Fri.Sep 20, 2024

article thumbnail

Training AI on Social Media: What Could Go Wrong?

Data Breach Today

Unfiltered Training Data Can Cause Safety Issues, Spread Misinformation LinkedIn this week joined its peers in using social media posts as training data for AI models, raising concerns of trustworthiness and safety. The question for AI developers is not whether companies use the data or even whether it is fair to do so - it is whether the data is reliable or not.

IT 227
article thumbnail

US DoJ charged two men with stealing and laundering $230 Million worth of cryptocurrency

Security Affairs

The US DoJ arrested two people and charged them with stealing and laundering more than $230 million worth of cryptocurrency. The U.S. DoJ arrested two people, Malone Lam (20) (aka “Greavys,” “Anne Hathaway,” and “$$$”) and Jeandiel Serrano (21) (aka “Box,” “VersaceGod,” and “@SkidStar”) in Miami and charged them with stealing more than $230 million worth of cryptocurrency.

Access 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ENISA Warns About Hacktivist, Ransomware Crossover

Data Breach Today

Hacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says Ransomware hacks and self-declared hacktivist denial-of-services attacks were the most prolific threat to European Union members over the 12-month period ending in June, the EU cyber agency warned, adding that the nexus between nation-state hackers and hacktivist groups poses an emerging threat.

article thumbnail

The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

Security Affairs

Microsoft warns that financially motivated threat actor Vanilla Tempest is using INC ransomware in attacks aimed at the healthcare sector in the U.S. Microsoft Threat Intelligence team revealed that a financially motivated threat actor, tracked as Vanilla Tempest (formerly DEV-0832 ) is using the INC ransomware for the first time to target the U.S. healthcare sector.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

ISMG Editors: How to Survive a Major Ransomware Attack

Data Breach Today

CyberEdBoard Members and ISMG Editors on Incident Response, AI and Defense Trends This week, CyberEdBoard members Jon Staniforth and Helmut Spöcker joined ISMG editors to unpack the hot topics at ISMG's London Cybersecurity Summit 2024, including ransomware lessons learned, AI trends and the growing importance of continuous learning and resilience in the cybersecurity industry.

More Trending

article thumbnail

Protecting Your Data and Company From Cyberthreats

Data Breach Today

Why Cybersecurity Is a Public Imperative Data is one of the most valuable assets in today's digital age. Cyberthreats come in many forms, such as phishing attacks, ransomware, data breaches and malware infections, and failing to protect your data can cause severe financial, reputational and operational damage.

article thumbnail

iPhone 16 Pro: Upgrading from iPhone 13 Pro or earlier? Your list of new features is impressive

Collaboration 2.0

The average iPhone upgrader has at least a 3 year-old phone. If you're coming from an iPhone 13 Pro or earlier, here's your list of upgrades for 2024.

93
article thumbnail

Quantum Risks Pose New Threats for US Federal Cybersecurity

Data Breach Today

Experts Say Feds May Face Cost and Timeline Challenges in Quantum Readiness The United States is preparing for an age of quantum computing as federal agencies roll out initiatives designed to boost "quantum readiness," and as experts warn the government may face issues that delay its ability to defend against a future of advanced threats enabled by the emerging technology.

Risk 144
article thumbnail

Clever Social Engineering Attack Using Captchas

Schneier on Security

This is really interesting. It’s a phishing attack targeting GitHub users, tricking them to solve a fake Captcha that actually runs a script that is copied to the command line. Clever.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Who Will Take the Lead in Setting Healthcare AI Regulations?

Data Breach Today

It's yet to be determined whether a handful of states or the federal government will lead the charge in adopting comprehensive regulations involving the use of artificial intelligence in healthcare, said regulatory attorney Betsy Hodge, a partner in law firm Akerman.

article thumbnail

Online Scams Are Shortening Their Cycles and Making More Money

KnowBe4

New analysis of blockchain activity shows scammers are needing less time to be successful at obtaining crypto payments, and are seeing higher payoffs.

article thumbnail

London Cybersecurity Summit: Building Cyber Resilience

Data Breach Today

Security Leaders Explored Trends in Identity Threats, Post-Brexit Compliance and AI At the annual Cybersecurity Summit: London, Information Security Media Group recently brought together top cybersecurity professionals, executives and thought leaders to find solutions to the latest threats, identity-related weaknesses and emerging risks posed by AI technology.

article thumbnail

Ukraine bans Telegram for government agencies, military, and critical infrastructure

Security Affairs

Ukraine’s NCCC banned the Telegram app for government agencies, military, and critical infrastructure, due to national security concerns. Ukraine’s National Coordination Centre for Cybersecurity (NCCC) has banned the Telegram messaging app on government agencies, military, and critical infrastructure, due to national security concerns. The ban does not affect Ukrainian citizens.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Phishing Attacks Abuse Content Creation and Collaboration Platforms

