Wed.Jan 17, 2024

article thumbnail

E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop

Krebs on Security

The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of a cybercrime lifestyle. With memorable hits such as “Internet Swiping” and “Million Dollar Criminal” earning millions of views, Punchmade has leveraged his considerable following to peddle tutorials on how to commit financial crimes online.

Sales 288
article thumbnail

OpenAI Combats Election Misinformation Amid Growing Concerns

Data Breach Today

ChatGPT Maker Wants to Deter Use of AI in Online Election Misinformation Campaigns OpenAI announced a series of steps it was taking to prevent the use of its models in online influence operations throughout the 2024 election season, amid growing concerns that the election could face significant security concerns from the use of AI in online influence operations.

Security 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Incogni study reveals overwhelming majority of spam calls originate locally

The Last Watchdog

Los Angeles, Calif., Jan. 17, 2024 – Spam calls continue to be a major nuisance in the US, and advice on how to avoid them abound. Incogni’s latest research challenges prevalent assumptions about spam calls, revealing that traditional advice on avoiding specific area codes is largely ineffective. The study, based on the latest data from the Federal Trade Commission (FTC), demonstrates that, contrary to popular belief, a staggering 59.81% of all unwanted calls originate from local num

article thumbnail

Chrome Patches First Zero-Day of 2024 Exploited in the Wild

Data Breach Today

Google Fixes Out-of-Bounds Memory Access Flaw, Microsoft Edge Browser Also Affected Google released an urgent fix for the first zero-day vulnerability of the year in its Chrome web browser, warning the bug is under active exploitation. Google blamed an out-of-bounds memory access flaw in its V8 JavaScript rendering engine. It also affects Microsoft Edge browser.

Access 296
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How a 27-Year-Old Codebreaker Busted the Myth of Bitcoin’s Anonymity

WIRED Threat Level

Once, drug dealers and money launderers saw cryptocurrency as perfectly untraceable. Then a grad student named Sarah Meiklejohn proved them all wrong—and set the stage for a decade-long crackdown.

Privacy 144

More Trending

article thumbnail

Inside the Massive Naz.API Credential Stuffing List

Troy Hunt

It feels like not a week goes by without someone sending me yet another credential stuffing list. It's usually something to the effect of "hey, have you seen the Spotify breach", to which I politely reply with a link to my old No, Spotify Wasn't Hacked blog post (it's just the output of a small set of credentials successfully tested against their service), and we all move on.

Passwords 140
article thumbnail

How a Novel Legal Maneuver Got a Hospital's Stolen Data Back

Data Breach Today

The ubiquity and anonymity of cryptocurrencies are fueling economic, legal and ethical challenges that put healthcare entities in the crosshairs of cybercriminals, said David Hoffman, general counsel of Claxton-Hepburn Medical Center, which recently filed a lawsuit against ransomware gang LockBit.

article thumbnail

iShutdown lightweight method allows to discover spyware infections on iPhones

Security Affairs

Researchers devised a “lightweight method,” called iShutdown, to determine whether Apple iOS devices have been infected with spyware. Cybersecurity researchers from Kaspersky have identified a “lightweight method,” called iShutdown, to identify the presence of spyware on Apple iOS devices. The method allow to discover stealthy and poweful surveillance software like NSO Group ‘s Pegasus , Intellexa ‘s Predator , QuaDream ‘s Reign.

Archiving 140
article thumbnail

Did Uber's Delivery Service Drizly Die Due to Data Breach?

Data Breach Today

Closing Time for Alcohol Delivery Service Follows Fed Crackdown for Poor Security It's last call for Drizly, the alcohol delivery service Uber bought for $1.1 billion in 2021. Whether or not Drizly's past cybersecurity missteps - leading to two-decade consent agreement with regulators - played any part in its being retired by Uber remains unclear.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Code Written with AI Assistants Is Less Secure

Schneier on Security

Interesting research: “ Do Users Write More Insecure Code with AI Assistants? “: Abstract: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. Overall, we find that participants who had access to an AI assistant based on OpenAI’s codex-davinci-002 model wrote significantly less secure code than those without access.

Security 129
article thumbnail

Chinese Drones Pose Threat to US Infrastructure, CISA Warns

Data Breach Today

CISA, FBI Urge Critical Infrastructure Owners to Bolster UAS Security Measures The U.S. Cybersecurity and Infrastructure Security Agency is warning critical infrastructure owners and operators about the dangers associated with the increasing reliance on Chinese unmanned aircraft systems, warning their use in CI sectors "risks exposing sensitive information to PRC authorities.

article thumbnail

Citrix warns admins to immediately patch NetScaler for actively exploited zero-days

Security Affairs

Citrix fixed two actively exploited zero-day vulnerabilities impacting Netscaler ADC and Gateway appliances. Citrix warns customers to install security updates to address two actively exploited zero-day vulnerabilities, tracked as CVE-2023-6548 and CVE-2023-6549, impacting Netscaler ADC and Gateway appliances. “Exploits of these CVEs on unmitigated appliances have been observed.

