Wed.Mar 13, 2024

article thumbnail

Hackers Hiding Keylogger, RAT Malware in SVG Image Files

Data Breach Today

New Campaign Evades Security Tools to Deliver Agent Tesla Keylogger and XWorm RAT Threat actors are using image files or Scalable Vector Graphics files to deliver ransomware, download banking Trojans or distribute malware. The campaign uses an open-source tool, AutoSmuggle, to facilitate the delivery of malicious files through SVG or HTML files.

article thumbnail

There Are Dark Corners of the Internet. Then There's 764

WIRED Threat Level

A global network of violent predators is hiding in plain sight, targeting children on major platforms, grooming them, and extorting them to commit horrific acts of abuse.

Security 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts Say CISA's Software Attestation Form Lacks Key Parts

Data Breach Today

Form Does Not Include Mandates for Memory-Safe Programming Requirements, SBOMs Experts told ISMG a final version of the Cybersecurity and Infrastructure Security Agency's self-attestation form for federal software providers takes bold steps to ensure new technologies are made with "secure by design" principles but lacks critical components that should come in future versions.

article thumbnail

Fortinet fixes critical bugs in FortiOS, FortiProxy, and FortiClientEMS

Security Affairs

Fortinet released security updates to address critical code execution vulnerabilities in FortiOS, FortiProxy, and FortiClientEMS. Fortinet this week has released security updates to fix critical code execution vulnerabilities in FortiOS, FortiProxy, and FortiClientEMS. The first vulnerability is an out-of-bounds write issue, tracked as CVE-2023-42789 (CVSS score 9.3), it can be exploited to execute unauthorized code or commands by sending specially crafted HTTP requests to vulnerable devices.

Security 122
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

EU Parliament Approves the Artificial Intelligence Act

Data Breach Today

Act Will Be the World's First Comprehensive and Binding Regulation for AI The European Parliament on Wednesday approved the Artificial Intelligence Act, completing a penultimate step to enacting the world's first comprehensive AI regulation. The act needs final signoff from the European Council, which is expected by May.

More Trending

article thumbnail

Chinese Cybercrime: Discretion Is the Better Part of Valor

Data Breach Today

Repeat Crackdowns Drive Criminals to Embrace Foreign-Made Encrypted Messaging Apps Criminals in China increasingly keep a low profile on public-facing forums and rely on Telegram and other encrypted foreign messaging apps to discreetly coordinate their activities or sell wares, according to a new report charting how the Chinese cybercrime ecosystem continues to evolve.

article thumbnail

Acer Philippines disclosed a data breach after a third-party vendor hack

Security Affairs

Acer Philippines disclosed a data breach after employee data was leaked by a threat actor on a hacking forum. Acer Philippines confirmed that employee data was compromised in an attack targeting a third-party service provider. In our commitment to full transparency, we wish to inform you of a recent security incident involving a third-party vendor managing employee attendance data. pic.twitter.com/SXDeZ3I27B — Acer Philippines (@AcerPhils) March 12, 2024 Acer Inc. is a Taiwanese multinatio

article thumbnail

The Critical Role of Effective Onboarding

Data Breach Today

How Your Onboarding Process Can Help Improve Retention and Human Risk Mitigation A robust onboarding program is a comprehensive process that integrates new hires into the organizational culture, aligns them with company values and equips them with the necessary skills and knowledge to perform their roles effectively. Onboarding affects organizational culture and turnover rates.

Risk 280
article thumbnail

Stanford University announced that 27,000 individuals were impacted in the 2023 ransomware attack

Security Affairs

Threat actors behind the ransomware attacks that hit Stanford University in 2023 gained access to 27,000 people. Stanford University confirmed that threat actors behind the September 2023 ransomware attack had access to 27,000 people. The prestigious US university was the victim of a ransomware attack carried out by the Akira ransomware group. The Akira ransomware gang claimed the theft of 430 GB of data from the university’s systems.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Canada Sentences LockBit Hacker Mikhail Vasiliev to 4 Years

Data Breach Today

Dual Canadian-Russian National Also Agrees to US Extradition LockBit ransomware affiliate Mikhail Vasiliev on Tuesday received a nearly four-year prison sentence in Canada and consented to extradition to the United States, where he faces charges of conspiracy to commit computer intrusion. He must also pay CA$860,000 in restitution to his Canadian victims.

article thumbnail

Compromised Credentials Postings on the Dark Web Increase 20% in Just One Year

KnowBe4

Data trends show a clear upward momentum of posts from initial access brokers on the dark web, putting the spotlight on what may become cybersecurity’s greatest challenge.

Access 111
article thumbnail

The Concentrated Cyber Risk Posed by Enormous Vendors

Data Breach Today

The vast healthcare ecosystem disruption caused by the recent attack on Change Healthcare, which affected more than 100 of the company's IT products and services, underscores the concentrated cyber risk when a major vendor suffers a serious cyber incident, said Keith Fricke, partner at tw-Security.

