Fri.Oct 11, 2024

article thumbnail

Hackers Prowling For Unencrypted BIG-IP Cookies, Warns CISA

Data Breach Today

Agency Says Cookies Could Help Attackers Find Network Assets, Vulnerabilities Unencrypted cookies tied to a suite of secure gateway technology from F5 are gateways for hackers to reach internal devices on corporate networks, warns the Cybersecurity and Infrastructure Security Agency. BIG-IP uses persistent cookies as a traffic load-balancing convenience.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

Passwordless Authentication without Secrets! divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel frustrated with frequent password resets. This highlights an increasing demand for advanced authentication methods like passkeys and multi-factor authentication (MFA), which provide robust security for most use cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond Proof of Concepts: Will Gen AI Live Up to the Hype?

Data Breach Today

How Gen AI Is Evolving From Experimentation to Driving Major Business Impact As gen AI moves from hype to reality, 30% of projects are predicted to be abandoned after the proof-of-concept phase. Despite gen AI's enormous potential to boost revenue and productivity and reduce costs, organizations must perform a thorough assessment before committing to large-scale investments.

258
258
article thumbnail

Iran and China-linked actors used ChatGPT for preparing attacks

Security Affairs

OpenAI disrupted 20 cyber and influence operations in 2023, revealing Iran and China-linked actors used ChatGPT for planning ICS attacks. OpenAI announced the disruption of over 20 cyber and influence operations this year, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks.

Phishing 115
article thumbnail

The Tumultuous IT Landscape is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Rhysida Leaks Nursing Home Data, Demands $1.5M From Axis

Data Breach Today

Ransomware Gang Could Have Axis Health's Mental Health, Drug Abuse Records Ransomware gang Rhysida is threatening to dump data on the dark web that belongs to a Colorado provider of mental health, substance abuse and other healthcare services unless it pays nearly $1.5 million. The group is leaking records it claims to have stolen from a Mississippi nursing home.

More Trending

article thumbnail

DOD Unveils Final CMMC Rule for Defense Contractors

Data Breach Today

New Cybersecurity Maturity Model Certification Rule Paves Way for Implementation The Department of Defense is set to implement significant changes to the Cybersecurity Maturity Model Certification program, effective October 15, streamlining compliance for contractors by introducing a tiered system while enhancing security standards.

article thumbnail

Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks

Security Affairs

Sophos reports ransomware operators are exploiting a critical code execution flaw in Veeam Backup & Replication. Sophos researchers warn that ransomware operators are exploiting the critical vulnerability CVE-2024-40711 in Veeam Backup & Replication to create rogue accounts and deploy malware. In early September 2024, Veeam released security updates to address multiple vulnerabilities impacting its products, the company fixed 18 high and critical severity flaws in Veeam Backup & Repl

article thumbnail

Regulating AI Catastophic Risk Isn't Easy

Data Breach Today

AI, Security Experts Discuss Who Defines the Risks, Mitigation Efforts An attempt by the California statehouse to tame the potential of artificial intelligence catastrophic risks hit a roadblock when Governor Gavin Newsom vetoed the measure late last month. One obstacle is lack of a widely-accepted definition for "catastrophic" AI risks.

Risk 217
article thumbnail

GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution

Security Affairs

GitLab issued updates for CE and EE to address multiple flaws, including a critical bug allowing CI/CD pipeline runs on unauthorized branches. GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE) to address multiple vulnerabilities, including a critical bug, tracked as CVE-2024-9164 (CVSS score of 9.6), allowing CI/CD pipeline runs on unauthorized branches. “An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, st

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

ISMG Editors: Chinese Hackers Raise Stakes in Cyberespionage

Data Breach Today

Also: AI Safety Bill Vetoed, Global Ransomware Response Guide Gets Some Revisions In the latest weekly update, ISMG editors discussed the implications of the U.S. investigation into Chinese hackers targeting telecom wiretap systems, the catastrophic risks of AI and the recent veto of an AI safety bill in the U.S., and the latest global ransomware response guidance.

article thumbnail

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

KnowBe4

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions.

article thumbnail

More on My AI and Democracy Book

Schneier on Security

In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are hard at work writing. At this point, we would like feedback on titles. Here are four possibilities: Rewiring Democracy: How AI Will Transform our Politics, Government, and Citizenship The Thinking State: How AI Can Improve Democracy Better Run: How AI Can Make our Politics, Government, Citizenship More Efficient, Effective and Fair AI a

article thumbnail

Trinity Ransomware Targets the Healthcare Sector

KnowBe4

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

IronNet Has Shut Down

Schneier on Security

After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time while still in the military. That always troubled me. Whatever ideas he had, they were developed on public time using public resources: he shouldn’t have been able to leave military service with them in his back pocket.

article thumbnail

Microsoft blocked your Windows 11 upgrade? This just-released tool can get the job done

Collaboration 2.0

A new version of the popular Rufus utility once again bypasses Microsoft's strict hardware compatibility requirements for Windows 11 upgrades. But the way it's implemented might make some people nervous.

