Wed.May 01, 2024

article thumbnail

Verizon DBIR: Cyber Defenders Are Facing Exploit Fatigue

Data Breach Today

Experts Warn That Human Failures Have Led to Surge in Successful Zero-Day Exploits Verizon executives warned that cyber defenders are struggling with fatigue amid a surge in cyberattacks targeting zero-day exploits and other vulnerabilities. It takes most enterprises nearly 55 days on average to mitigate 50% of critical vulnerabilities once patches become available, the DBIR says.

IT 278
article thumbnail

RSAC Fireside Chat: APIs are wondrous connectors — and the wellspring of multiplying exposures

The Last Watchdog

At the close of 2019, API security was a concern, though not necessarily a top priority for many CISOs. Related: GenAI ignites 100x innovation Then Covid 19 hit, and API growth skyrocketed, a trajectory that only steepened when Generative AI ( GenAI ) and Large Language Models ( LLMs ) burst onto the scene. As RSA Conference 2024 gets underway next week at San Francisco’s Moscone Center, dealing with the privacy and security fall out of those back-to-back disruptive developments will command a l

Cloud 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Corelight Gets $150M to Expand Detection, Improve Workflows

Data Breach Today

Series E Funding Round to Cover Future Operations, Enhance Product Innovation Corelight has secured $150 million on a $900 million valuation to support future growth and secure full independence. The Series E funds will be used to enhance the network detection and response vendor's product innovation, including expanded detection capabilities and improved security workflows.

Security 275
article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019. Infoblox researchers observed China-linked threat actors Muddling Meerkat using sophisticated DNS activities since 2019 to bypass traditional security measures and probe networks worldwide. The experts noticed a spike in activity observed in September 2023.

IT 141
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

GitLab Hackers Use 'Forgot Your Password' to Hijack Accounts

Data Breach Today

US CISA Orders Federal Agencies to Apply January Patch The U.S. federal government's cybersecurity agency warned that hackers are exploiting a vulnerability in DevOps platform GitLab that was patched in January. The vulnerability allows hackers to use the "forgot your password" function to send a reset link to an attacker-controlled inbox.

Passwords 281

More Trending

article thumbnail

Correlating Cyber Investments With Business Outcomes

Data Breach Today

SecurityGate CEO Ted Gutierrez said the SEC's new cybersecurity mandates give "more teeth to the idea that cybersecurity is a business problem." He discussed the need for CISOs to link cyber risk and business outcomes and other ways in which the rules affect the field of cybersecurity.

article thumbnail

A flaw in the R programming language could allow code execution

Security Affairs

A flaw in the R programming language enables the execution of arbitrary code when parsing specially crafted RDS and RDX files. A vulnerability, tracked as CVE-2024-27322 (CVSS v3: 8.8), in the R programming language could allow arbitrary code execution upon deserializing specially crafted R Data Serialization (RDS) or R package files (RDX). R is an open-source programming language widely used for statistical computing and graphics.

Metadata 136
article thumbnail

Lawmakers Grill UnitedHealth CEO on Change Healthcare Attack

Data Breach Today

UnitedHealth Group CEO Andrew Witty Explains the Steps the Company Is Taking Lawmakers on Wednesday grilled UnitedHealth Group CEO Andrew Witty over security lapses leading up to the Change Healthcare cyberattack and the company's handling of the incident, including the sectorwide disruption it caused and the compromise of millions of individuals' sensitive data.

Security 265
article thumbnail

Cuttlefish malware targets enterprise-grade SOHO routers

Security Affairs

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data. Researchers at Lumen’s Black Lotus Labs discovered a new malware family, named Cuttlefish, which targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data from internet traffic.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Qantas Airways Says App Showed Customers Each Other's Data

Data Breach Today

Customers Report Seeing Each Other's Bookings, Inadvertent Flight Cancellations Australian's Qantas Airways has confirmed suffering a data breach after its app began inadvertently exposing other customers' data to each other. While the airline said no financial data was exposed, customers reported seeing other people's details, as well as unexpected flight cancellations.

article thumbnail

Ex-NSA employee sentenced to 262 months for attempting to transfer classified documents to Russia

Security Affairs

A former U.S. NSA employee has been sentenced to nearly 22 years in prison for attempting to sell classified documents to Russia. Jareh Sebastian Dalke (32), of Colorado Springs, is a former employee of the U.S. National Security Agency (NSA) who has been sentenced to nearly 22 years (262 months) in prison for attempting to transmit classified National Defense Information (NDI) to Russia.

article thumbnail

US and Allies Issue Cyber Alert on Threats to OT Systems

Data Breach Today

Cyber Authorities Warn Pro-Russian Hacktivists Targeting Small-Scale OT Systems U.S. and international cyber authorities issued a warning Wednesday that pro-Russian hacktivists are increasingly targeting small-scale operational technology systems throughout North America and Europe that have been left vulnerable to attacks due to internet-exposed industrial control systems.

