Mon.Oct 14, 2024

article thumbnail

Congress Seeks Urgent Action After Chinese Telecom Hack

Data Breach Today

Lawmakers Demand Answers, Security Overhaul After Chinese Hack of Telecom Networks Congress is demanding answers from AT&T, Verizon, and Lumen after reports revealed that Chinese hackers breached U.S. telecom infrastructure, targeting systems linked to court-authorized wiretaps, as the FBI and the Cybersecurity and Infrastructure Security Agency investigate the Salt Typhoon group.

article thumbnail

Perfectl Malware

Schneier on Security

Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua Security said. It can also exploit CVE-2023-33246, a vulnerability with a severity rating of 10 out of 10 that was patched last year in Apache RocketMQ, a messaging and streaming platform that’s found on ma

Mining 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Most EU Nations to Miss Upcoming NIS2 Deadline

Data Breach Today

Only Six Nations Have Incorporated NIS2 Into National Statute Most European countries are set to miss a trading bloc deadline for implementing a key cybersecurity regulation that requires measures such as mandatory security auditing for essential services such as hospitals and banks. Just six countries have integrated the NIS2 directive into national law.

article thumbnail

Fidelity Investments suffered a second data breach this year

Security Affairs

US-based financial services company Fidelity Investments warns 77,000 individuals of a data breach that exposed their personal information. U.S.-based financial services company Fidelity Investments is notifying 77,099 individuals that their personal information was compromised in an August cyberattack. The data breach occurred on August 17, 2024 and was discovered two days later, on August 19, 2024. “Between August 17 and August 19, a third party accessed and obtained certain information

article thumbnail

The Tumultuous IT Landscape is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

LLMs Fail Middle School Word Problems, Say Apple Researchers

Data Breach Today

AI Mimics Reasoning Without Understanding, Struggles With Irrelevant Data Cutting-edge large language models would fail eighth grade math, say artificial intelligence researchers at Apple - likely because AI is mimicking the process of reasoning rather than actually engaging in it. Researchers asked LLMs to solve math word problems.

More Trending

article thumbnail

Oil and Gas Firms Aware of Cyber Risks

Data Breach Today

Sector Uses Multifactor, Eschews Cloud, Can't Afford Cyber Insurance The oil and gas industry has high levels of cyber awareness and low levels of cyber insurance, says a sectoral assessment from credit rating agency Moody's. The sector has experienced a clutch of high-profile attacks including a high-profile 2021 incident at Colonial Pipeline.

Insurance 166
article thumbnail

The War on Passwords Is One Step Closer to Being Over

WIRED Threat Level

“Passkeys,” the secure authentication mechanism built to replace passwords, are getting more portable and easier for organizations to implement thanks to new initiatives the FIDO Alliance announced on Monday.

article thumbnail

Revenue Cycle Vendor Notifying 400,000 Patients of Hack

Data Breach Today

Texas-Based Gryphon Healthcare Says an Unnamed Third Party Was at Center of Breach A Texas-based revenue cycle management firm is notifying about 400,000 individuals of a hacking incident it says originated with another third party. The incident is among a growing list of major breaches implicating vendors and cumulatively affecting tens of millions of patients so far this year.

IT 158
article thumbnail

One of the newest EcoFlow portable batteries is only $159 now

Collaboration 2.0

If you need a lightweight portable battery that won't break the bank, check out the EcoFlow River 3, especially at only $159 right now.

92
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Dutch police dismantled dual dark web market ‘Bohemia/Cannabia’

Security Affairs

Dutch police dismantled Bohemia/Cannabia, two major dark web markets for illegal goods, drugs, and cybercrime services. The Dutch police have announced the success of a new joint law enforcement operation that led to the shutdown of the dual dark web marketplace Bohemia/Cannabia. These are two of the largest and longest-running dark web platforms for the trade of illegal goods, drugs, and cybercrime services.

article thumbnail

How Apple Watch helped me hit a hole-in-one on the golf course

Collaboration 2.0

Apple's high-frequency motion API supports unique data collection, and surprisingly enough, it has improved my golf game.

article thumbnail

Nation-state actor exploited three Ivanti CSA zero-days

Security Affairs

An alleged nation-state actor exploited three zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA) in recent attacks. Fortinet FortiGuard Labs researchers warn that a suspected nation-state actor has been exploiting three Ivanti Cloud Service Appliance (CSA) zero-day issues to carry out malicious activities. The three vulnerabilities exploited by the threat actor are: CVE-2024-9380 (CVSS score: 7.2) – an OS command injection vulnerability in the admin web console of Ivanti CSA

Cloud 72
article thumbnail

Forget Wi-Fi: How to add a wired network to your home without Ethernet cable

Collaboration 2.0

Running Ethernet wiring can be a messy, expensive job. If you have cable outlets, you can use an inexpensive adapter to set up a high-speed wired connection with minimal effort. And it works no matter where you get your internet.

