Fri.Aug 18, 2023

article thumbnail

Using AI to Separate the Good Signals From the Bad

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Oliver Tavakoli, CTO at Vectra AI, discusses ways that discriminative AI technology can filter out all of the noise from the massive volume of alerts from a portfolio of cybersecurity tools.

article thumbnail

Security in small business with Jamf Now

Jamf

Is your Small or Medium-sized Business (SMB) protected against cyber threats? Safeguard your organization's sensitive data and assets with Jamf Now. Read now and enhance your SMB's cybersecurity posture.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CrowdStrike, Google, Recorded Future Lead Threat Intel Wave

Data Breach Today

Kaspersky Falls From Leaderboard as Deliberate Decision Made to Nix Russian Firms Recorded Future has joined CrowdStrike and Google atop Forrester's external threat intelligence services rankings, while Kaspersky tumbled from the leaders category. Leading threat intelligence providers have expanded into adjacent use cases such as brand protection and vulnerability management.

246
246
article thumbnail

WinRAR flaw enables remote code execution of arbitrary code

Security Affairs

A flaw impacting the file archiver utility for Windows WinRAR can allow the execution of commands on a computer by opening an archive. WinRAR is a popular file compression and archival utility for Windows operating systems. The utility is affected by a now-fixed high-severity vulnerability, tracked as CVE-2023-40477 (CVSS score 7.8), that can allow remote execution of arbitrary code on a computer by opening a crafted RAR archive.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

ISMG Editors: Lessons Learned From the Lapsus$ Crime Group

Data Breach Today

Also: Highlights from BlackHat 2023; Latest Cybersecurity M&A Activity In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues including highlights of interviews at Black Hat 2023, lessons learned from the success of the Lapsus$ cybercrime group's attacks and why Check Point is buying startup Perimeter 81 for $490 million.

More Trending

article thumbnail

North Korea Nabs $200M in Crypto Theft So Far In 2023

Data Breach Today

DPRK Hackers Likely Won't Match 2022 Record But Remain Formidable Thieves North Korea is on track to have a middling year of cryptocurrency theft despite Pyongyang's constant demand for ready cash. Hackers deployed by the totalitarian regime have stolen $200 million in cryptocurrency this year, far less than the country's banner year of cryptocurrency theft in 2022.

245
245
article thumbnail

#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into Pacific

Security Affairs

#OpFukushima: The famous collective Anonymous has launched cyberattacks against Japan nuclear websites over Fukushima water plan. The hacker collective Anonymous has launched cyberattacks against nuclear power-linked groups in Japan as part of an operation called #OpFukushima. The campaign was launched to protest against the Government’s plan to release the treated radioactive water from the Fukushima nuclear plant into the sea.

article thumbnail

BlackCat Ransomware Variant Incorporates Impacket, RemCom

Data Breach Today

Version Uses Open-Source Communication Framework Tool for Lateral Movement Microsoft identified a new variant of BlackCat ransomware malware that uses an open-source communication framework tool to facilitate lateral movement. BlackCat, also known as Alphv, is a Russian-speaking criminal group suspected of being a successor to DarkSide and BlackMatter.

article thumbnail

Bloomberg Reports: Stealth QR Code Phishing Attack On Major US Energy Company

KnowBe4

During my two years as the CEO of a Public Company , Bloomberg became one of my go-to sources for financial news. I am still subscribed and today found an interesting story from Drake Bennett in New York.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Mass Phishing Campaign Targets Zimbra Users Worldwide

Data Breach Today

Targets Include Small and Medium Businesses and Government Agencies Threat actors are on a phishing spree targeting users of Zimbra Collaboration email suite, in particular small and medium businesses and government agencies. Security firm Eset on Thursday revealed the ongoing campaign, writing that the hackers behind it have been active since at least April.

Phishing 234
article thumbnail

Bots Are Better than Humans at Solving CAPTCHAs

Schneier on Security

Interesting research: “ An Empirical Study & Evaluation of Modern CAPTCHAs “: Abstract: For nearly two decades, CAPTCHAS have been widely used as a means of protection against bots. Throughout the years, as their use grew, techniques to defeat or bypass CAPTCHAS have continued to improve. Meanwhile, CAPTCHAS have also evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots (machines) and humans.

IT 83
article thumbnail

Applying cyber resilience to DORA solutions

IBM Big Data Hub

The Digital Operational Resilience Act , or DORA, is a European Union (EU) regulation that created a binding, comprehensive information and communication technology (ICT) risk-management framework for the EU financial sector. DORA establishes technical standards that financial entities and their critical third-party technology service providers must implement in their ICT systems by January 17, 2025.

