Wed.Jul 24, 2024

article thumbnail

CrowdStrike Says Code-Testing Bugs Failed to Prevent Outage

Data Breach Today

Cybersecurity Vendor's Preliminary Review Details Problems, Promises Improvements CrowdStrike, in a preliminary report, has blamed internal testing problems for failing to prevent the faulty "rapid content update" that caused worldwide disruption on Friday. The cybersecurity vendor has promised to refine its testing and deployment processes to avoid any repeats.

article thumbnail

AIIM's Take on AI Input Transparency Policy

AIIM

Copyright is intended to incentivize creativity to serve the purpose of enriching the public by providing access to creative work. Generative AI engines use content (aka information or unstructured data) to develop large language models. This content can and often does include copyrighted works.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Email Gateway Security Gaps Enable New Malware Tactics

Data Breach Today

Static Scanning Limitations Usher Malware Onto Corporate Network Phishing hackers have developed a new technique for smuggling malware past secure email gateway defenses, said researchers at Cofense who uncovered a recent info stealer campaign. "I honestly think that it was someone testing the water to see if it would work - and it did work," a researcher said.

Security 297
article thumbnail

This Machine Exposes Privacy Violations

WIRED Threat Level

A former Google engineer has built a search engine, WebXray, that aims to find illicit online data collection and tracking—with the goal of becoming “the Henry Ford of tech lawsuits.

Privacy 136
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Vulnerabilities in LangChain Gen AI Could Prompt Data Leak

Data Breach Today

Open-Source Company Issues Patches After Being Alerted by Palo Alto A widely used generative artificial intelligence framework is vulnerable to a prompt injunction flaw that could enable sensitive data to leak. Security researchers at Palo Alto Networks uncovered two arbitrary code flaws in open-source library LangChain.

More Trending

article thumbnail

Check Point Snags Team8's Nadav Zafrir to Replace Gil Shwed

Data Breach Today

Check Point's 2nd CEO Since 1993 Arrives With Deep CISO Relationships, Sales Acumen Check Point Software tapped the longtime leader of an Israeli cybersecurity incubator to be just the second CEO in the firewall behemoth's 32-year history. The company selected Team8 co-founder and Managing Partner Nadav Zafrir to replace Gil Shwed, who has led Check Point since inception in 1993.

Sales 273
article thumbnail

China-linked APT group uses new Macma macOS backdoor version

Security Affairs

China-linked APT group Daggerfly (aka Evasive Panda, Bronze Highland) Evasive Panda has been spotted using an updated version of the macOS backdoor Macma. The China-linked APT group Daggerfly (aka Evasive Panda or Bronze Highland) has significantly updated its malware arsenal, adding a new malware family based on the MgBot framework and an updated Macma macOS backdoor. “The Daggerfly (aka Evasive Panda, Bronze Highland) espionage group has extensively updated its toolset, introducing sever

Libraries 133
article thumbnail

Companies Are Playing Catch-Up to Secure Generative AI

Data Breach Today

Netskope Says Firms Are Using Blocking Controls, DLP But Still Face Security Gaps It's been nearly 18 months since ChatGPT paved the way for rapid generative AI adoption, but enterprises are just beginning to implement basic cybersecurity strategies and use blocking controls, DLP tools and live coaching to mitigate gen AI risks, according to security firm Netskope.

Security 270
article thumbnail

Robot Dog Internet Jammer

Schneier on Security

Supposedly the DHS has these : The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company called Ghost Robotics. Benjamine Huffman, the director of DHS’s Federal Law Enforcement Training Centers (FLETC), told police at the 2024 Border Security Expo in Texas that DHS is increasingly worried about criminals setting “booby traps” with internet of things and smart home devices, and t

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How to Lead When a Crisis Occurs

Data Breach Today

Tips on Managing Public Relations in the Face of a Cyber Incident Cybersecurity incidents are not just technical problems. They are also major public relations challenges. Effective IT and cybersecurity leadership during a crisis can significantly affect your company's reputation, stakeholder trust and overall recovery - and have a big impact on your career.

article thumbnail

U.S. CISA adds Microsoft Internet Explorer and Twilio Authy bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Internet Explorer and Twilio Authy bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2012-4792 Microsoft Internet Explorer Use-After-Free Vulnerability CVE-2024-39891 Twilio Authy Information Disclosure Vulnerability Below are the descriptions of the flaws a

IT 111
article thumbnail

Daixin Gang Threatening to Leak 10 Million Ambulance Records

Data Breach Today

Data Theft Is Latest Cyberattack on an Emergency Medical Services Provider Ransomware group Daixin is threatening to leak sensitive medical information of 10 million patients on the dark web. The group claims to have stolen the data in an attack on Louisiana-based Acadian Ambulance - the latest in a string of incidents targeting emergency medical services.

article thumbnail

MVP 14

Troy Hunt

Just over 13 years ago, Microsoft gave me my first "Most Valuable Professional" award. Out of the blue, as far as I was concerned. It wasn't something I'd planned for and it certainly wasn't something I'd expected, but it has become a cornerstone of my professional identity. Indulge me while I go off on a bit of a tangent here: like the other things in my professional life that have turned into a success, the things I did to earn that first MVP award were things I was

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Senator: Top Banks Only Reimburse 38% of Unauthorized Scams

Data Breach Today

Bank Execs at Senate Hearing Defend Zelle Reimbursements, Payment Fraud Programs During a hearing Tuesday, U.S. Sen. Richard Blumenthal, D-Conn., revealed that Bank of America, JPMorgan Chase and Wells Fargo only reimbursed 38% of customers for unauthorized payments - leaving them on the hook for $100 million in fraud losses. The banks disputed the committee's findings.

