Thu.Dec 28, 2023

article thumbnail

Google to Settle $5B 'Incognito Mode' Privacy Issue Lawsuit

Data Breach Today

Deal Follows Court Ruling That Cleared the 4-Year-Old Class Action Claim for Trial Google reached a preliminary settlement in a class action lawsuit that alleged the tech giant had misled consumers about their privacy protections when using the private browsing Incognito mode of its Chrome web browser. The settlement came on the heels of a court ruling clearing the case for trial.

Privacy 291
article thumbnail

Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data

Security Affairs

Leaksmas: On Christmas Eve, multiple threat actors released substantial data leaks, Resecurity experts reported. On Christmas Eve, Resecurity protecting Fortune 100 and government agencies globally, observed multiple actors on the Dark Web releasing substantial data leaks. Over 50 million records containing PII of consumers from around the world have been leaked.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Real Estate Firm Exposes Celebrity Data

Data Breach Today

Also: Yakult Australia Admits to Experiencing 'Cybersecurity Incident' This week, a breach at real estate firm Wealth Network exposed 1.5 billion records, Corewell Health patients were hit by a second breach, data of 1.3M LoanCare mortgage customers was exposed, and Yakult Australia admitted to experiencing a "cybersecurity incident" that exposed 95 gigabytes of data.

article thumbnail

Experts warn of critical Zero-Day in Apache OfBiz

Security Affairs

Experts warn of a zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Experts warn of an authentication bypass zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. An attacker can trigger the vulnerability, tracked as CVE-2023-51467 , to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF) The issue resides in the login functionality and results from an incomplete patch for the P

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Cryptohack Roundup: Thunder Terminal Repels Attack

Data Breach Today

Also: Binance Ex-CEO's Wealth Up $25B; Coinbase Refutes Senate Claims; $3M Scam This week in the cryptocurrency industry, Thunder Terminal successfully prevented a hack, Changpeng Zhao ranking 34th on a list of billionaires, Coinbase refuted a senator's allegations of subverting crypto regulations, and scammers stole $3 million in 24 hours using fake ads.

286
286

More Trending

article thumbnail

New Cyberattack Wave Targets Albanian Parliament, Telecom

Data Breach Today

Mobile Network Provider and National Flag Carrier Also Targeted Albania's Parliament and a telecom service provider faced cyberattacks on Christmas day, according to the Albanian National Authority for Electronic Certification and Cyber Security. Iranian hackers called Homeland Justice have claimed responsibility for the latest wave of attacks.

Security 278
article thumbnail

Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network

Security Affairs

A Lockbit ransomware attack against the German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) caused service disruptions at three hospitals. German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) announced it has suffered service disruptions at three hospitals (Bielefeld, Rheda-Wiedenbrück, and Herford) after a Lockbit ransomware attack.

article thumbnail

U.K. Government 'Ill-Prepared' to Deal With High Risk of Catastrophic Ransomware Attacks

KnowBe4

A new report from the U.K. government’s Joint Committee on the National Security Strategy (JCNSS) outlines both just how likely an attack on critical national infrastructure is and where they are vulnerable.

article thumbnail

The Most Dangerous People on the Internet in 2023

WIRED Threat Level

From Sam Altman and Elon Musk to ransomware gangs and state-backed hackers, these are the individuals and groups that spent this year disrupting the world we know it.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

SMTP Smuggling Technique Bypasses Email Authentications Establishing Legitimacy

KnowBe4

A newly-discovered technique misusing SMTP commands allows cybercriminals to pass SPF, DKIM and DMARC checks, empowering impersonated emails to reach their intended victim.

article thumbnail

Benefits of Mobile Device Management

Jamf

Discover the top benefits of Mobile Device Management. Streamline operations, enhance security, and save time with our expert insights on MDM solutions.

MDM 94
article thumbnail

So, Spotify knows how many hours I spent listening to Taylor Swift. But only I know why | Elle Hunt

The Guardian Data Protection

Every tech company from Monzo to my bank is crunching my data. All the results tell us is how dull it is to reduce human experience to numbers. How was my 2023? Pretty good, thanks. I spent 60 hours at my local cinema and 51 days listening to music from 170 genres (chiefly “art pop”). Plus, I made a respectable 46 transactions at M&S. How about you?

IT 69
article thumbnail

A Practical Guide to Good Password Hygiene

PerezBox

On December 2nd, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) reported that an Iran-linked hacking group had been targeting US critical infrastructure, specifically US Water Facilities. Two harsh realities made this hack possible. First, system misconfigurations allowed systems to be publicly accessible via the internet vs. limiting its access to their intranet.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

National (US) Archives Building declared a National Historic Landmark

IG Guru

Check out the link to the post here. The post National (US) Archives Building declared a National Historic Landmark first appeared on IG GURU.

article thumbnail

Sergeant Dennis Fisher and Marine Corps Combat Photography in Vietnam

Unwritten Record

Camera slate taken April 13, 1968 during Operation No Name II. Courtesy of Sergeant Dennis Fisher. As a photographer, you know what it takes to make a good picture but doing it under combat conditions challenges everything you have ever learned. Sergeant Dennis Fisher In April, the Still Picture Branch was fortunate enough to welcome Sergeant Dennis Fisher, along with his wife Mary and daughter Julie, into our research room in College Park, Maryland.

article thumbnail

Operation Triangulation attacks relied on an undocumented hardware feature

Security Affairs

Experts discovered that Operation Triangulation targeting Apple iOS devices leveraged an undocumented hardware feature. Researchers from the Russian cybersecurity firm Kaspersky discovered that threat actors behind the Operation Triangulation exploited an undocumented hardware feature to target Apple iOS devices. In early June, Kaspersky uncovered a previously unknown APT group that is targeting iOS devices with zero-click exploits as part of a long-running campaign dubbed Operation Triangul

article thumbnail

AI and Lossy Bottlenecks

Schneier on Security

Artificial intelligence is poised to upend much of society, removing human limitations inherent in many systems. One such limitation is information and logistical bottlenecks in decision-making. Traditionally, people have been forced to reduce complex choices to a small handful of options that don’t do justice to their true desires. Artificial intelligence has the potential to remove that limitation.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.