Wed.Dec 13, 2023

article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

Notable progress was made in 2023 in the quest to elevate Digital Trust. Related: Why IoT standards matter Digital Trust refers to the level of confidence both businesses and consumers hold in digital products and services – not just that they are suitably reliable, but also that they are as private and secure as they need to be. We’re not yet at a level of Digital Trust needed to bring the next generation of connected IT into full fruition – and the target keeps moving.

article thumbnail

Ransomware Groups' Latest Tactic: Weaponized Marketing

Data Breach Today

'Oxygen of Publicity' Helps Intimidate Victims and Recruit Affiliates, Experts Warn Seeking to maximize profits no matter the cost, ransomware groups have been bolstering their technical prowess and psychological shakedowns with a fresh strategy: attempting to control the narrative. Experts are warning security researchers and journalists to beware being co-opted.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Reaches Historical Agreement on AI Act

Data Matters

On 8 December 2023 — following three days of lengthy and intensive negotiations — EU legislators reached political agreement on the world’s first stand-alone law regulating AI: the EU’s AI Act. The EU considers the AI Act as one of its key pieces of legislation and fundamental to ensuring the EU becomes the world’s leading digital economy. The EU aims for the AI Act to have the same ‘Brussels effect’ as the GDPR — in other words, to have a significant impact on global markets and practices.

GDPR 164
article thumbnail

FCC Approves Major Updates to Data Breach Notification Rules

Data Breach Today

New FCC Disclosure Rules Cover All Personal Information of Telecom Customers The FCC approved new guidelines that note how data breaches "have only grown in frequency and severity" since the commission adopted its privacy protection policies 16 years ago. The new rules aim to provide customers and law enforcement with real-time information about critical security incidents.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China-linked APT Volt Typhoon linked to KV-Botnet

Security Affairs

Researchers linked a sophisticated botnet, tracked as KV-Botnet, to the operation of the China-linked threat actor Volt Typhoon. The Black Lotus Labs team at Lumen Technologies linked a small office/home office (SOHO) router botnet, tracked as KV-Botnet to the operations of China-linked threat actor Volt Typhoon. The botnet is comprised of two complementary activity clusters, the experts believe it has been active since at least February 2022.

More Trending

article thumbnail

December 2023 Microsoft Patch Tuesday fixed 4 critical flaws

Security Affairs

Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products, including a zero-day. Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products. The vulnerabilities addressed by the company impact Microsoft Windows and Windows Components; Office and Office Components; Azure, Microsoft Edge (Chromium-based); Windows Defender; Windows DNS and DHCP server; and Microsoft Dynamic.

Security 130
article thumbnail

UK in No Rush to Legislate AI, Technology Secretary Says

Data Breach Today

Government Currently Focused on Assessing AI Risks, Fostering Innovation The U.K. government is in no rush to legislate artificial intelligence, Secretary of State for Science, Innovation and Technology Michelle Donelan said on Wednesday, warning that a hard regulatory approach to AI could risk stifling innovation in this emerging sector of the economy.

article thumbnail

OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks

Security Affairs

Microsoft warns that threat actors are using OAuth applications cryptocurrency mining campaigns and phishing attacks. Threat actors are using OAuth applications such as an automation tool in cryptocurrency mining campaigns and other financially motivated attacks. The attackers compromise user accounts to create, modify, and grant high privileges to OAuth applications to carry out malicious activity and maintain access to applications even if they lose access to the initially compromised account.

Mining 132
article thumbnail

Ukraine Fingers Russian Military Hackers for Kyivstar Outage

Data Breach Today

Telecom Operator Slowly Restores Voice Service Ukraine's domestic security agency on Wednesday fingered Russian military hackers as being responsible for hacking Kyivstar, in a statement acknowledging damage to the telecom operator's digital infrastructure. Ukraine's top telecom operator was the target of a Tuesday cyberattack.

Military 266
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK Home Office is ignoring the risk of ‘catastrophic ransomware attacks,’ report warns

Security Affairs

A Joint Committee on the National Security Strategy (JCNSS) warns of the high risk of a catastrophic ransomware attack on the UK government. The British government is accused of failing to mitigate the risk of ransomware attacks. According to a parliamentary report published by the Joint Committee on the National Security Strategy (JCNSS) the UK government can face a ‘catastrophic ransomware attack at any moment.’ The report highlighted the superficial approach to cyber security of S

article thumbnail

Microsoft Warns of OAuth Attacks Tied to Cryptomining

Data Breach Today

Microsoft Details OAuth Tactics, Says Losses Reached Up to $1.5M Per Victim Hackers are exploiting OAuth applications to compromise user accounts, manipulate and confer elevated privileges, and set up cryptomining operations, which has cost some organizations up to $1.5 million in losses, according to Microsoft's Threat Intelligence team.

262
262
article thumbnail

Phishing Remains the Most Common Attack Technique, With Malicious URL Use Increasing 144%

KnowBe4

Analysis of nearly a year’s worth of emails brings insight into exactly what kinds of malicious content are being used, who’s being impersonated, and who’s being targeted.

Phishing 119
article thumbnail

Lawmakers Urge HHS to Shield Pharmacy Records From Police

Data Breach Today

Regulators Advised to Protect Patients From 'Warrantless' Requests on Prescriptions Three members of Congress are urging the Department of Health and Human Services to improve HIPAA privacy protections around pharmacy information. The request comes after the lawmakers asked major pharmacy companies how they handle law enforcement requests for patient records.

