Tue.Feb 13, 2024

article thumbnail

Hack at Software Services Firm Affects 57,000 BoA Customers

Data Breach Today

InfoSys McCamish Says Incident Involved BoA's Deferred Compensation Plan Customers Bank of America is notifying more than 57,000 customers that their information, including Social Security numbers, was potentially compromised in a hacking incident last November at Atlanta, Georgia-based insurance software firm InfoSys McCamish. BoA says none of its systems were affected.

Insurance 317
article thumbnail

Fat Patch Tuesday, February 2024 Edition

Krebs on Security

Microsoft Corp. today pushed software updates to plug more than 70 security holes in its Windows operating systems and related products, including two zero-day vulnerabilities that are already being exploited in active attacks. Top of the heap on this Fat Patch Tuesday is CVE-2024-21412 , a “security feature bypass” in the way Windows handles Internet Shortcut Files that Microsoft says is being targeted in active exploits.

Phishing 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative AI and the Brave New World of Work

Data Breach Today

CyberEd.io's Steve King on How Gen AI Will Disrupt and Transform Careers Generative AI is both the villain in the tale of job displacement and the hero ushering in a new era of enhanced job roles and opportunities. Steve King of CyberEd.io discusses how gen AI will make your career an uncertain journey that demands lifelong learning, skepticism, humor and adaptability.

281
281
article thumbnail

Workshops Work at the AIIM Conference 2024

AIIM

Why do workshops work so well in adult learning? Read on to see how we are incorporating workshops at AIIM24 and how you can use workshops as a powerful tool for adult learning.

188
188
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Europe's AI Act Poised To Become Law After Committees Vote

Data Breach Today

ACt Will Require Developers to Allows A Copyright Holder Opt Out Two key European Parliament committees accepted a political compromise set to govern how trading bloc countries develop and deploy artificial intelligence. The regulation is set to become the globe's first comprehensive AI regulation.

More Trending

article thumbnail

Responsible Use of Artificial Intelligence

Data Breach Today

A Practical Guide for Cybersecurity Professionals Beyond the hype, AI is transforming cybersecurity by automating threat detection, streamlining incident response and predicting attacker behaviors. Organizations are increasingly deploying AI to protect their data, stay ahead of cybercriminals and build more resilient security systems.

article thumbnail

News alert: Kiteworks named as a founding member of NIST’s new AI safety consortium – ‘AISIC’

The Last Watchdog

San Mateo, Calif., Feb. 13, 2023 – The U.S. White House announced groundbreaking collaboration between OpenPolicy and leading innovation companies, including Kiteworks , which delivers data privacy and compliance for sensitive content communications through its Private Content Network. The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) Artificial Intelligence Safety Institute Consortium (AISIC) will act as a collaborative platform where both public sector and

article thumbnail

USPTO: AI Can Assist Inventors But Can't Hold Patents

Data Breach Today

Humans Must Show Significant Role in AI-Assisted Cases for Inventor Label The U.S. federal patent authority aims to provide clarity on how it will analyze inventions. Only humans can be named in single-person patents, and at least one human must be labelled as the inventor of any given claim, the U.S. Patent and Trademark Office said Tuesday.

IT 254
article thumbnail

Bank of America customer data compromised after a third-party services provider data breach

Security Affairs

Bank of America revealed that the personal information of some customers was stolen in a data breach affecting a third-party services provider. Bank of America began notifying some customers following a data breach at the third-party services provider Infosys McCamish System (IMS). The bank has sent notification letters to 57,000 customers, informing them that their personal information has been compromised Infosys disclosed the security breach on November 3, 2023, in a filing with SEC the compa

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Apparent Pig-Butchering Crypto Scam Took Down a US Bank

Data Breach Today

Kansas Bank Forced to Close After CEO Allegedly Embezzled Nearly $50 Million A watchdog report reveals how Heartland Tri-State Bank CEO Shan Hanes allegedly defrauded a local church and investment club in Kansas out of $47.1 million through a "pig-butchering" cryptocurrency scam that ultimately caused the bank to fail in 2023.

256
256
article thumbnail

Ransomfeed – Third Quarter Report 2023 is out!

Security Affairs

Maintainers behind the Ransomfeed platform have released Q3 Report 2023 including activities of 185 criminal groups operating worldwide. A comprehensive report delving into the intricate landscape of ransomware threats during the last four months of 2023 is out, with a meticulous focus on the monitoring activities conducted by the OSINT Ransomfeed platform ( www.ransomfeed.it ).

article thumbnail

Canadian Flipper Zero Planned Crackdown Provokes Backlash

Data Breach Today

A Rash of Canadian Car Thefts Won't Be Solved by Banning Pen-Testing Tools A Canadian effort amid a surge of car thefts to ban pen-testing devices such as the Flipper Zero that grab wireless signals has provoked backlash among security researchers and advocates, who accused Ottawa of finding a scapegoat for bad auto industry security practices.

Security 234
article thumbnail

Generative AI use cases for the enterprise

IBM Big Data Hub

Remember how cool it felt when you first held a smartphone in your hand? The compact design and touch-based interactivity seemed like a leap into the future. Before long, smartphones became a way of life for organizations worldwide because of all they offer for business productivity and communication. Generative AI ( artificial intelligence ) promises a similar leap in productivity and the emergence of new modes of working and creating.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

More Signs of a Qakbot Resurgence

Data Breach Today

Qakbot Wouldn't Be the First Trojan to Come Back After a Takedown Takedowns aren't always forever in cyberspace. Months after a U.S. law enforcement operation dismantled the notorious Qakbot botnet, security researchers said signs are pointing to a resurgence. Someone with access to the Qakbot - also known as Qbot - source code is experimenting with new builds.

