Thu.Nov 07, 2024

article thumbnail

Breach Roundup: Chinese Cyberespionage Using Open Source VPN

Data Breach Today

Also: Ransomware Hackers Demand Baguettes This week, Chinese spying, Italian hacking scandal, an FBI warning and Okta fixed a bug. Google mandated MFA, zero days in PTZOptics and a Mexican airport didn't pay ransom. Cybercriminals demanded baguettes, breach lettersin Ohio and Germany will shield white hats. The Italian DPA rebuked a bank.

article thumbnail

Unlock the Future of Document Management: How AI is Revolutionizing Intelligent Document Processing

AIIM

In this blog post, I want to share how AI is having a dramatic impact on intelligent document processing (IDP). I will share three use cases that demonstrate the impact AI is having.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Reports 600 Million Cyberattacks per Day

Data Breach Today

Findings From the Tech Giant's Defense Report 2024 Flag Expanding Threat Landscape Microsoft's latest Digital Defense Report exposed an increasingly complex cyber battlefield in which nation-state actors team up with cybercriminals to launch sophisticated attacks, while organizations continue to struggle to defend against these evolving threats.

264
264
article thumbnail

Watch out, Windows Notepad users: Here comes AI

Collaboration 2.0

Currently available to Windows Insiders in Windows 11, Microsoft's new AI-powered Rewrite feature will help you fine-tune your prose in Notepad.

128
128
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hacker Claims to Leak Nokia Source Code

Data Breach Today

Noka 'Is Aware of Reports' Finnish telecommunications equipment manufacturer Nokia is investigating the alleged posting of source code data on a criminal hacking forum. A hacker going by the handle of "IntelBroker" on Thursday posted what he said is a trove of "Nokia related source code.

More Trending

article thumbnail

Cryptohack Roundup: M2, Metawin Exploits

Data Breach Today

Also: LottieFiles Attack, Craig Wright's Contempt of Court This week, Metawin hacks, LottieFiles attack, hackers used Ethereum smart contracts to target npm developers, Craig Wright faced contempt of court, Alameda sued KuCoin, Binance sought dismissal of a U.S. Securities and Exchange lawsuit, and Immutable received a Wells Notice.

Security 269
article thumbnail

The new M4 Mac Mini might be the most lovable Mac ever - for two reasons

Collaboration 2.0

The redesigned M4 Mac Mini is nearly the same size as the Apple TV. You can use it as a light workstation, a mini server, a TV streaming box, and more.

IT 119
article thumbnail

Law Firm Hack Compromises Health System's Patient Data

Data Breach Today

Did Data Theft at Firm Also Affect Other Clients' Information? A hacking incident at Thompson Coburn, a national law firm based in Missouri, has affected an unspecified number of patients of a healthcare sector client, Presbyterian Healthcare Services in New Mexico. But a big unanswered question is whether other clients were affected.

248
248
article thumbnail

I replaced my M1 MacBook Pro with a base model M4 - and it blew my $3,000 system away

Collaboration 2.0

Apple's flagship laptop line won't wow you with flashy features or fresh designs, but it's almost so polished that you can't complain.

IT 119
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Assessing Banking Product Risks to Improve KYC Programs

Data Breach Today

Trapets CEO Gabriella Bussien on Why Banks Need to Fine-Tune, Automate KYC Processes KYC protocols traditionally focus on account-level verification, but examining KYC at the product level can help banks assess risk more accurately. Asking targeted questions based on product risk enables institutions to detect potential financial crimes, said Gabriella Bussien, CEO of Trapets.

Risk 223
article thumbnail

Prompt Injection Defenses Against LLM Cyberattacks

Schneier on Security

Interesting research: “ Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks “: Large language models (LLMs) are increasingly being harnessed to automate cyberattacks, making sophisticated exploits more accessible and scalable. In response, we propose a new defense strategy tailored to counter LLM-driven cyberattacks.

Access 99
article thumbnail

DPRK-linked BlueNoroff used macOS malware with novel persistence

Security Affairs

SentinelLabs observed North Korea-linked threat actor BlueNoroff targeting businesses in the crypto industry with a new multi-stage malware. SentinelLabs researchers identified a North Korea-linked threat actor targeting crypto businesses with new macOS malware as part of a campaign tracked as “Hidden Risk.” The attackers, linked to BlueNoroff and past RustBucket campaigns, used fake cryptocurrency news emails and a malicious app disguised as a PDF.

