Wed.May 01, 2024

article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019. Infoblox researchers observed China-linked threat actors Muddling Meerkat using sophisticated DNS activities since 2019 to bypass traditional security measures and probe networks worldwide. The experts noticed a spike in activity observed in September 2023.

IT 351
article thumbnail

Correlating Cyber Investments With Business Outcomes

Data Breach Today

SecurityGate CEO Ted Gutierrez said the SEC's new cybersecurity mandates give "more teeth to the idea that cybersecurity is a business problem." He discussed the need for CISOs to link cyber risk and business outcomes and other ways in which the rules affect the field of cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A flaw in the R programming language could allow code execution

Security Affairs

A flaw in the R programming language enables the execution of arbitrary code when parsing specially crafted RDS and RDX files. A vulnerability, tracked as CVE-2024-27322 (CVSS v3: 8.8), in the R programming language could allow arbitrary code execution upon deserializing specially crafted R Data Serialization (RDS) or R package files (RDX). R is an open-source programming language widely used for statistical computing and graphics.

Metadata 337
article thumbnail

GitLab Hackers Use 'Forgot Your Password' to Hijack Accounts

Data Breach Today

US CISA Orders Federal Agencies to Apply January Patch The U.S. federal government's cybersecurity agency warned that hackers are exploiting a vulnerability in DevOps platform GitLab that was patched in January. The vulnerability allows hackers to use the "forgot your password" function to send a reset link to an attacker-controlled inbox.

Passwords 287
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Panda Restaurant Group disclosed a data breach

Security Affairs

Panda Restaurant Group disclosed a data breach that occurred in March, resulting in the theft of associates’ personal information. Panda Restaurant Group disclosed a data breach that occurred in March, resulting in the theft of personal information belonging to its associates. Panda Restaurant Group , Inc. is the parent company of Panda Inn, Panda Express and Hibachi-San.

More Trending

article thumbnail

Ex-NSA employee sentenced to 262 months for attempting to transfer classified documents to Russia

Security Affairs

A former U.S. NSA employee has been sentenced to nearly 22 years in prison for attempting to sell classified documents to Russia. Jareh Sebastian Dalke (32), of Colorado Springs, is a former employee of the U.S. National Security Agency (NSA) who has been sentenced to nearly 22 years (262 months) in prison for attempting to transmit classified National Defense Information (NDI) to Russia.

article thumbnail

Verizon DBIR: Cyber Defenders Are Facing Exploit Fatigue

Data Breach Today

Experts Warn That Human Failures Have Led to Surge in Successful Zero-Day Exploits Verizon executives warned that cyber defenders are struggling with fatigue amid a surge in cyberattacks targeting zero-day exploits and other vulnerabilities. It takes most enterprises nearly 55 days on average to mitigate 50% of critical vulnerabilities once patches become available, the DBIR says.

IT 278
article thumbnail

Cuttlefish malware targets enterprise-grade SOHO routers

Security Affairs

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data. Researchers at Lumen’s Black Lotus Labs discovered a new malware family, named Cuttlefish, which targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data from internet traffic.

article thumbnail

Corelight Gets $150M to Expand Detection, Improve Workflows

Data Breach Today

Series E Funding Round to Cover Future Operations, Enhance Product Innovation Corelight has secured $150 million on a $900 million valuation to support future growth and secure full independence. The Series E funds will be used to enhance the network detection and response vendor's product innovation, including expanded detection capabilities and improved security workflows.

Security 277
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

A Vast New Data Set Could Supercharge the AI Hunt for Crypto Money Laundering

WIRED Threat Level

Blockchain analysis firm Elliptic, MIT, and IBM have released a new AI model—and the 200-million-transaction dataset it's trained on—that aims to spot the “shape” of bitcoin money laundering.

article thumbnail

Lawmakers Grill UnitedHealth CEO on Change Healthcare Attack

Data Breach Today

UnitedHealth Group CEO Andrew Witty Explains the Steps the Company Is Taking Lawmakers on Wednesday grilled UnitedHealth Group CEO Andrew Witty over security lapses leading up to the Change Healthcare cyberattack and the company's handling of the incident, including the sectorwide disruption it caused and the compromise of millions of individuals' sensitive data.

Security 273
article thumbnail

Inside Ukraine’s Killer-Drone Startup Industry

WIRED Threat Level

Ukraine needs small drones to combat Russian forces—and is bootstrapping its own industry at home.

IT 199
article thumbnail

US and Allies Issue Cyber Alert on Threats to OT Systems

Data Breach Today

Cyber Authorities Warn Pro-Russian Hacktivists Targeting Small-Scale OT Systems U.S. and international cyber authorities issued a warning Wednesday that pro-Russian hacktivists are increasingly targeting small-scale operational technology systems throughout North America and Europe that have been left vulnerable to attacks due to internet-exposed industrial control systems.

