Tue.Sep 24, 2024

article thumbnail

Will AI Hallucinations Get Worse?

Data Breach Today

Training AI With Synthetic Data Can Lead to Model Collapse Using facts to train artificial intelligence models is getting tougher, as companies run out of real-world data. AI-generated synthetic data is touted as a viable replacement, but experts say this may exacerbate hallucinations, which are already a big pain point of machine learning models.

article thumbnail

GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator

The Last Watchdog

Ever since the massive National Public Data (NPD) breach was disclosed a few weeks ago, news sources have reported an increased interest in online credit bureaus, and there has been an apparent upswing in onboarding of new subscribers. Related: Class-action lawsuits pile up in wake of NPD hack So what’s the connection? NPD reported the exposure of over 2.7 billion records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Startup Torq Secures $70M to Advance Hyperautomation with AI

Data Breach Today

Series C Funding to Fuel Generative AI Integration and AI-Powered Threat Detection The funding will enhance generative AI technologies that streamline security operations and provide autonomous threat investigation, alongside plans for broader U.S. and European market penetration.

Security 170
article thumbnail

DOL Confirms Cybersecurity Guidance Applies to All Employee Benefit Plans

Data Matters

The U.S. Department of Labor (DOL) published Compliance Assistance Release No. 2024-01 on September 6, 2024. The release, titled “Cybersecurity Guidance Update,” clarifies that the cybersecurity guidance the DOL issued in April 2021 applies to all employee benefit plans, including health and welfare plans. The DOL states that since the guidance was published, service providers have told plan fiduciaries and Employee Benefits Security Administration (EBSA) investigators that the guidance applie

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Redefining the Supply Chain in the Post-AI Era

Data Breach Today

How to Navigate the New Challenges and Opportunities AI has enabled supply chains to become more proactive and predictive. Through machine learning algorithms, natural language processing and advanced analytics, organizations can now forecast demand with greater accuracy, anticipate potential disruptions and optimize inventory management in real time.

Analytics 161

More Trending

article thumbnail

China Accuses Taiwan of Waging Cyberwarfare

Data Breach Today

Spy Agency Says Taiwanese Defense Ministry Is Trying to Disrupt Chinese Politics China's Ministry of State Security has accused a Taiwanese government agency of waging cyberattacks on the mainland's digital assets across multiple organizations and running disinformation campaigns on social media to disrupt the political system and sow social discord.

article thumbnail

I replaced my Bose with the Nothing Open - now I only want to run with them on

Collaboration 2.0

The $149 Nothing Open earbuds have quickly become my favorite for exercise, thanks to their lightweight fit and great sound.

94
article thumbnail

FBI, US Homeland Security Investigate Water Facility Cyberattack

Data Breach Today

No Disruption to Service; Manual Operations Implemented FBI and U.S. Department of Homeland Security officials are in Arkansas City, Kansas, to investigate a cyberattack at the city's water treatment facility. "There has been no disruption to service. Out of caution, the Water Treatment Facility has switched to manual operations," said the city manager.

Security 161
article thumbnail

A cyberattack on MoneyGram caused its service outage

Security Affairs

American peer-to-peer payments and money transfer company MoneyGram confirmed that a cyberattack caused its service outage. American interstate and international peer-to-peer payments and money transfer company MoneyGram confirmed that its services are currently unavailable due to a cyberattack. On September 22, the company informed its customers that it was experiencing a network outage impacting connectivity to a number of our systems.

IT 77
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Octo2 Malware Masquerades as Popular Apps

Data Breach Today

Android Poses as NordVPN, Google Chrome in Europe A new version of the Octo Android malware is spreading across Europe, posing as legitimate apps such as NordVPN and Google Chrome. The latest iteration includes advanced anti-detection mechanisms and a domain generation algorithm for command-and-control communication.

article thumbnail

Google Photos adds one-tap video editing for faster clip sharing, thanks to AI

Collaboration 2.0

Along with making tools easier to access, Google is introducing new editing tools to save you time and effort while you create 'stunning' clips.

Access 86
article thumbnail

23andMe to Pay $30M for Credential Stuffing Hack Settlement

Data Breach Today

Millions of Customers Will Also Be Offered Monitoring of Genetic Data on Dark Web Genetics testing firm 23andMe will offer cash payments to millions of individuals whose sensitive data was compromised in a 2023 credential stuffing incident. Under the proposed $30 million lawsuit settlement, affected customers will also be offered dark web monitoring of their genetic data.

