbnail

OS upgrades 2023: What macOS Sonoma means for Education

Jamf

Discover the transformative impact of macOS Sonoma on education. Explore how Apple's latest OS updates are shaping the future of classroom learning.

Education 106
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Telegram’s Bans on Extremist Channels Aren't Really Bans

WIRED Threat Level

A WIRED analysis of more than 100 restricted channels shows these communities remain active, and content shared within them often spreads to channels accessible to the public.

Access 100
article thumbnail

Digital Car Keys Are Coming

Schneier on Security

Soon we will be able to unlock and start our cars from our phones. Let’s hope people are thinking about security.

Security 118
article thumbnail

Who Knew Neanderthals were so High-Tech?

KnowBe4

Researchers at ESET describe various types of scams launched by users of Telekopye, a telegram bot that assists in crafting social engineering attacks.

Phishing 110
article thumbnail

The Hundred-Year Battle for India’s Radio Airwaves

WIRED Threat Level

The Indian government has a monopoly on radio news, allowing it to dictate what hundreds of millions of people hear. With an election approaching, that gives prime minister Narendra Modi a huge advantage.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

My Top 7 Cybersecurity Reflections for 2024

KnowBe4

The digital landscape is evolving at an exponential rate, and with it, the cybersecurity challenges we face. As we approach 2024, I've reflected on.

article thumbnail

Best practices for augmenting human intelligence with AI

IBM Big Data Hub

Artificial Intelligence (AI) should be designed to include and balance human oversight, agency, and accountability over decisions across the AI lifecycle. IBM’s first Principle for Trust and Transparency states that the purpose of AI is to augment human intelligence. Augmented human intelligence means that the use of AI enhances human intelligence, rather than operating independently of, or replacing it.

article thumbnail

Maximize test coverage with OpenText DevOps Aviator

OpenText Information Management

Success in DevOps requires a delicate balance of velocity, agility, and quality. Any missteps could lead to issues ranging from escaped defects, rework, excess waste, and to a large extent, gaps in test coverage. Who’s to blame, though? After all, creating tests using traditional methods is limited by the human mind’s capacity and understanding of … The post Maximize test coverage with OpenText DevOps Aviator appeared first on OpenText Blogs.

69