Wed.Dec 20, 2023

article thumbnail

Comcast Ties Breach Affecting 36M Customers to Citrix Bleed

Data Breach Today

Attackers Apparently Stole Authenticated Sessions to Hit Telecommunications Giant Comcast says attackers stole personal information pertaining to 35.9 million customers of its Xfinity-branded TV, internet and home telephone services in an October attack that targeted a vulnerability - dubbed Citrix Bleed - present in NetScaler and Citrix networking equipment.

article thumbnail

Google addressed a new actively exploited Chrome zero-day

Security Affairs

Google has released emergency updates to address a new actively exploited zero-day vulnerability in the Chrome browser. Google has released emergency updates to address a new zero-day vulnerability, tracked as CVE-2023-7024, in its web browser Chrome. The flaw has been addressed with the release of version 120.0.6099.129 for Mac,Linux and 120.0.6099.129/130 for Windows which will roll out over the coming days/weeks.

Libraries 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Plans to Improve Threat Data-Sharing Approaches in 2024

Data Breach Today

US Cyber Agency to Begin 2-Year Major Overhaul of Its Legacy AIS Program The Cybersecurity and Infrastructure Security Agency announced plans to launch a two-year effort beginning in 2024 to modernize its legacy Automated Indicator Sharing program as part of an effort to enhance collaboration with the private sector and provide more actionable data to its partners.

article thumbnail

Sophisticated JaskaGO info stealer targets macOS and Windows

Security Affairs

JaskaGO is a new Go-based information stealer malware that targets both Windows and Apple macOS systems, experts warn. Researchers from AT&T Alien Labs uncovered a previously undetected Go-based information stealer dubbed JaskaGO that targets Windows and macOS systems. JaskaGO is a sophisticated malware that supports an extensive array of commands and can maintain persistence in different ways.

Passwords 141
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FTC Bans Rite Aid From Using Facial Recognition Tech

Data Breach Today

5-Year Ban Comes After Retailer Failed to Mitigate Security Surveillance Risks The Federal Trade Commission has banned Rite Aid from using AI-based facial recognition technology for security surveillance for five years after the retail drug store chain failed to implement safeguards such as mitigating risks for inaccurate outputs based on race and gender.

Retail 295

More Trending

article thumbnail

NIST Seeks Public Comment on Guidance for Trustworthy AI

Data Breach Today

Agency Calls for Information on Gen AI Risk Management, Red-Teaming Efforts The U.S. National Institute of Standards and Technology is soliciting public guidance on implementation of an October White House executive order seeking safeguards for artificial intelligence. The order directed the agency to establish guidelines for developers of AI to conduct red-teaming tests.

article thumbnail

Law enforcement Operation HAECHI IV led to the seizure of $300 Million

Security Affairs

An international law enforcement operation, named HAECHI IV, led to the arrest of approximately 3,500 suspects and the seizure of roughly $300 million worth of assets. Interpol this week announced that an international law enforcement operation, named HAECHI IV, led to the arrest of approximately 3,500 suspects and the seizure of roughly $300 million worth of assets.

Sales 134
article thumbnail

UK Supreme Court Says AI Can't Patent Inventions

Data Breach Today

Court Says Only a 'Person' Can Be an Inventor The U.K.'s highest court on Wednesday affirmed that an artificial intelligence system cannot be granted ownership of patents. AI "is not a person, let alone a natural person and it did not devise any relevant invention," wrote Justice David Kitchin.

article thumbnail

“Mr. Anon” Infostealer Attacks Start with a Fake Hotel Booking Query Email

KnowBe4

This new attack is pretty simple to spot on the front, but should it be successful in launching its’ malicious code, it’s going to take its’ victims for everything of value they have on their computer.

IT 126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

GCHQ Christmas Codebreaking Challenge

Schneier on Security

Looks like fun. Details here.

121
121
article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

Attack surface management (ASM) is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation (BAS) and applies them to an organization’s entire IT environment, from networks to the cloud. That makes ASM’s ambitions much greater than legacy vulnerability management tools.

Cloud 112
article thumbnail

How to build a successful hybrid cloud strategy

IBM Big Data Hub

Hybrid cloud has become the IT infrastructure of choice, providing the interoperability and portability organizations need to access data where and when they need it. Yet navigating the complexities of building and managing a hybrid environment poses unique challenges. To capture the most value from hybrid cloud, business and IT leaders must develop a solid hybrid cloud strategy supporting their core business objectives.

Cloud 93
article thumbnail

Sam McNicholls-Novoa on CyberComply

IT Governance

Making compliance easy with our Cloud-based solution CyberComply is a Cloud-based, end-to-end solution that simplifies compliance with a range of cyber security and data privacy standards and laws, including ISO 27001 , the GDPR (General Data Protection Regulation), and more. This SaaS (Software as a Service) will help you manage all your cyber security and data privacy obligations in one place.