246
246
article thumbnail

How to enable Slack notifications on your Apple Watch

Collaboration 2.0

Learn how to always stay connected to your team without having to carry your iPhone everywhere. We step you through all the settings you'll need to make it work.

IT 97
article thumbnail

Time to Rethink Identity: What Security Leaders Need to Know

Data Breach Today

DataBreachToday.com is a multimedia website providing news, insights and education on data breach detection, notification and prevention.

article thumbnail

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

WIRED Threat Level

Cybersecurity researchers have spotted a 3,000-account network on GitHub that is manipulating the platform and spreading ransomware and info stealers.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

US FTC Investigates Impact of AI-Powered Dynamic Pricing

Data Breach Today

Agency Asks Mastercard and 7 Other Firms to Furnish Data Used, Collection Methods The U.S. Federal Trade Commission demanded information from a clutch of firms that advertise their ability to match consumers with prices through AI, dubbing the practice "surveillance pricing." Digitized consumer data has led to years of warnings that retailers dynamically set prices.

Retail 232
article thumbnail

Portworx: A Kubernetes Gold Standard

Daymark

Pure Storage Portworx has established itself as the gold standard for cloud-native Kubernetes data storage, offering scalable persistent storage, multi-cloud data mobility and zero RPO data protection and disaster recovery. At Daymark, we have been impressed with Portworx and view it as being in a class of its own when compared to other suppliers of storage for Kubernetes-orchestrated container apps.

Cloud 70
article thumbnail

The best TVs of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best TVs that offer a great balance between cost and premium features and have high refresh rates and crisp picture quality for catching the action of the 2024 Summer Olympics in Paris.

76
article thumbnail

What’s new in OpenText Content Aviator

OpenText Information Management

OpenTextâ„¢ Content Aviator puts AI into the hands of business users to leverage conversational search, discover content, or even summarize a document or workspace, offering new ways to interact with content and extract knowledge. Content Aviator enables organizations to combine the power of generative AI and large language models (LLMs) with OpenText content services platforms, including OpenTextâ„¢ Core Content , OpenTextâ„¢ Documentumâ„¢ and OpenTextâ„¢ Extended ECM , to make document management, knowl

ECM 69
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

7 password rules to live by in 2024, according to security experts

Collaboration 2.0

The US Government has invested heavily in cybersecurity. Here's what those experts recommend you do when you need to create a new password - and one rule likely goes against what you've been told.

article thumbnail

Empowering Community Archivists at Buncombe County Public Libraries

Archive-It

Guest Post by Carissa Pfeiffer, Librarian at Buncombe County Public Libraries (BCPL) This post is part of a series written by members of the Community Webs program. Community Webs advances the capacity for community-focused memory organizations to build web and digital archives documenting local histories and underrepresented voices. Last October, the reading room of Buncombe County Special Collections , the local history division of Buncombe County Public Libraries , shut its doors for a day.

article thumbnail

Credit Karma unveils updated AI tools to help you better understand your finances

Collaboration 2.0

Imagine having a financial advisor, immersed in your financial data, ready to answer your money questions at any hour. That's Credit Karma's goal with its new and improved AI assistant.

IT 98
article thumbnail

The latest news from Archive-It, July 2024

Archive-It

by the Archive-It team Join us in Chicago Travel Poster Collection, Los Angeles Public Library There is still time to register and join web archiving partners and peers at two events in Chicago next month: Community Webs National Symposium August 13, 8:30AM – 5PM, at the Museum of Contemporary Art Chicago. Learn more and register here. Travel stipends are available thanks to the support of the Mellon Foundation.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The best digital notebooks you can buy in 2024: Expert tested and reviewed

Collaboration 2.0

Looking for a new way to take notes for school or work? We tested the best electronic notebooks that digitize, store, and share your notes or lists more effectively.

76
article thumbnail

From the Stands to the Screen - Safeguarding Global Sporting Events with Cybersecurity

Thales Cloud Protection & Licensing

From the Stands to the Screen - Safeguarding Global Sporting Events with Cybersecurity josh.pearson@t… Thu, 07/25/2024 - 07:00 Global events like the Olympics attract an extraordinary amount of attention. The Tokyo 2020 Olympics had an international audience of around 3.05 billion, roughly 40% of the world's population. Events such as these act as powerful economic drivers, bring about social change, and are often rare moments of solidarity and unity in an increasingly divided world.

article thumbnail

The best radar detectors: Expert recommended

Collaboration 2.0

We tested and researched some of the best radar detectors from Uniden, Escort, and more to help you stay aware of potential road hazards and drive more safely.

98