152
152
article thumbnail

Russia-Backed Media Outlets Are Under Fire in the US—but Still Trusted Worldwide

WIRED Threat Level

The US government says outlets like RT work closely with Russian intelligence, and platforms have removed or banned their content. But they’re still influential all around the world.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Robert Herjavec Passes Cyderes CEO Role to Chris Schueler

Data Breach Today

Herjavec of 'Shark Tank' Steps Down After 21 Years in Charge, Remains Board Member "Shark Tank" TV star and company founder Robert Herjavec is stepping down as CEO of Cyderes, making way for Simeio CEO Chris Schueler to assume the role Oct. 1. Schueler has a strong background in identity management, and Herjavec will remain involved as an investor and board member.

141
141
article thumbnail

This Linux distro poses its own challenges, but power-users will love it

Collaboration 2.0

NixOS is a rock-solid OS with a unique approach and an array of functionalities -- despite a bit of a learning curve.

IT 93
article thumbnail

CrowdStrike Blames 'Confluence of Factors' for Global Outage

Data Breach Today

CrowdStrike Executive Testifies on Faulty Update That Caused Historic July Outage Adam Meyers, senior vice president for counter adversary operations at CrowdStrike, told lawmakers Tuesday the company suffered a global outage in July after its decade-old validation and testing processes failed to identify an "unexpected discrepancy" in the updated threat detection configurations.

IT 141
article thumbnail

McAfee Discovers New Phishing Campaign Targeting GitHub Users

KnowBe4

A phishing campaign is targeting GitHub users with phony CAPTCHA pages, according to researchers at McAfee. The phishing emails ask users to address a security vulnerability in a GitHub repository that they recently contributed to, and contain a link to find more information about the alleged vulnerability. This link leads to a fake CAPTCHA page that attempts to trick them into installing malware.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

The fall of Intel: How gen AI helped dethrone a giant and transform computing as we know it

Collaboration 2.0

The once venerable x86 chip has been pushed aside by scalable, energy-efficient, AI-optimized architectures from Arm, Nvidia, and Qualcomm. Here's what happens next.

IT 97
article thumbnail

What Is EDR in Cyber Security: Overview & Capabilities

eSecurity Planet

Endpoint detection and response (EDR) is an advanced safety system for detecting, investigating, and resolving cyber attacks on endpoints. It examines incidents, inspects behavior, and restores systems to their pre-attack state. EDR uses artificial intelligence, machine learning, and threat intelligence to dodge recurrences, allowing IT teams to neutralize attacks through threat hunting, behavioral analytics, and containment.

article thumbnail

I tested the iPhone 16 and iPhone 16 Plus - and they left me with no Pro-model envy at all

Collaboration 2.0

Adding more utility, better cameras, and color may just be enough to cover the standard iPhone 16's shortcomings.

84
article thumbnail

New Android banking trojan Octo2 targets European banks

Security Affairs

A new version of the Android banking trojan Octo, called Octo2, supports improved features that allow to takeover infected devices. ThreatFabric researchers discovered a new version of the Android banking trojan Octo, called Octo2, that supports more advanced remote action capabilities needed for Device Takeover attacks. The new malware has already targeted users in European countries, including Italy, Poland, Moldova, and Hungary.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Why copilots and low-code apps portend a security nightmare

Collaboration 2.0

A typical enterprise has 80,000 apps built outside of the traditional development lifecycle, and 62% have vulnerabilities, a new study finds. Here's how to fix this.

article thumbnail

CyberheistNews Vol 14 #39 [EYE OPENER] Beyond Analysts: The Undeniable Leadership We Have in HRM

KnowBe4

CyberheistNews Vol 14 #39 [EYE OPENER] Beyond Analysts: The Undeniable Leadership We Have in HRM

78
article thumbnail

iOS 18 bug complaints abound online - here are the top glitches reported

Collaboration 2.0

Show-stopping iOS 18 bugs, so far, have been thankfully rare. Here's what to do if you encounter one of these minor annoyances.

78
article thumbnail

Announcing Web Protection for Jamf Now

Jamf

Jamf Now continues to add simplified, powerful functionality to increase value and support the changing needs of businesses — all while maintaining a focus on ease of use and streamlined workflows. We continue to extend the value of management and security for organizations by announcing Web Protection for Jamf Now.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Does your iPhone have enough space for Apple Intelligence? How to find out

Collaboration 2.0

Storage requirements will grow as more of Apple's AI-powered features roll out. Here's how much space Apple Intelligence will require on your iPhone or iPad to start.

86
article thumbnail

How to Overcome Unconscious Bias in the Workplace

IT Governance

Have you noticed that certain people in your workplace are treated differently? It could be a result of unconscious bias. Unconscious bias refers to assumptions and beliefs that people develop due to their personal preferences and past experiences. It’s linked to several discriminatory behaviours, such as unequal pay and racial prejudice, but it can also appear in more subtle ways.

article thumbnail

Google Workspace users just got a big AI freebie - Gemini

Collaboration 2.0

Business, Enterprise, and Frontline users will get access to Gemini for work with security protections at no extra cost. Here's how.

Access 64