GDPR 86
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

2024 Tech and Cybersecurity Forecast: Navigating New Frontiers in Business

Thales Cloud Protection & Licensing

2024 Tech and Cybersecurity Forecast: Navigating New Frontiers in Business madhav Thu, 12/21/2023 - 05:15 People always want to comprehend what the future brings. Ancient Greeks, for example, were famous for consulting with Oracle before making a crucial decision. The same is true for today’s business leaders. In an era where technology evolves at a blistering pace, business leaders must stay ahead of the curve. 2024 promises to be a pivotal year, bringing transformative advancements and new cha

article thumbnail

Five machine learning types to know

IBM Big Data Hub

Machine learning (ML) technologies can drive decision-making in virtually all industries, from healthcare to human resources to finance and in myriad use cases, like computer vision , large language models (LLMs), speech recognition, self-driving cars and more. However, the growing influence of ML isn’t without complications. The validation and training datasets that undergird ML technology are often aggregated by human beings, and humans are susceptible to bias and prone to error.

Retail 73
article thumbnail

ICO Publishes Response to UK Data Protection and Digital Information Bill

Hunton Privacy

On December 18, 2023, the updated response from UK Information Commissioner John Edwards to the Data Protection and Digital Information (No 2) Bill (the “Bill”) was published on the website of the Information Commissioner’s Office (ICO). The Commissioner’s original response was published in March 2023. In the latest response, the Commissioner states that he is “pleased to note that government made some changes…in response to my comments,” specifically with regards the definition of “vexatious re

GDPR 72
article thumbnail

How to build a successful AI strategy

IBM Big Data Hub

Artificial intelligence (AI) is a transformative force. The automation of tasks that traditionally relied on human intelligence has far-reaching implications, creating new opportunities for innovation and enabling businesses to reinvent their operations. By giving machines the growing capacity to learn, reason and make decisions, AI is impacting nearly every industry, from manufacturing to hospitality, healthcare and academia.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The GenAI-driven contact center revolution

OpenText Information Management

Contact center agents are the linchpin between organizations and their clientele. As the demand for exceptional customer service continues to rise in the total experience economy, managing the agent experience becomes paramount. This is where Agent Experience Management (AXM), as a discipline, steps in, employing techniques to optimize every facet of agents’ professional lives.

article thumbnail

Business strategy examples

IBM Big Data Hub

A successful business strategy dictates the allocation of resources and outlines how a company will achieve its strategic goals. Whether the organization is focused on developing new products or marketing an existing service to an under-served demographic, having a solid strategy will help an organization realize its long-term goals. Typically, a strategy will be informed by core business objectives and keep key performance indicators (KPIs) in mind.

article thumbnail

OpenText named a Leader in IDC MarketScape: Worldwide Strategic Portfolio Management and IT Project and Portfolio Management 2023-2024 Vendor Assessment

OpenText Information Management

We are excited to announce that OpenText was named a Leader in IDC MarketScape: Strategic Portfolio Management and IT Project and Portfolio Management 2023-2024 Vendor Assessment (doc # US49436523, December 2023). The IDC MarketScape evaluated Strategic Portfolio Management (SPM) and IT Project and Portfolio Management (PPM) vendors , providing expert insights into the strengths and … The post OpenText named a Leader in IDC MarketScape: Worldwide Strategic Portfolio Management and IT Proje

IT 64
article thumbnail

Unlocking success: Key components of a winning customer experience strategy

IBM Big Data Hub

Customer experience strategy (CX strategy) is when organizations optimize customer engagements to create happy customers, drive customer loyalty and help to recruit new customers. Providing a better customer experience takes into consideration the entire customer journey and every customer touch-point. It identifies new customers through awareness, consideration, and purchase, aims to retain customers, and drives word-of-mouth through the post-purchase phase.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

‘Twas the night before Christmas… An OpenText Voltage Poem

OpenText Information Management

‘Twas the night before Christmas, when all through the house A hacker was stirring, and clicking his mouse; The stockings were hung by the chimney with care, In hopes that St. Nicholas soon would be there. The security team were snug in their beds, While visions of SOCs and encryption danced in their heads; And the CISO in her … The post ‘Twas the night before Christmas… An OpenText Voltage Poem appeared first on OpenText Blogs.

article thumbnail

Getting the most out of IBM Cloud VPC images

IBM Big Data Hub

Images are used to create instances on IBM Cloud VPC. Depending on your needs, you can select a stock image, a custom image or a catalog image. What are stock images? A stock image is the out-of-the-box operating system customized for IBM Cloud VPC environments. It is used to deploy virtual servers or bare metal servers using different architecture types.

Cloud 61
article thumbnail

Adding Structure to AI Harm via Georgetown University

IG Guru

Check out the article here. The post Adding Structure to AI Harm via Georgetown University first appeared on IG GURU.

Privacy 49
article thumbnail

How to update a style in LibreOffice to reflect changes in your document

Collaboration 2.0

If you regularly alter styles you use in LibreOffice, the software has a handy trick up its sleeve to make this considerably easier.

IT 40
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

IT Transformation: How to Create a Sustainable IT landscape

Docuware

IT departments are currently facing major challenges such as new market demands, new regulations and an unpredictable economy. The result: overworked employees with ever-lengthening to-do lists, a lack of effective prioritization, an inability to respond quickly to new user requirements and outdated software. So, it's high time for an IT transformation -- because only those companies that consistently implement innovative solutions will be able to keep up with the competition in the long term.

IT 26