252
252
article thumbnail

A Vast New Data Set Could Supercharge the AI Hunt for Crypto Money Laundering

WIRED Threat Level

Blockchain analysis firm Elliptic, MIT, and IBM have released a new AI model—and the 200-million-transaction dataset it's trained on—that aims to spot the “shape” of bitcoin money laundering.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

[CASE STUDY] Healthcare Organization Hardens Employee Defenses Against Insidious Callback Phishing Attacks

KnowBe4

A major U.S. healthcare provider significantly reduced their employees' susceptibility to callback phishing attacks after using KnowBe4's callback phishing simulation and training capabilities.

Phishing 109
article thumbnail

CDAOs: The new disruptors accelerating AI maturity and adoption

Collibra

As a Chief Data and Analytics Officer (CDAO) or Chief Data Officer (CDO), you stand at the forefront of transforming data into a strategic asset. However, with an average tenure of roughly two-and-a-half years, CDAOs and CDOs have the shortest tenures of any C-suite executives, according to a 2023 Deloitte study (1). For CDAOs to truly become disruptors, you need more time in the C-suite.

Analytics 101
article thumbnail

AI Voice Scam

Schneier on Security

Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her.

article thumbnail

Navigating the Masquerade: Recognizing and Combating Impersonation Attacks

KnowBe4

With all great power, there comes an equal potential for misuse. Among the sophisticated arsenal of threat actors, impersonation attacks have surged to the forefront, which questions our sense of trust.

Security 107
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Maximizing ROI in security investments: The financial advantages of integrated solutions

Jamf

How Jamf maximizes ROI in security investments, providing cost-effective and efficient security solutions, prioritizing financial prudence alongside robust security

Security 104
article thumbnail

North Korean Threat Actors Target Software Developers With Phony Job Interviews

KnowBe4

Suspected North Korean threat actors are attempting to trick software developers into downloading malware during phony job interviews, according to researchers at Securonix.

92
article thumbnail

OpenText recognized as a leader in continuous test automation platforms

OpenText Information Management

The OpenText continuous automation testing platform, acquired as Micro Focus in August 2022, was invited to participate in The Forrester Wave™: Continuous Automation Testing Platforms, Q4 2022. Forrester released the results of their 26-criterion evaluation of the 15 most significant continuous automation testing (CAT) vendors, and we have great news to share: the report recognizes the OpenText offering as a Leader.

article thumbnail

How generative AI will revolutionize supply chain 

IBM Big Data Hub

Unlocking the full potential of supply chain management has long been a goal for businesses that seek efficiency, resilience and sustainability. In the age of digital transformation, the integration of advanced technologies like generative artificial intelligence brings a new era of innovation and optimization. AI tools help users address queries and resolve alerts by using supply chain data, and natural language processing helps analysts access inventory, order and shipment data for decision-ma

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Inside Ukraine’s Killer-Drone Startup Industry

WIRED Threat Level

Ukraine needs small drones to combat Russian forces—and is bootstrapping its own industry at home.

IT 99
article thumbnail

IAM and Passkeys: 4 Steps Towards a Passwordless Future

Thales Cloud Protection & Licensing

IAM and Passkeys: 4 Steps Towards a Passwordless Future madhav Thu, 05/02/2024 - 05:07 In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) remains a vital link in the cybersecurity chain. However, with World Password Day just around the corner, there’s no time like the present to consider how relying on antiquated password systems leaves organizations exposed to vulnerabilities.

article thumbnail

Introducing Top 6 New Features for Extended ECM for SAP SuccessFactors 24.2

OpenText Information Management

Are you ready to revolutionize the way you manage HR documents and processes? We're thrilled to announce the latest update of OpenText™ Extended ECM for SAP® SuccessFactors ® 24.2. Packed with exciting features and enhancements, this release is set to elevate your HR game to new heights! 1. AI Takes Flight: Gone are the days of manual searching through endless HR documents.

ECM 64
article thumbnail

Google’s New Privacy Plan Has Flaws, Regulator Says in Internal Documents via The WSJ

IG Guru

Check out the article here. The post Google’s New Privacy Plan Has Flaws, Regulator Says in Internal Documents via The WSJ first appeared on IG GURU.

Privacy 82
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

OpenText Information Management

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of cybersecurity. While we don’t want to spoil the report (and strongly encourage everyone to give it a read) there are a few interesting findings that stood out. Before we delve into these findings, we want to celebrate a milestone: 2024 marks the 10th consecutive year that the OpenText ArcSight Intelligence™ team has contributed to

article thumbnail

The US government, privacy, and security – recent developments

Data Protection Report

The United States Federal Government is turning its attention to privacy and cybersecurity laws, and the result has been several recent legal developments that may have an impact on your business. Keeping up with these developments is not easy, so we’ve created a fun way to test your knowledge of the same: True or False: There is a bipartisan bill pending that would pre-empt state breach notification laws.

Privacy 45
article thumbnail

How AI is shaping the future of EDI

OpenText Information Management

Electronic Data Interchange (EDI) remains crucial to supply chain collaboration today. As with all other IT solutions, artificial intelligence (AI) developments shape the EDI world. Yet, while the technologies used for EDI connectivity continue to evolve, misconceptions and a general lack of understanding around EDI and B2B integration persist. EDI technology continues to evolve, but companies need to deal with a complex mix Over the several decades since companies implemented the first EDI con

B2B 59