Access 237
article thumbnail

Molly White Reviews Blockchain Book

Schneier on Security

Molly White—of “ Web3 is Going Just Great ” fame— reviews Chris Dixon’s blockchain solutions book: Read Write Own : In fact, throughout the entire book, Dixon fails to identify a single blockchain project that has successfully provided a non-speculative service at any kind of scale. The closest he ever comes is when he speaks of how “for decades, technologists have dreamed of building a grassroots internet access provider” He describes one project that &

article thumbnail

They're Back? HHS OCR Is Eyeing the Return of HIPAA Audits

Data Breach Today

The Agency Is Surveying Previous Auditees to Reassess the Dormant Program As U.S. federal regulators fine-tune a strategy to push the healthcare sector into a stronger cybersecurity posture, they appear to be dusting off a HIPAA compliance audit program that's been dormant for the last seven years. Is a new round of HIPAA audits for regulated entities on the horizon?

article thumbnail

Significant amendments to the Singapore Cyber Security Act set to have implications for the cybersecurity landscape

Data Protection Report

On 15 December 2023, the Cyber Security Agency of Singapore ( CSA ) released the draft Cybersecurity (Amendment) Bill ( Draft Bill ), which seeks to amend the Cyber Security Act 2018 ( CS Act ), for public consultation. The public consultation concluded on 15 January 2024. The consultation paper and the Draft Bill can be accessed here. The proposed changes are significant and will have implications for the cybersecurity landscape in Singapore which we consider below.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

What Is Packet Filtering? Definition, Advantages & How It Works

eSecurity Planet

Packet filtering is a firewall feature that allows or drops data packets based on simple, pre-defined rules regarding IP addresses, ports, or protocols. Once a type of firewall, packet filtering now provides a fundamental feature of nearly all firewalls and some network equipment (routers, smart switches, etc.). The feature involves key principles, as well as pros and cons, and there are four packet filtering types to be aware of, which determine its best use cases.

IT 109
article thumbnail

The European Commission Draft GDPR Procedural Regulation and European Parliament Draft LIBE Report: On the Road to Harmony?

Hunton Privacy

On February 9, 2024, Hunton Andrews Kurth attorneys, David Dumont and Laura Léonard, and Centre for Information Policy Leadership Director of Privacy and Data Policy, Natascha Gerlach, published an op-ed discussing the implications of the European Commission’s proposal for a Regulation laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679 (the “Draft GDPR Procedural Regulation”) and the draft report on the Draft GDPR Procedural Regulation by the European

GDPR 85
article thumbnail

4 strategic sourcing use cases to strengthen your supply chain

IBM Big Data Hub

In this age of supply chain disruptions that hold the power to upend entire industries, strength and resilience across the entire value chain is no longer a nice-to-have—it’s a survival tactic. For sourcing teams, that means pivoting their mindset around selecting suppliers from a tactical, lowest-cost-above-all approach to a strategic one.

article thumbnail

A Hacker’s Mind is Out in Paperback

Schneier on Security

The paperback version of A Hacker’s Mind has just been published. It’s the same book, only a cheaper format. But—and this is the real reason I am posting this—Amazon has significantly discounted the hardcover to $15 to get rid of its stock. This is much cheaper than I am selling it for, and cheaper even than the paperback. So if you’ve been waiting for a price drop, this is your chance.

IT 81
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Collaboration tools are critical for digital workplace success

OpenText Information Management

The adage ‘two heads are better than one’ is just about always true. Enabling people to work well together is just smart business. Companies continue to put more productivity applications and collaboration tools at employees’ fingertips and to embrace flexible, modern work environments to support better ways of working. IDC’s 2023 State of Content Services … The post Collaboration tools are critical for digital workplace success appeared first on OpenText Blogs.

article thumbnail

Application performance optimization: Elevate performance and reduce costs

IBM Big Data Hub

Application performance is not just a simple concern for most organizations; it’s a critical factor in their business’s success. Driving optimal application performance while minimizing costs has become paramount as organizations strive for positive user experiences. These experiences can make or break a business, that’s why prioritizing high performance among applications is non-negotiable.

Cloud 64
article thumbnail

CyberheistNews Vol 14 #07 Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

KnowBe4

Social Engineering Masterstroke: How Deepfake CFO Duped a Firm out of $25 Million

90
article thumbnail

An in-depth review of the Kandji platform from Rocketman Tech

Jamf

Rocketman Tech helps organizations succeed with Jamf, offering consulting and tools to simplify the management process. In this blog, Chris Schasse, — Founder, Owner and Lead Engineer at Rocketman Tech — recaps his in-depth comparison of Kandji and Jamf Pro.

52
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

What Is PIAM? Part 3: How PIAM Is Revolutionizing Compliance

HID Global

In part 3 of our physical identity access management (PIAM) series, discover how compliance plays a critical role in a modern PIAM solution.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

On January 18, 2024, the U.S. Federal Trade Commission announced a complaint and proposed consent order with InMarket Media, LLC, a digital marketing platform and data aggregator. Less than two weeks later, on February 1, the FTC announced a complaint and proposed consent order with software licensor and data provider Blackbaud, Inc. In both cases, the FTC’s complaint alleged that the companies retained personal data for longer than was necessary, and that conduct violated Section 5 of the Fed

article thumbnail

ARMA Mile High Chapter – Denver Spring Seminar on April 16, 2024

IG Guru

Check out the post on LinkedIn here. The post ARMA Mile High Chapter – Denver Spring Seminar on April 16, 2024 first appeared on IG GURU.