Risk 276
article thumbnail

AI-Driven Voice Cloning Tech Used in Vishing Campaigns

KnowBe4

Scammers are using AI technology to assist in voice phishing (vishing) campaigns, the Better Business Bureau (BBB) warns. Generative AI tools can now be used to create convincing imitations of people’s voices based on very small audio samples.

Phishing 103
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Will Cybersecurity Get Its 1st New Unicorn Since June 2022?

Data Breach Today

Data Security Startup Cyera Seeks to Raise $150M to $200M at a Valuation of $1.55B Cyera is raising between $150 million and $200 million in a new funding round that would value the Silicon Valley-based data security startup at as much as $1.55 billion. The funding talks come just nine months after Cyera closed a $100 million Series B round at a reported $500 million valuation.

article thumbnail

[Security Masterminds] The Art of Defending Against Social Engineering in the Age of AI: Insights from Rachel Tobac

KnowBe4

Social engineering attacks can seem unpredictable and challenging to defend against. However, with the right approach, organizations can better protect themselves.

Security 102
article thumbnail

Feds Launch Investigation into Change Healthcare Attack

Data Breach Today

HHS OCR Tells UnitedHealth Group it Will Scrutinize Co.'s HIPAA Compliance Federal regulators have informed UnitedHealth Group that they have launched a full-fledged investigation into a potential massive compromise of protected health information stemming from the Change Healthcare cyberattack. A potential PHI breach could affect tens of millions of individuals.

article thumbnail

Burglars Using Wi-Fi Jammers to Disable Security Cameras

Schneier on Security

The arms race continues, as burglars are learning how to use jammers to disable Wi-Fi security cameras.

Security 129
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Schneider Electric and Mitsubishi Give Nozomi Networks $100M

Data Breach Today

Investment Signals Confidence in Nozomi's Cyber Tools for Critical Infrastructure Nozomi Networks notched a $100 million funding round led by Schneider Electric and Mitsubishi, spotlighting the urgent need for advanced cybersecurity measures to protect critical infrastructure, industrial control systems and IoT networks in light of the increased destructiveness of attacks.

IoT 263
article thumbnail

European Parliament Approves the AI Act

Hunton Privacy

On March 13, 2024, the European Parliament adopted the AI Act by a majority of 523 votes in favor, 461 votes against, and 49 abstentions. The AI Act will introduce comprehensive rules to govern the use of AI in the EU, making it the first major economic bloc to regulate this technology. The European Council is now expected to formally endorse the final text of the AI Act in April 2024.

article thumbnail

Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws via The Hacker News

IG Guru

Check out the article here. The post Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws via The Hacker News first appeared on IG GURU.

article thumbnail

Comprehensive Guide to Scanning Medical Records

Armstrong Archives

In 2001, just 18% of U.S.-based physicians were using electronic medical record (EMR) or electronic health record (EHR) systems. As of 2021, that figure has soared to 88%. Healthcare organizations across the nation have embraced EHRs, largely thanks to their ability to reduce staff burnout and increase efficiency. While many healthcare documents are now digital, care providers still have millions of paper files that need to be digitized.

Paper 52
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What is threat prevention?

Jamf

Attackers are always threatening your cybersecurity. Read this blog to learn what threat prevention is, some types of threats and how to defend against them.

article thumbnail

HID Connects Podcast Season 2 Episode 3: What is the Potential of Biometrics, Really?

HID Global

Biometrics are part of our everyday lives, even if we don’t realize it. You’ll learn why in this podcast episode.

IT 59
article thumbnail

What is application management?

Jamf

Application management is a vital part of effective device and security management in business. But how can it enhance productivity, security, and user satisfaction? And how does an Apple admin keep all of these cards in the air?

article thumbnail

Cloud Network Security with Agility and Scale on a Platform

Data Breach Today

Rigdon and Henry of Palo Alto Networks on Power of Software Firewalls Agility, scale and consumption - these are three business benefits brought to cloud network security by Palo Alto Networks Software Firewalls. Tiffany Henry and Katherine Rigdon of Palo Alto Networks showcase these features and the value of finding them all on a single platform.

Cloud 244
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Porn Sites Need Age-Verification Systems in Texas, Court Rules

WIRED Threat Level

The US Court of Appeals for the 5th Circuit has vacated an injunction against an age-verification requirement to view internet porn in Texas.

Privacy 81
article thumbnail

How to Win in the Short Message eDiscovery Game: Review Near-Native; Produce as Documents

eDiscovery Daily

Since the inception of legal processes in ancient societies, documents have been pivotal in evidence and discovery. In recent years, with the rise of email and electronically stored information (ESI), technology companies have standardized review and production processes around these data, converting them into the standard source of discovery: documents.

article thumbnail

AI will change the world—the terms are up to us

IBM Big Data Hub

IBM at the B7 We are living in a watershed moment for AI: the European Parliament has just voted on the EU AI Act, which will regulate and govern the use and implications of this technology. In turn, governments and enterprises are getting ready to set their own standards around AI. AI featured in the G7 Ministerial Meeting in Verona, Italy, and in conversations happening in parallel in the Business Federations gatherings, or B7.