Wed.Jul 24, 2024

article thumbnail

CrowdStrike Says Code-Testing Bugs Failed to Prevent Outage

Data Breach Today

Cybersecurity Vendor's Preliminary Review Details Problems, Promises Improvements CrowdStrike, in a preliminary report, has blamed internal testing problems for failing to prevent the faulty "rapid content update" that caused worldwide disruption on Friday. The cybersecurity vendor has promised to refine its testing and deployment processes to avoid any repeats.

article thumbnail

AIIM's Take on AI Input Transparency Policy

AIIM

Copyright is intended to incentivize creativity to serve the purpose of enriching the public by providing access to creative work. Generative AI engines use content (aka information or unstructured data) to develop large language models. This content can and often does include copyrighted works.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerabilities in LangChain Gen AI Could Prompt Data Leak

Data Breach Today

Open-Source Company Issues Patches After Being Alerted by Palo Alto A widely used generative artificial intelligence framework is vulnerable to a prompt injunction flaw that could enable sensitive data to leak. Security researchers at Palo Alto Networks uncovered two arbitrary code flaws in open-source library LangChain.

article thumbnail

This Machine Exposes Privacy Violations

WIRED Threat Level

A former Google engineer has built a search engine, WebXray, that aims to find illicit online data collection and tracking—with the goal of becoming “the Henry Ford of tech lawsuits.

Privacy 143
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Email Gateway Security Gaps Enable New Malware Tactics

Data Breach Today

Static Scanning Limitations Usher Malware Onto Corporate Network Phishing hackers have developed a new technique for smuggling malware past secure email gateway defenses, said researchers at Cofense who uncovered a recent info stealer campaign. "I honestly think that it was someone testing the water to see if it would work - and it did work," a researcher said.

Security 292

More Trending

article thumbnail

Check Point Snags Team8's Nadav Zafrir to Replace Gil Shwed

Data Breach Today

Check Point's 2nd CEO Since 1993 Arrives With Deep CISO Relationships, Sales Acumen Check Point Software tapped the longtime leader of an Israeli cybersecurity incubator to be just the second CEO in the firewall behemoth's 32-year history. The company selected Team8 co-founder and Managing Partner Nadav Zafrir to replace Gil Shwed, who has led Check Point since inception in 1993.

Sales 272
article thumbnail

Robot Dog Internet Jammer

Schneier on Security

Supposedly the DHS has these : The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company called Ghost Robotics. Benjamine Huffman, the director of DHS’s Federal Law Enforcement Training Centers (FLETC), told police at the 2024 Border Security Expo in Texas that DHS is increasingly worried about criminals setting “booby traps” with internet of things and smart home devices, and t

article thumbnail

Companies Are Playing Catch-Up to Secure Generative AI

Data Breach Today

Netskope Says Firms Are Using Blocking Controls, DLP But Still Face Security Gaps It's been nearly 18 months since ChatGPT paved the way for rapid generative AI adoption, but enterprises are just beginning to implement basic cybersecurity strategies and use blocking controls, DLP tools and live coaching to mitigate gen AI risks, according to security firm Netskope.

Security 271
article thumbnail

MVP 14

Troy Hunt

Just over 13 years ago, Microsoft gave me my first "Most Valuable Professional" award. Out of the blue, as far as I was concerned. It wasn't something I'd planned for and it certainly wasn't something I'd expected, but it has become a cornerstone of my professional identity. Indulge me while I go off on a bit of a tangent here: like the other things in my professional life that have turned into a success, the things I did to earn that first MVP award were things I was

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

How to Lead When a Crisis Occurs

Data Breach Today

Tips on Managing Public Relations in the Face of a Cyber Incident Cybersecurity incidents are not just technical problems. They are also major public relations challenges. Effective IT and cybersecurity leadership during a crisis can significantly affect your company's reputation, stakeholder trust and overall recovery - and have a big impact on your career.

article thumbnail

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

WIRED Threat Level

Cybersecurity researchers have spotted a 3,000-account network on GitHub that is manipulating the platform and spreading ransomware and info stealers.

article thumbnail

Daixin Gang Threatening to Leak 10 Million Ambulance Records

Data Breach Today

Data Theft Is Latest Cyberattack on an Emergency Medical Services Provider Ransomware group Daixin is threatening to leak sensitive medical information of 10 million patients on the dark web. The group claims to have stolen the data in an attack on Louisiana-based Acadian Ambulance - the latest in a string of incidents targeting emergency medical services.

article thumbnail

U.S. CISA adds Microsoft Internet Explorer and Twilio Authy bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Internet Explorer and Twilio Authy bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2012-4792 Microsoft Internet Explorer Use-After-Free Vulnerability CVE-2024-39891 Twilio Authy Information Disclosure Vulnerability Below are the descriptions of the flaws a

IT 96
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Senator: Top Banks Only Reimburse 38% of Unauthorized Scams

Data Breach Today

Bank Execs at Senate Hearing Defend Zelle Reimbursements, Payment Fraud Programs During a hearing Tuesday, U.S. Sen. Richard Blumenthal, D-Conn., revealed that Bank of America, JPMorgan Chase and Wells Fargo only reimbursed 38% of customers for unauthorized payments - leaving them on the hook for $100 million in fraud losses. The banks disputed the committee's findings.