Risk 116
article thumbnail

Phishing Campaign Impersonates OpenAI To Collect Financial Data

KnowBe4

Cybercriminals are impersonating OpenAI in a widespread phishing campaign designed to trick users into handing over financial information. The emails inform users that a payment for their ChatGPT subscription was declined, inviting them to click a link in order to update their payment method.

Phishing 102
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

U.S. CISA adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-43093 Android Framework Privilege Escalation Vulnerability CVE-2024-51567 CyberPanel Incorrect Default Permissions Vulnerability CVE-2019-16278 Nostro

IT 114
article thumbnail

Subverting LLM Coders

Schneier on Security

Really interesting research: “ An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection “: Abstract : Large Language Models (LLMs) have transformed code com- pletion tasks, providing context-based suggestions to boost developer productivity in software engineering.

article thumbnail

This Mac model is the computer most people should buy (and it's not a MacBook or Mini)

Collaboration 2.0

Apple's refreshed iMac with the M4 chip is a worthy upgrade for most people, with more memory for the same price as previous years, a host of AI-powered features, and stylish new colors.

IT 99
article thumbnail

The Deceptive Media Era: Moving Beyond "Real vs. Fake"

KnowBe4

As society grapples with the rapid advancement of AI and synthetic media, we've been asking the wrong question. The focus on whether content is "real or fake" misses the more crucial question: "Is this media deceptive?

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Windows 11 24H2 bug list grows again: 10 reasons to avoid this update for now

Collaboration 2.0

Microsoft's official 24H2 update for Windows 11 has been saddled with one bug after another. Here's why you should avoid updating and what you may find if you jump into the new version right now.

124
124
article thumbnail

Attackers Abuse DocuSign to Send Phony Invoices

KnowBe4

Threat actors are abusing DocuSign’s API to send phony invoices that appear “strikingly authentic,” according to researchers at Wallarm.

article thumbnail

This lightweight Linux distro is the best (and easiest) way to revive your old computer. Here's how

Collaboration 2.0

If you want to breathe life back into a slow or aging computer, Linux Lite 7.0 is a lightweight, efficient distribution with solid performance.

105
105
article thumbnail

764 Terror Network Member Richard Densmore Sentenced to 30 Years in Prison

WIRED Threat Level

The 47-year-old Michigan man, who pleaded guilty to sexually exploiting a child, was highly active in the online criminal network called 764, which the FBI now considers a “tier one” terrorism threat.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

I tested the M4 MacBook Pro for a week - and even the base model beat my $3,000 laptop

Collaboration 2.0

Apple's flagship laptop line won't wow you with flashy features or fresh designs, but it does everything else to a tee.

IT 98
article thumbnail

A Critical Guide to Securing Large Language Models

Thales Cloud Protection & Licensing

A Critical Guide to Securing Large Language Models glenn.hamilton… Thu, 11/07/2024 - 18:07 Securing large language models (LLMs) presents unique challenges due to their complexity, scale, and data interactions. Before we dive into securing them, let’s touch on the basics. What are LLMs? LLMs are Large Language Models that are advanced artificial intelligence systems designed to understand and generate human-like text.

article thumbnail

Matter 1.4 now supports more smart home devices and adds new capabilities

Collaboration 2.0

The connectivity standard's latest version promises a more seamless smart home experience. See everything that's new.

98
article thumbnail

A Critical Guide to Securing Large Language Models

Thales Cloud Protection & Licensing

A Critical Guide to Securing Large Language Models glenn.hamilton… Thu, 11/07/2024 - 18:07 Securing large language models (LLMs) presents unique challenges due to their complexity, scale, and data interactions. Before we dive into securing them, let’s touch on the basics. What are LLMs? LLMs are Large Language Models that are advanced artificial intelligence systems designed to understand and generate human-like text.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The best AI image generators of 2024: Tested and reviewed

Collaboration 2.0

Want to create images in seconds using just text prompts? Here are the 10 best text-to-image AI tools for bringing whatever you can imagine to life (and most of them are free).

81
article thumbnail

Your guide to OpenText DevOps: Maximize your software delivery skills at OpenText World 2024

OpenText Information Management

Elevate your approach to DevOps and embrace AI-driven transformation at OpenText World 2024. Hosted at The Venetian Hotel in Las Vegas November 18-21 , our annual user conference offers an unparalleled opportunity for software application delivery developers, managers, and VPs to gain valuable insights and hands-on experience with the latest in DevOps and AI technology.

Cloud 64
article thumbnail

How to install Apple's iOS 18.2 public beta - and what you'll find inside

Collaboration 2.0

The public beta kicks in some of Apple Intelligence's most-anticipated features, including the ChatGPT integration, though you'll have to request access to some.

Access 85