KnowBe4

Researchers at Barracuda have observed an increase in phishing attacks that abuse popular content creation and collaboration platforms. These include online graphic design platforms and document-sharing services widely used by educational institutions and businesses.

article thumbnail

How to use Jamf Teacher to restrict the Calculator app

Jamf

Learn how Jamf Teacher helps educators manage the new Calculator app in iPadOS 18 by restricting access during lessons to keep students focused on learning.

article thumbnail

5 Linux commands I use to keep my device running smoothly

Collaboration 2.0

Knowing what's going on under the hood of your Linux OS is essential for optimizing performance. These commands will give you insight into system resources and processes.

95
article thumbnail

California and artificial intelligence watermarking law

Data Protection Report

On September 19, 2024, California enacted another law relating to artificial intelligence, this time relating to watermarking. The new law ( SB 942 ) requires making certain AI detection tools available at no cost to users. The new law does not take effect until January 1, 2026. AI Detection Tools (SB 942) This bill, the California AI Transparency Act, will impose a series of obligations on GenAI providers related to the creation of AI content utilizing their systems.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

LinkedIn is training AI with your personal data. Here's how to stop it

Collaboration 2.0

Your information and how you interact with LinkedIn is helping to train AI. If you don't want that to happen, you can opt out and check what it already knows.

article thumbnail

Jamf After Dark: creativity with Jamf mobility

Jamf

Tim Knox and Jonathan Yuresko, Senior Consulting Engineers at Jamf, join Kat and Sean to discuss the creative solutions they’ve built for customers’ unique use cases.

45
article thumbnail

Upgrading to MacOS Sequoia? Here's why you may want to hold off

Collaboration 2.0

The new version of Apple's MacOS is breaking the functionality of security products from Microsoft, CrowdStrike, SentinelOne, and other vendors. But that's not all.

article thumbnail

How and Why You Should Digitize Your Documents: A Business Guide

Docuware

In an era where efficiency, security, and accessibility are paramount, businesses in all industries are turning to document digitization to streamline operations and enhance their capabilities. This transition from physical documents to digital formats can revolutionize the way businesses store, manage, and retrieve information. In this comprehensive business guide, we explore the concept of document digitization, its benefits and the practical steps involved, providing a clear path for business

Access 26
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Buy a Microsoft Office 2019 license for Windows or Mac for $25

Collaboration 2.0

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 89% off.

Access 97
article thumbnail

Tor Project responded to claims that law enforcement can de-anonymize Tor users

Security Affairs

The maintainers of the Tor Project have responded to claims that German police have devised a technique to deanonymize users. The maintainers of the Tor Project have responded to claims that German law enforcement has devised a technique to deanonymize its users. According to German media, law enforcement has infiltrated the anonymizing network and in at least one case they unmasked a criminal.

Privacy 121
article thumbnail

Thoughts control Alexa while OpenAI's o1-preview 'excels'

Collaboration 2.0

It was a somewhat practical week for the Innovation Index, with advancements in accessibility, reasoning, and digital protections for teens topping the leaderboard.

Access 67
article thumbnail

Delay Upgrading to macOS Sequoia, Security Experts Recommend

Data Breach Today

Not Yet Compatible: Many Third-Party Endpoint Security, Authentication, VPN Tools Multiple makers of third-party Apple security tools, including CrowdStrike and SentinelOne, are warning users not to upgrade to the new macOS 15 Sequoia, pending needed OS bug fixes. Users have also reported seeing problems with third-party VPNs crashing and single sign-on tools failing.

Security 144
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

I changed these 5 soundbar settings for a better TV viewing (and audio) experience

Collaboration 2.0

By adding a soundbar, you've taken the first step to converting your home into a theater-like venue for cinematic sound. Here are some ways to take your audio experience up a notch.

82
article thumbnail

OpenText Documentum: Trusted by industry behemoths and niche players alike

OpenText Information Management

OpenText™ Documentum™ customers are a force. They are leaders and innovators in their industries, spanning banks, utilities, hospitals, life sciences organizations, transportation companies, retailers and more. They are organizations with massive and complex volumes of content, running some of the largest document management systems in the world. And we mean massive.

article thumbnail

Where's your BitLocker recovery key? How and why to save a copy before the next Windows meltdown

Collaboration 2.0

BitLocker encryption is a tremendous way to stop a thief from accessing your business and personal secrets. But don't let the tool lock you out of your PC. Here's how to save a secure backup copy of your encryption key for panic-free recovery.