Cloud 130
article thumbnail

US Judge Again Says Meta Pixel Privacy Case Dismissal Unlikely

Data Breach Today

Case Against Meta Likely Moving Forward After Court Heard Dismissal Arguments A federal judge said he is inclined to let proceed a putative class action lawsuit against Meta over its gathering of data from medical center patient portals through a web activity tracking tool. U.S. District for the District of Northern California Judge William Orrick on heard arguments.

Privacy 262
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Github rotated credentials after the discovery of a vulnerability

Security Affairs

GitHub rotated some credentials after the discovery of a flaw that allowed access to the environment variables of a production container. After GitHub became aware of a vulnerability through its bug bounty program, the Microsoft-owned company rotated some credentials. The vulnerability, tracked as CVE-2024-0200 (CVSS score 7.2), allowed access to the environment variables of a production container and the company confirmed that all affected credentials have been rotated. “On December 26,

article thumbnail

Elevating retail operations with Jamf strategic partnerships

Jamf

Jamf partners up with our allies in the retail space to enhance the customer retail experience. Read this blog to learn more about how Jamf and our partners can make a difference.

Retail 106
article thumbnail

Pro-Russia group hit Swiss govt sites after Zelensky visit in Davos

Security Affairs

Switzerland believes that the attack claimed by pro-Russian group NoName that hit the government websites is retaliation for Zelensky’s presence at Davos. Switzerland believes that the cyberattack carried out by pro-Russia group NoName disrupted access to some government websites, following Ukrainian President Volodymyr Zelensky’s visit to Davos. “We took a look at Switzerland, where the World Economic Forum Davos is currently taking place.

article thumbnail

Cryptography use cases: From secure communication to data security 

IBM Big Data Hub

When it comes to data security , the ancient art of cryptography has become a critical cornerstone of today’s digital age. From top-secret government intelligence to everyday personal messages, cryptography makes it possible to obscure our most sensitive information from unwanted onlookers. Whether shopping online or saving valuable trade secrets to disk, we can thank cryptography for any semblance of privacy we may have.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation

Security Affairs

U.S. CISA and the FBI warned of AndroxGh0st malware used to create a botnet for victim identification and exploitation in target networks. US CISA and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory (CSA) to warn of AndroxGh0st malware. The malware is spreading to create a botnet for victim identification and exploitation in target networks.

article thumbnail

How one IBMer is creating a more sustainable future for the island where he grew up

IBM Big Data Hub

IBM believes in the power of technology and innovation to drive climate solutions, especially for the communities and organizations most impacted by climate change and environmental challenges. At the center of this work is also a commitment to volunteerism, allowing inspired IBMers to combine their talent and skills with passion and purpose. Through the IBM Sustainability Accelerator , a pro-bono social impact program, IBM volunteers donate their time, energy and expertise to help create lastin

article thumbnail

Streamline ERP migration with integration experts – Estimate ROI with our new calculator!

OpenText Information Management

So, you’re facing the daunting task of modernizing or replacing your company’s enterprise resource planning (ERP) system. Do you worry about the price tag of an ERP migration and justifying management costs? Or do your main concerns revolve around migration risks and complexity? Laying the foundation for a successful ERP migration Like many companies, you’ve … The post Streamline ERP migration with integration experts – Estimate ROI with our new calculator!

Risk 69
article thumbnail

UK ICO Launches Consultation Series on Generative AI

Hunton Privacy

On January 15, 2024, the UK Information Commissioner’s Office (“ICO”) announced that it has launched a consultation series on generative AI. The series will examine how aspects of UK data protection law should apply to the development and use of the technology, with the first chapter of the series focusing on when it is lawful to train generative AI models on personal data scraped from the web.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The evolving role of general counsel: Securing a seat at the table

OpenText Information Management

Technological, social, and economic events have changed the legal and regulatory landscape. There was a time when in-house legal departments and the general counsel had more clear-cut roles that were well understood by everyone, lawyers, and non-lawyers alike. However, it is not that simple anymore. The new role of the general counsel We have … The post The evolving role of general counsel: Securing a seat at the table appeared first on OpenText Blogs.

article thumbnail

IT spending set to grow 6.8% in 2024, Gartner predicts

Information Matters

Global information technology (IT) spending is forecast to total $5tn in 2024, an increase of 6.8 per cent from 2023, according to new projections by technology research firm Gartner. The Read more The post IT spending set to grow 6.8% in 2024, Gartner predicts appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52
article thumbnail

Cyberattackers Target Nuclear Waste Company via LinkedIn via DarkReading

IG Guru

Check out the article here. The post Cyberattackers Target Nuclear Waste Company via LinkedIn via DarkReading first appeared on IG GURU.

Risk 86
article thumbnail

Spotlight on Security Specifiers: Get to Know the HID A&E Team Dedicated to the Security Consultant Community

HID Global

A Critical Resource for the Security Industry

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Chatbot examples: A beginner’s guide 

IBM Big Data Hub

A chatbot is a program or script designed to interact and respond to humans in real-time conversation. Different organizations and individuals employ chatbots for a variety of different uses and business functions. Broadly, chatbots provide pre-written responses and information to handle basic requests or to get enough information from customers to connect them to a live agent for better and more specific service.

Sales 60