Tue.Jan 23, 2024

article thumbnail

Medical Lab Database Exposed 1.3M Records, COVID Test Info

Data Breach Today

Researcher Reported Configuration Issue to Cloud Vendor After Lab Failed to Respond An unsecured database appearing to belong to a Netherlands-based medical laboratory exposed 1.3 million records on the internet, including COVID test results and other personal identifiable information, said a security researcher who discovered the trove and reported his findings to the company.

Cloud 298
article thumbnail

Navigating Your Career Path with Challenges and Supports

AIIM

I love information management! I love the information governance, records management, and data governance fields. Most of my family and friends think I’m crazy and I would agree with them. This work doesn’t excite everyone. I didn’t always use to be in this field though. Before entering the information management field, I spent 25 years in higher education.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia, US, UK Sanction Russian Over 2022 Medibank Breach

Data Breach Today

Governments Accuse Aleksandr Ermakov and REvil of Being Medibank Hackers The United States, Australia and the United Kingdom sanctioned a Russian man the governments say was behind the October 2022 hacking of Medibank, Australia's largest private health insurer. The attack was a high point in a wave of data breaches buffeting the country that year.

Insurance 296
article thumbnail

HP CEO Says They Brick Printers That Use Third-Party Ink Because of … Hackers

WIRED Threat Level

The company says it wants to protect you from “viruses.” Experts are skeptical.

IT 145
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Malicious Traffic Distribution System Spotted by Researchers

Data Breach Today

Cybercrime Groups Hire VexTrio to Help Route Victims to Their Malicious Content As if the cybercrime ecosystem wasn't already damaging enough, security researchers have discovered a malicious traffic broker named VexTrio, which affiliates hire to route victims to their malicious content that is often disguised via fake dating site profiles, tech support or browser updates.

Security 291

More Trending

article thumbnail

UK Intelligence Agency Warns of Mounting AI Cyberthreat

Data Breach Today

British Lawmakers Call on Government to Boost Protections From AI Scams Generative artificial intelligence-enabled ransomware and nation-state hacks in the United Kingdom are "almost certainly" likely to surge after this year, the National Cyber Security Center warned. And British lawmakers called on the government to roll out measures to prevent AI scams.

article thumbnail

CISA adds VMware vCenter Server bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds VMware vCenter Server Out-of-Bounds Write bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a VMware vCenter Server Out-of-Bounds Write bug, tracked as CVE-2023-34048 , to its Known Exploited Vulnerabilities (KEV) catalog. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

IT 141
article thumbnail

Silverfort Plans Platform Expansion With $116M Funding Round

Data Breach Today

Israel-Based Cybersecurity Startup Announces Impressive Series D Fundraising Haul Silverfort, the Israel-based cybersecurity startup that claims to have built "the world's first unified identity threat protection platform," announced an impressive fundraising haul that the CEO told ISMG will be used to further invest in its identity protection platform.

article thumbnail

Australian government announced sanctions for Medibank hacker

Security Affairs

The Australian government announced sanctions for a member of the REvil ransomware group for the Medibank hack that occurred in 2022. The Australian government announced sanctions for Aleksandr Gennadievich Ermakov (aka GustaveDore, aiiis_ermak, blade_runner, JimJones), a Russian national who is a member of the REvil ransomware group. The man is responsible for the cyber attacks that in 2022 hit the Australian insurance provider Medibank. “This morning I can announce that Australia has use

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AI Automation Won't Steal All Jobs, for Now

Data Breach Today

Study Looks at Impact of AI on Tasks Requiring Visual Processing Artificial intelligence may not steal our jobs just yet, but only because humans are currently cheaper to employ. Many of the human jobs that could be replaced with AI are not "economically beneficial" to automate - at least for now - say researchers at MIT.

article thumbnail

LoanDepot data breach impacted roughly 16.6 individuals

Security Affairs

Financial services company LoanDepot disclosed a data breach that impacted roughly 16.6 million individuals. LoanDepot is a financial services company that primarily operates as a mortgage lender. It is one of the largest nonbank lenders in the United States. The company provides a range of mortgage and non-mortgage loan products and services. LoanDepot disclosed this week a data breach that impacted roughly 16.6 million individuals.

article thumbnail

CISA's Jen Easterly Confirms 'Harrowing' Swatting Attack

Data Breach Today

US Cyber Agency Director Is Latest High-Profile Target of Dangerous Swatting Attack The director of the U.S. Cybersecurity and Infrastructure Security Agency confirmed she was the apparent target of a swatting attack in which police responded to false calls of a shooting at her Virginia residence on Dec. 30, 2023. In a statement, Easterly described the experience as "harrowing.

article thumbnail

Watch out, a new critical flaw affects Fortra GoAnywhere MFT

Security Affairs

Fortra addressed a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) product. Fortra warns customers of a new authentication bypass vulnerability tracked as CVE-2024-0204 (CVSS score 9.8), impacting the GoAnywhere MFT (Managed File Transfer) product. Fortra GoAnywhere Managed File Transfer is a comprehensive solution for secure file transfer, data encryption, and compliance management.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Hackers Used SIM Swapping to Breach US SEC X Account

Data Breach Today

Hackers Spread Fake News About SEC Approving Spot Bitcoin Exchange-Traded Fund It wasn't a sophisticated hack on Jan. 9 that allowed hackers to briefly take control of an official U.S. Securities and Exchange Commission social media account, the agency said Monday. The hackers simply scammed the account's mobile phone provider in a SIM swap attack.

Security 272
article thumbnail

Side Channels Are Common

Schneier on Security

Really interesting research: “ Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.” Abstract: We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression.