IT 98
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Pokemon dev Game Freak discloses data breach

Security Affairs

Pokemon dev Game Freak confirmed that an August cyberattack led to source code leaks and designs for unpublished games online. Game Freak Inc. is a popular Japanese video game developer, founded on April 26, 1989, by Satoshi Tajiri, Ken Sugimori, and Junichi Masuda. It is primarily known as the main developer of the Pokémon video game series. The developer started in 1996 with the Pokémon Red and Blue for Nintendo Game Boy.

article thumbnail

Gmail users, beware of new AI scam that looks very authentic

Collaboration 2.0

A spoofed phone number, an email address plus an AI voice are all it takes to steal your Google credentials. Here's what to look out for, just in case, you happen to find yourself in such a situation.

article thumbnail

"Operation Kaerb" Takes Down Sophisticated Phishing-as-a-Service Platform “iServer”

KnowBe4

A partnering of European and Latin American law enforcement agencies took down the group behind the mobile phone credential theft of 483,000 victims.

article thumbnail

2024 Thales Global Data Threat Report: Trends in Financial Services

Thales Cloud Protection & Licensing

2024 Thales Global Data Threat Report: Trends in Financial Services madhav Tue, 10/15/2024 - 05:17 Financial services (FinServ) firms are key players in the global economy. Given the sensitive and high-value nature of the information they house and handle, it’s no surprise that these institutions are heavily regulated and frequently find themselves in the crosshairs of malicious actors.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Sextortion Scammers Attempt to Hit “Close to Home”

KnowBe4

We live in a world where, despite the sharing of information online, we feel like those interactions will never reach home. But a new scam – covered on WTSP Tampa Bay’s Channel 10 news – demonstrates how scammers will use personal details to throw the victim into a panic when extorting them for money.

article thumbnail

Why this lightweight Linux distro won't win any popularity contests but is perfect for power users

Collaboration 2.0

AntiX is a systemd-free Linux live CD distribution based on Debian Stable for Intel-AMD x86 compatible systems that runs blazing fast and offers a familiar desktop.

75
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at SOSS Fusion 2024 in Atlanta, Georgia, USA. The event will be held on October 22 and 23, 2024, and my talk is at 9:15 AM ET on October 22, 2024. The list is maintained on this page.

63
article thumbnail

My go-to portable power bank has a magnetic superpower (and it's 40% off)

Collaboration 2.0

Baeseus' new power bank comes with both MagSafe charging for iPhones and a built-in USB-C cable for everything else. A 40% off coupon on Amazon makes it even better.

IT 74
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Meet SmartRisk Agent™: Unlock Your New Human Risk Management

KnowBe4

Depending on who you ask, between 70 and 90 percent of cyber risk has human error as the root cause. That's why Human Risk Management (HRM) is so important. And here is the next major advance in HRM. We're thrilled to announce the second version of our risk score architecture. It is so far advanced we have renamed—promoted really—our initial "Virtual Risk Officer" to SmartRisk Agent™.

Risk 62
article thumbnail

One of the best 2-in-1s I've tested this year has an underrated feature for the office

Collaboration 2.0

HP's EliteBook x360 1040 is a professional laptop/tablet combo with a feature set that enables one of the best video call environments for a laptop I've seen.

75
article thumbnail

U.S. CISA adds Fortinet products and Ivanti CSA bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet products and Ivanti CSA bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-23113 (CVSS score 9.8) Fortinet Multiple Products Format String Vulnerability.

IT 58
article thumbnail

Buy an Echo Dot (5th gen) with clock and get a free smart bulb

Collaboration 2.0

Selling for just $30 for on Amazon (60% off the regular price), the 5th-generation Echo Dot comes with a Bluetooth bulb you control with your voice.

74
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Gimmal Launches the First-of-its-Kind RIOT Data Assessment Solution

Gimmal

High value, Inaccessible data can become discoverable and then Readable in Preserve365 October 14, 2024 – Houston, TX – Gimmal , the market’s only end-to-end information governance platform, in partnership with Preservica , the leader in Active Digital Preservation archiving, is excited to launch a new RIOT (Redundant, Inaccessible, Obsolete, and Trivial) Data Assessment to help organizations unlock the value of and eliminate the hidden risk from unreadable files and inaccessible data formats. &

ROT 52
article thumbnail

One of the best productivity laptops I've tested is not a ThinkPad or MacBook (and it's on sale)

Collaboration 2.0

Asus' Vivobook S 15 is a fantastic choice for digital who want an ultraportable laptop. It boasts fast performance, houses a brilliant OLED screen, and it's on sale for $999 on Amazon.

Sales 66
article thumbnail

If it’s not written down… how does black history survive beyond the archive?

CILIP

If it’s not written down… how does black history survive beyond the archive? How could the unwritten story of an enslaved black woman force the world’s most powerful nation to recalibrate one of its most revered men nearly 200 years after she died? Here author Tammye Huf explains the significance of the story of Sally Hemings and Thomas Jefferson to her own work, and how important it is to keep family histories alive.