Cloud 82
article thumbnail

Massive phishing campaign targets users of the Zimbra Collaboration email server

Security Affairs

A massive social engineering campaign is targeting users of the Zimbra Collaboration email server to steal their login credentials. ESET researchers uncovered a mass-spreading phishing campaign targeting users of the Zimbra Collaboration email server since April 2023. Zimbra Collaboration is an open-core collaborative software platform. The campaign is still ongoing and is targeting a wide range of small and medium businesses and governmental entities.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tel Aviv Stock Exchange CISO: Making Better Use Of Your SIEM

Dark Reading

If rule writing for SIEMs isn't managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team.

IT 79
article thumbnail

Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspects

Security Affairs

An international law enforcement operation across 25 African countries has led to the arrest of 14 cybercriminals. A coordinated law enforcement operation conducted by INTERPOL and AFRIPOL across 25 African countries has led to the arrest of 14 suspected cybercriminals and the identification of 20,674 suspicious cyber networks. The operation demonstrates the surge in cybercriminal activities in the region.

Sales 82
article thumbnail

Time To Address What’s Undermining SaaS Security, AppOmni Says

Dark Reading

In this Dark Reading News Desk segment, Brendan O'Connor, CEO and Co-Founder of AppOmni describes some of the biggest security challenges for securing software-as-a-service (SaaS) applications.

article thumbnail

Oregon Enacts Comprehensive Consumer Data Privacy Law

Data Matters

On July 18, 2023, Oregon joined the growing league of states that have passed a comprehensive data privacy framework. Signed into law by Gov. Tina Kotek, the Oregon Consumer Privacy Act (the Act), or SB 619 , is the product of a multi-year effort by the state Consumer Privacy Task Force formed by Oregon Attorney General Ellen F. Rosenblum, comprising 150 consumer privacy experts from various industries.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

African Cybercrime Operations Shut Down in Law Enforcement Operation

Dark Reading

Interpol- and Afripol-led crackdown disrupts cybercrime ecosystem responsible for some $40 million in losses to victims.

87
article thumbnail

Hurricane Hilary Heading Toward Southern California

National Archives Records Express

Hurricane Hilary has rapidly intensified into a Category 4 storm and is headed toward Southern California and the Southwestern United States. Hilary is expected to produce rainfall amounts of 3 to 6 inches, with isolated maximum amounts up to 10 inches, across portions of the Baja California Peninsula through Sunday night. Flash flooding, locally significant, will be possible.

article thumbnail

CISA Committee Tackles Remote Monitoring and Management Protections

Dark Reading

CISA's public-private partnership produces RMM strategies to shore up critical infrastructure and to educate the MSPs that provide remote access to them.

article thumbnail

Lord Clark calls for freedom of information review after data breaches

The Guardian Data Protection

Leading author of FoI Act says system weakened by government and civil servants’ resistance to openness A leading author of the UK Freedom of Information Act has called for a parliamentary review into the system after serious data breaches by police forces in responses to FoI requests. The call by Lord Clark of Windermere, designer of New Labour’s 1998 proposals that laid the groundwork for the law , comes after accusations that Rishi Sunak’s government is failing to disclose information under t

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Expand Your Definition of ‘Endpoint,’ Get a Better Handle On Cloud Threats

Dark Reading

In this Dark Reading News Desk segment, Sysdig's Anna Belak discusses how the boom in cloud services and applications expanded the definition of what constitutes an endpoint.

Cloud 67
article thumbnail

NIST Drafts Major Update to Its Widely Used Cybersecurity Framework

IG Guru

Check out the press release here. The post NIST Drafts Major Update to Its Widely Used Cybersecurity Framework first appeared on IG GURU.

article thumbnail

App Security Posture Management Improves Software Security, Synopsys Says

Dark Reading

In this Dark Reading News Desk segment, Jim Ivers and Natasha Gupta of Synopsys discuss application security posture management and software consolidation.

article thumbnail

Speak up - taking a first-time Conference opportunity

CILIP

Connecting town and gown through the library CILIP Conference 2023 landed in Birmingham in July, bring people together to discuss new developments, share ideas and make new connections. The main theme was leadership – but speakers and delegates did not always fit into a traditional notion of leadership. Instead. it was about recognising that anyone can be a leader, no matter what their job title.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Unveiling the Hidden Risks of Routing Protocols

Dark Reading

Neglecting security of Border Gateway Protocol (BGP) and other routing protocols has created multiple vulnerabilities that must be addressed.

Risk 73
article thumbnail

Friday Squid Blogging: Squid Brand Fish Sauce

Schneier on Security

Squid Brand is a Thai company that makes fish sauce : It is part of Squid Brand’s range of “personalized healthy fish sauces” that cater to different consumer groups, which include the Mild Fish Sauce for Kids and Mild Fish Sauce for Silver Ages. It also has a Vegan Fish Sauce. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

article thumbnail

Cyderes Dives In On Working Safely With AI and Upping Your IAM Game

Dark Reading

In this Dark Reading News Desk segment, Mike Wyatt and John Ayers of Cyderes discuss how artificial intelligence has already been weaponized against businesses and consumers.