IT 120
article thumbnail

What Should Be on Your AI Wishlist for eDiscovery: Insights from Dave Ruel, VP of Product at Hanzo

Hanzo Learning Center

In the rapidly evolving world of Artificial Intelligence (AI), it's crucial for enterprises to adopt technologies that integrate seamlessly into mission-critical workflows. Understanding the practicalities of this integration, especially in the legal domain, is key. To delve deeper into this topic, I had the opportunity to speak with Dave Ruel, VP of Product at Hanzo.

article thumbnail

Unprecedented Cybersecurity Alert: 26 Billion Records Exposed in Mega Data Breach

KnowBe4

Cybernews just reported: In what appears to be a digital tsunami, a colossal data breach has surfaced, unveiling a staggering 26 billion records – a figure that's hard to even fathom.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

UK Government Publishes Draft Code of Practice on Cybersecurity Governance

Hunton Privacy

On January 23, 2024, the UK government announced that it published a draft Code of Practice on cybersecurity governance (the “Code”). The guidelines in the Code are intended to “help directors and senior leaders shore up their defences from cyber threats.” The Code has been designed in partnership with industry directors, cyber and governance experts, and the UK National Cyber Security Centre (NCSC), with a key focus to ensure that organizations have detailed plans in place to respond to and rec

article thumbnail

CyberheistNews Vol 14 #04 'Swatting' Becomes the Latest Extortion Tactic in Ransomware Attacks

KnowBe4

'Swatting' Becomes the Latest Extortion Tactic in Ransomware Attacks

article thumbnail

Procurement transformation: Why excellence matters

IBM Big Data Hub

Procurement departments tend to be less visible to many stakeholders than sales, operations or even finance departments, but the impact they have on everything from the bottom line to product quality and service delivery shouldn’t be overlooked, which is why “procurement excellence” is a worthy pursuit. Optimizing the procurement function can help deliver successful business outcomes, such as: 12–20% in sourcing/demand management savings 95% in improvement in compliance 3

B2B 86
article thumbnail

Reimagine work with Cloud Editions 24.1

OpenText Information Management

We, at OpenText, are leading the charge in innovative digital transformation, equipping our customers with essential tools to tackle today’s most complex business challenges. The next generation of innovation will be driven by artificial intelligence (AI) and built on information management. We’ve already taken flight with groundbreaking AI capabilities unveiled in Cloud Editions (CE) 23.4, … The post Reimagine work with Cloud Editions 24.1 appeared first on OpenText Blogs.

Cloud 64
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Retention Bytes: Understanding Commercial Drone Records and Data via IGMapware

IG Guru

Check out the article here. The post Retention Bytes: Understanding Commercial Drone Records and Data via IGMapware first appeared on IG GURU.

article thumbnail

High-volume, scalable, cloud BI service now available on OpenText Public Cloud

OpenText Information Management

Scalable cloud BI service now available In a recent release, we announced that you would soon be able to scale high-volume BI at lightning speed thanks to a new cloud BI service coming soon. Well, that time has come. With release 24.1, OpenText Magellan BI and Reporting – Public Cloud is now available as a … The post High-volume, scalable, cloud BI service now available on OpenText Public Cloud appeared first on OpenText Blogs.

Cloud 64
article thumbnail

AI set to transform business – but risks must be addressed

Information Matters

Artificial intelligence is rapidly progressing from a promising technology to an integral part of business, changing how humans and machines interact. With recent advances in AI like chatbots powered by Read more The post AI set to transform business – but risks must be addressed appeared first on Information Matters - Where AI Meets Knowledge Management.

Risk 52
article thumbnail

OpenText Introduces New ‘COBOL Webinar Wednesdays’ Series 

OpenText Information Management

If mainframe and COBOL are at the heart of your operations, breaking the bounds of mainframe architecture to scale and innovate at speed can seem daunting. Fortunately, you can accelerate your digital transformation journey while staying agile in today’s fast-paced multi-cloud world.  Starting Wednesday, January 24, 2024, OpenText’s Application Modernization experts will launch the first … The post OpenText Introduces New ‘COBOL Webinar Wednesdays’ Series appeared first on OpenText Blogs.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Harnessing the Potential of AI to Drive Business Growth

Information Matters

A recent BCG survey of over 1,400 C-suite executives worldwide reveals that while 89% rank AI and generative AI (GenAI) as a top-three priority for 2024, most companies have yet Read more The post Harnessing the Potential of AI to Drive Business Growth appeared first on Information Matters - Where AI Meets Knowledge Management.

52
article thumbnail

OpenText expands delivery for private generative AI

OpenText Information Management

Cloud (SaaS) and off-cloud SMAX customers can elevate user experiences and cut support costs with OpenText™ IT Operations Aviator. Generative AI Generative AI is a trending topic in ITOps. As Harvard Business Review put it, “AI won’t replace humans—but humans with AI will replace humans without AI.” This quote caught my eye because it succinctly … The post OpenText expands delivery for private generative AI appeared first on OpenText Blogs.

Cloud 59
article thumbnail

Tracking the Pulse of Generative AI Adoption: Excitement and Opportunity Tempered by Uncertainty

Information Matters

A quarterly survey of over 2,800 AI leaders by Deloitte reveals persistent excitement about generative AI’s potential paired with uncertainty on managing emerging challenges. Key insights include: High expectations for Read more The post Tracking the Pulse of Generative AI Adoption: Excitement and Opportunity Tempered by Uncertainty appeared first on Information Matters - Where AI Meets Knowledge Management.

52