IT 98
article thumbnail

Indian Fishermen Are Catching Less Squid

Schneier on Security

Fishermen in Tamil Nadu are reporting smaller catches of squid. Blog moderation policy.

80
article thumbnail

Ham radio is alive and well - and still a lifeline in disasters

Collaboration 2.0

When disaster strikes, and conventional communication systems fail, amateur ham radio operators step in to bridge the gap, providing a crucial link between those in affected areas and the outside world.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Self Service+: Empowering Productivity and Security through a Unified App Experience

Jamf

Truly delighting end users with genuinely helpful apps tailored to their needs is the focus of Sam Allcock, Director of Product Management and Kyle Hammond, Principal Software Engineer at Jamf at JNUC 2024.

article thumbnail

Where AI avatars are at your service 24/7

Collaboration 2.0

In South Korea, DeepBrain AI's hyper-realistic avatars are playing a variety of roles - store clerk, bank teller, tutor, even financial analyst. Exactly how is that working out so far?

98
article thumbnail

How and When to Responsibly Dispose of Healthcare Documents

Record Nations

Today, effective management and disposal of healthcare documents are vital. They ensure efficiency, compliance, and data security in healthcare. Healthcare facilities manage vast amounts of sensitive data, including patient records and billing documents. As facilities grow, so do their document archives. That’s why it’s essential to regularly review, organize, and dispose of outdated or unnecessary.

article thumbnail

The Samsung tablet I most recommend is not a flagship - and it's still available for sale for October Prime Day

Collaboration 2.0

The Galaxy Tab S9 FE and S9 FE+ are excellent large-screen tablets for work and play. During Amazon's post-Big Deal Days sales event, you can buy the Galaxy Tab S9 FE+ for over $80 off.

Sales 75
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The Importance of Data Fidelity in Healthcare and How to Achieve it

Record Nations

The current healthcare landscape requires facilities to create and store more data than ever before. The enormous amount of patient health records, diagnostic imaging, and lab results involved in the average day can be overwhelming. This data could collectively transform care delivery, but it’s also a challenge to manage effectively. One of the most pressing.

IT 40
article thumbnail

Jackery's updated solar generator boasts better battery and massive price cut

Collaboration 2.0

Right now, you can save up to $900 on the Explorer 2000 v2. Jackery's compact LiFePO4-powered backup power unit is perfect for in-home use, camping, and outdoor work tasks.

75
article thumbnail

Digitech Systems Launches Next-Gen Information Management

Info Source

Sys.tm ® Ends File Frustration and Digital Chaos Greenwood Village, CO– October 2, 2024 –As the pace of business becomes more frantic, companies are working harder than ever to manage and secure their business information. Many are falling behind. Today, Digitech Systems announced the availability of Sys.tm , a flexible information management platform for digital transformation and office automation that allows users to effectively manage files, share documents, and secure data.

ECM 40
article thumbnail

The best QLED TV I've tested isn't from Samsung or LG, and it's still available for $500 off at Amazon

Collaboration 2.0

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. Right now, during the post-Prime Day sale, you can get the 65-inch model for just $1,000 on Amazon.

Sales 74
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

What’s next for Kodak Alaris after Kingswood Capital acquisition?

Info Source

By Ralph Gammon, Senior Analyst at Infosource Kodak Alaris, a global leader in document scanners and Capture software, has been acquired by Los Angeles-based private equity firm, Kingswood Capital. The deal is the culmination of an initiative to sell the business, announced by the UK’s Pension Protection Fund (PPF) in April 2023. Kingswood, which recently raised a $1.5 billion fund and now has more than $3.2 billion in total assets under its management, focuses on buyouts of middle-market busi

Sales 40
article thumbnail

The best smart TV VPNs of 2024: Expert tested and reviewed

Collaboration 2.0

These are the best VPNs compatible with your smart TV. The right VPN will help you stream safely and access your content libraries without drastically impacting your speed.

article thumbnail

Managed software updates make Apple patch management easier

Jamf

Apple patch management and macOS and iOS upgrades just got much easier to manage. Learn how to deliver a seamless end-user experience during updates.

40