265
265
article thumbnail

How to enable Slack notifications on your Apple Watch

Collaboration 2.0

Learn how to always stay connected to your team without having to carry your iPhone everywhere. We step you through all the settings you'll need to make it work.

IT 75
article thumbnail

US FTC Investigates Impact of AI-Powered Dynamic Pricing

Data Breach Today

Agency Asks Mastercard and 7 Other Firms to Furnish Data Used, Collection Methods The U.S. Federal Trade Commission demanded information from a clutch of firms that advertise their ability to match consumers with prices through AI, dubbing the practice "surveillance pricing." Digitized consumer data has led to years of warnings that retailers dynamically set prices.

Retail 257
article thumbnail

Portworx: A Kubernetes Gold Standard

Daymark

Pure Storage Portworx has established itself as the gold standard for cloud-native Kubernetes data storage, offering scalable persistent storage, multi-cloud data mobility and zero RPO data protection and disaster recovery. At Daymark, we have been impressed with Portworx and view it as being in a class of its own when compared to other suppliers of storage for Kubernetes-orchestrated container apps.

Cloud 70
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Time to Rethink Identity: What Security Leaders Need to Know

Data Breach Today

DataBreachToday.com is a multimedia website providing news, insights and education on data breach detection, notification and prevention.

article thumbnail

7 password rules to live by in 2024, according to security experts

Collaboration 2.0

The US Government has invested heavily in cybersecurity. Here's what those experts recommend you do when you need to create a new password - and one rule likely goes against what you've been told.

article thumbnail

What’s new in OpenText Content Aviator

OpenText Information Management

OpenText™ Content Aviator puts AI into the hands of business users to leverage conversational search, discover content, or even summarize a document or workspace, offering new ways to interact with content and extract knowledge. Content Aviator enables organizations to combine the power of generative AI and large language models (LLMs) with OpenText content services platforms, including OpenText™ Core Content , OpenText™ Documentum™ and OpenText™ Extended ECM , to make document management, knowl

ECM 65
article thumbnail

The best TVs of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best TVs that offer a great balance between cost and premium features and have high refresh rates and crisp picture quality for catching the action of the 2024 Summer Olympics in Paris.

75
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. Advanced entity resolution using AI is crucial because it efficiently and easily solves many of today’s data quality and analytics problems.

article thumbnail

Empowering Community Archivists at Buncombe County Public Libraries

Archive-It

Guest Post by Carissa Pfeiffer, Librarian at Buncombe County Public Libraries (BCPL) This post is part of a series written by members of the Community Webs program. Community Webs advances the capacity for community-focused memory organizations to build web and digital archives documenting local histories and underrepresented voices. Last October, the reading room of Buncombe County Special Collections , the local history division of Buncombe County Public Libraries , shut its doors for a day.

article thumbnail

Credit Karma unveils updated AI tools to help you better understand your finances

Collaboration 2.0

Imagine having a financial advisor, immersed in your financial data, ready to answer your money questions at any hour. That's Credit Karma's goal with its new and improved AI assistant.

IT 89
article thumbnail

The latest news from Archive-It, July 2024

Archive-It

by the Archive-It team Join us in Chicago Travel Poster Collection, Los Angeles Public Library There is still time to register and join web archiving partners and peers at two events in Chicago next month: Community Webs National Symposium August 13, 8:30AM – 5PM, at the Museum of Contemporary Art Chicago. Learn more and register here. Travel stipends are available thanks to the support of the Mellon Foundation.

article thumbnail

The best digital notebooks you can buy in 2024: Expert tested and reviewed

Collaboration 2.0

Looking for a new way to take notes for school or work? We tested the best electronic notebooks that digitize, store, and share your notes or lists more effectively.

75
article thumbnail

Thinking About Investing in an XDR? Learn How to Cut Through the Hype

Cybersecurity Detection and Response tools are showing promise in helping reduce an attacker’s dwell time in your network. With reduced dwell time before detection, defenders have time to respond in containing the threat before significant damage can be done to your systems and confidential data. But cutting through the acronym soup and marketing hype can be a daunting task.

article thumbnail

China-linked APT group uses new Macma macOS backdoor version

Security Affairs

China-linked APT group Daggerfly (aka Evasive Panda, Bronze Highland) Evasive Panda has been spotted using an updated version of the macOS backdoor Macma. The China-linked APT group Daggerfly (aka Evasive Panda or Bronze Highland) has significantly updated its malware arsenal, adding a new malware family based on the MgBot framework and an updated Macma macOS backdoor. “The Daggerfly (aka Evasive Panda, Bronze Highland) espionage group has extensively updated its toolset, introducing sever

Libraries 112
article thumbnail

The best radar detectors: Expert recommended

Collaboration 2.0

We tested and researched some of the best radar detectors from Uniden, Escort, and more to help you stay aware of potential road hazards and drive more safely.

95
article thumbnail

From the Stands to the Screen - Safeguarding Global Sporting Events with Cybersecurity

Thales Cloud Protection & Licensing

From the Stands to the Screen - Safeguarding Global Sporting Events with Cybersecurity josh.pearson@t… Thu, 07/25/2024 - 07:00 Global events like the Olympics attract an extraordinary amount of attention. The Tokyo 2020 Olympics had an international audience of around 3.05 billion, roughly 40% of the world's population. Events such as these act as powerful economic drivers, bring about social change, and are often rare moments of solidarity and unity in an increasingly divided world.