273
273
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

AI Voice Scam

Schneier on Security

Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her.

article thumbnail

RSAC Fireside Chat: APIs are wondrous connectors — and the wellspring of multiplying exposures

The Last Watchdog

At the close of 2019, API security was a concern, though not necessarily a top priority for many CISOs. Related: GenAI ignites 100x innovation Then Covid 19 hit, and API growth skyrocketed, a trajectory that only steepened when Generative AI ( GenAI ) and Large Language Models ( LLMs ) burst onto the scene. As RSA Conference 2024 gets underway next week at San Francisco’s Moscone Center, dealing with the privacy and security fall out of those back-to-back disruptive developments will command a l

Cloud 130
article thumbnail

[CASE STUDY] Healthcare Organization Hardens Employee Defenses Against Insidious Callback Phishing Attacks

KnowBe4

A major U.S. healthcare provider significantly reduced their employees' susceptibility to callback phishing attacks after using KnowBe4's callback phishing simulation and training capabilities.

Phishing 119
article thumbnail

Maximizing ROI in security investments: The financial advantages of integrated solutions

Jamf

How Jamf maximizes ROI in security investments, providing cost-effective and efficient security solutions, prioritizing financial prudence alongside robust security

Security 104
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Navigating the Masquerade: Recognizing and Combating Impersonation Attacks

KnowBe4

With all great power, there comes an equal potential for misuse. Among the sophisticated arsenal of threat actors, impersonation attacks have surged to the forefront, which questions our sense of trust.

Security 119
article thumbnail

CDAOs: The new disruptors accelerating AI maturity and adoption

Collibra

As a Chief Data and Analytics Officer (CDAO) or Chief Data Officer (CDO), you stand at the forefront of transforming data into a strategic asset. However, with an average tenure of roughly two-and-a-half years, CDAOs and CDOs have the shortest tenures of any C-suite executives, according to a 2023 Deloitte study (1). For CDAOs to truly become disruptors, you need more time in the C-suite.

Analytics 101
article thumbnail

North Korean Threat Actors Target Software Developers With Phony Job Interviews

KnowBe4

Suspected North Korean threat actors are attempting to trick software developers into downloading malware during phony job interviews, according to researchers at Securonix.

118
118
article thumbnail

How generative AI will revolutionize supply chain 

IBM Big Data Hub

Unlocking the full potential of supply chain management has long been a goal for businesses that seek efficiency, resilience and sustainability. In the age of digital transformation, the integration of advanced technologies like generative artificial intelligence brings a new era of innovation and optimization. AI tools help users address queries and resolve alerts by using supply chain data, and natural language processing helps analysts access inventory, order and shipment data for decision-ma

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

OpenText recognized as a leader in continuous test automation platforms

OpenText Information Management

The OpenText continuous automation testing platform, acquired as Micro Focus in August 2022, was invited to participate in The Forrester Wave™: Continuous Automation Testing Platforms, Q4 2022. Forrester released the results of their 26-criterion evaluation of the 15 most significant continuous automation testing (CAT) vendors, and we have great news to share: the report recognizes the OpenText offering as a Leader.

article thumbnail

Google’s New Privacy Plan Has Flaws, Regulator Says in Internal Documents via The WSJ

IG Guru

Check out the article here. The post Google’s New Privacy Plan Has Flaws, Regulator Says in Internal Documents via The WSJ first appeared on IG GURU.

Privacy 75
article thumbnail

Introducing Top 6 New Features for Extended ECM for SAP SuccessFactors 24.2

OpenText Information Management

Are you ready to revolutionize the way you manage HR documents and processes? We're thrilled to announce the latest update of OpenText™ Extended ECM for SAP® SuccessFactors ® 24.2. Packed with exciting features and enhancements, this release is set to elevate your HR game to new heights! 1. AI Takes Flight: Gone are the days of manual searching through endless HR documents.

ECM 64
article thumbnail

IAM and Passkeys: 4 Steps Towards a Passwordless Future

Thales Cloud Protection & Licensing

IAM and Passkeys: 4 Steps Towards a Passwordless Future madhav Thu, 05/02/2024 - 05:07 In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) remains a vital link in the cybersecurity chain. However, with World Password Day just around the corner, there’s no time like the present to consider how relying on antiquated password systems leaves organizations exposed to vulnerabilities.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

OpenText Information Management

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of cybersecurity. While we don’t want to spoil the report (and strongly encourage everyone to give it a read) there are a few interesting findings that stood out. Before we delve into these findings, we want to celebrate a milestone: 2024 marks the 10th consecutive year that the OpenText ArcSight Intelligence™ team has contributed to

article thumbnail

My Experience at the Washington DC Masters Conference

eDiscovery Daily

By Rick Clark The Masters Conference in Washington, DC, on April 17th, 2024, was a bustling event with crowded sessions throughout the day. The agenda featured a diverse range of topics, such as Modern Data, Link Files, eDiscovery Case Law, and Artificial Intelligence, making it an exceptional experience for attendees. In this article, I will highlight my favorite takeaways from the sessions I attended, although the depth of insights was so rich that I must keep this summary brief.

article thumbnail

How AI is shaping the future of EDI

OpenText Information Management

Electronic Data Interchange (EDI) remains crucial to supply chain collaboration today. As with all other IT solutions, artificial intelligence (AI) developments shape the EDI world. Yet, while the technologies used for EDI connectivity continue to evolve, misconceptions and a general lack of understanding around EDI and B2B integration persist. EDI technology continues to evolve, but companies need to deal with a complex mix Over the several decades since companies implemented the first EDI con

B2B 59