Privacy 252
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Set Up a VLAN in 12 Steps: Creation & Configuration

eSecurity Planet

Setting up a virtual local area network (VLAN) can be a complicated process, especially if you’re operating a large enterprise network, a network with legacy or hybrid architectures, or a network with specific workloads that require additional security and regulatory compliance safeguards. Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps — particularly steps five through eight — may be completed simultan

Access 109
article thumbnail

2023 Fraud Highlights: Check Fraud, Scams, Account Takeover

Data Breach Today

Jack Henry's Rene Perez on How to Tackle Check Fraud as Tactics Change Check fraud, scams and account takeovers dominated the fraud landscape in 2023. Banks and other financial institutions are expected to continue to struggle with account takeovers as fraudsters have changed their modus operandi, making it difficult to track fraudulent proceeds.

IT 248
article thumbnail

Sophos backports fix for CVE-2022-3236 for EOL firewall firmware versions due to ongoing attacks

Security Affairs

Sophos backports the patch for CVE-2022-3236 for end-of-life (EOL) firewall firmware versions due to ongoing attacks exploiting the issue. Sophos backports the fix for the critical code injection vulnerability CVE-2022-3236 for end-of-life (EOL) firewall firmware versions after discovering that threat actors are actively exploiting the flaw in attacks in the wild.

Security 127
article thumbnail

Surveillance by the US Postal Service

Schneier on Security

This is not about mass surveillance of mail , this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves : To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, hid a camera inside one of the targeted blue post boxes which captured the suspect’s full face as they allegedly helped themselves to swathes of peoples’ mail.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Hacker Group Linked to Russian Military Claims Credit for Cyberattack on Kyivstar

WIRED Threat Level

A hacker group calling itself Solntsepek—previously linked to Russia’s notorious Sandworm hackers—says it carried out a disruptive breach of Kyivstar, a major Ukrainian mobile and internet provider.

Military 103
article thumbnail

The three main types of cryptography

IBM Big Data Hub

Derived from the Greek words for “hidden writing,” cryptography is the science of obscuring transmitted information so that it may only be read by the intended recipient. The applications of cryptography are endless. From the quotidian end-to-end message authentication on WhatsApp to the practical digital signatures on legal forms or even the CPU-draining ciphers used for mining cryptocurrency , cryptography has become an essential aspect of our digital world and a critical cybersecu

article thumbnail

Undercover Threat: North Korean Operatives Infiltrate U.S. Companies Through Job Platforms

KnowBe4

Researchers at Nisos warn that North Korean threat actors are impersonating skilled job seekers in order to obtain remote employment at US companies.

Security 107
article thumbnail

Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty

Thales Cloud Protection & Licensing

Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty madhav Thu, 12/14/2023 - 05:18 Earlier this year, Oracle launched its External Key Management Service with Hold Your Own Key (HYOK) functionality from Thales. Oracle’s initiatives include the EU Sovereign Cloud service as well as Distributed Cloud Services such as Oracle Alloy and Dedicated Region – Cloud at Customer solutions.

Cloud 83
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

How To Fight Long-Game Social Engineering

KnowBe4

CISA sent out a warning about a Russian advanced persistent threat (APT) called Star Blizzard warning about their long-game social engineering tactics.

Phishing 106
article thumbnail

Ransomware Sanctions: Do They Have Any Impact?

Thales Cloud Protection & Licensing

Ransomware Sanctions: Do They Have Any Impact? madhav Thu, 12/14/2023 - 05:37 Ransomware is one of the most high-profile and high-value cybercrimes that organizations need to watch out for. These attacks have the potential to cause significant financial, operational, and reputational damage to a company: bad actors cut off access to vital systems, ransoms demanded can be in the millions of dollars, and paying the ransom doesn’t guarantee a resolution.

article thumbnail

The three main types of cryptography

IBM Big Data Hub

Derived from the Greek words for “hidden writing,” cryptography is the science of obscuring transmitted information so that it may only be read by the intended recipient. The applications of cryptography are endless. From the quotidian end-to-end message authentication on WhatsApp to the practical digital signatures on legal forms or even the CPU-draining ciphers used for mining cryptocurrency , cryptography has become an essential aspect of our digital world and a critical cybersecu

article thumbnail

Better data drives better AI results

OpenText Information Management

You: Ice, as an expert AI guide, what do you believe is the most important thing to do to prepare for AI? Ice: If I had to name one thing it would be to get your data ready. The expression “Garbage in, garbage out” applies here—if your data hasn’t been well managed to ensure it’s … The post Better data drives better AI results appeared first on OpenText Blogs.

IT 69
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Seven customer service types that organizations should provide

IBM Big Data Hub

Conducting the best customer service strategy today requires organizations to invest in several customer service types. This way, organizations can ensure their customer base receives answers to their problems in the format they prefer. Customer service is an integral part of the customer experience. It has increasingly become an omnichannel discipline where every customer prefers to communicate on varying channels.

article thumbnail

Top 6 predictions for the Public Sector in 2024

OpenText Information Management

In many ways, the year 2023 seems like a table-setter for a seismic 2024. We have two escalating regional wars with global impact, an economy that can’t seem to find its footing, and a looming U.S. presidential election that seems inevitably headed toward a rematch of two leaders with historically low levels of popularity. Added … The post Top 6 predictions for the Public Sector in 2024 appeared first on OpenText Blogs.

article thumbnail

How to build a successful procurement strategy

IBM Big Data Hub

The role of procurement extends beyond transactional activities. A procurement strategy allows an organization to navigate an increasingly complex global supply chain, adapt swiftly to market fluctuations, and achieve cost optimization, operational efficiency and growth. By assessing and proactively managing risks inherent in the supply chain , organizations can shield themselves from disruptions and strengthen the resilience of their operations.