Mon.Oct 21, 2024

article thumbnail

Insiders Confuse Microsoft 365 Copilot Responses

Data Breach Today

Attack Method Exploits RAG-based Tech to Manipulate AI System's Output Researchers found an easy way to manipulate the responses of an artificial intelligence system that makes up the backend of tools such as Microsoft 365 Copilot, potentially compromising confidential information and exacerbating misinformation. Researchers called the attack "ConfusedPilot.

article thumbnail

Cisco states that data published on cybercrime forum was taken from public-facing DevHub environment

Security Affairs

Cisco confirms that data published by IntelBroker on a cybercrime forum was taken from the company DevHub environment. Cisco confirms that the data posted by IntelBroker on a cybercrime forum was stolen from its DevHub environment. IntelBroker claimed to have gained access to Github projects, Gitlab Projects, SonarQube projects, Source code, hard coded credentials, Certificates, Customer SRCs, Cisco Confidential Documents, Jira tickets, API tokens, AWS Private buckets, Cisco Technology SRCs, Doc

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New York Detective Indicted for Darknet Card Data Buys

Data Breach Today

FBI Tracking Alleged Fraudsters Using Evidence Seized From Shuttered Genesis Market An FBI probe into shuttered cybercrime site Genesis Market has led to the indictment of Terrance Ciszek, a now-suspended police detective in Buffalo, New York, who's been accused of buying stolen payment card data and recording a video showing fraudsters how to use it anonymously.

Marketing 300
article thumbnail

Internet Archive was breached twice in a month

Security Affairs

The Internet Archive was breached again, attackers hacked its Zendesk email support platform through stolen GitLab authentication tokens. The Internet Archive was breached via Zendesk, with users receiving warnings about stolen GitLab tokens due to improper token rotation after repeated alerts. BleepingComputer first reported the news of the incident, after it received several messages from people who received replies to their old Internet Archive removal requests, warning that the organization

Archiving 128
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Researchers Debut AI Tool That Helps Detect Zero-Days

Data Breach Today

Vulnerability Tool Detected Flaws in OpenAI and Nvidia APIs Used in GitHub Projects Security researchers have developed an AI tool that can detect remote code flaws and arbitrary zero-day code in software. Protect AI applied the tool to nearly 10,000 GitHub projects and on CVSS data and uncovered local file inclusion, cross-site scripting and remote code flaws in APIs.

Security 292

More Trending

article thumbnail

Dental Center Chain Settles Data Breach Lawsuit for $2.7M

Data Breach Today

2023 Hacking Incident Affected 1.9 Million Patients, Employees A Michigan-based dental practice with 250 centers across nine states has agreed to pay $2.7 million under a preliminary settlement of a proposed consolidated class action lawsuit centered on a 2023 hacking incident reported as affecting more than 1.9 million patients and employees.

article thumbnail

FedRAMP Authorized: OpenText™ Project and Portfolio Management

OpenText Information Management

Enjoy security, peace of mind, and trust with a FedRAMP-Certified project and portfolio management solution. OpenText™ Project and Portfolio Management achieved FedRAMP Authorization through the OpenText™ IT Management Platform (ITMX) available on the FedRAMP Marketplace. What is FedRAMP? Both the public and private sectors are increasingly leveraging cloud services to streamline operations, enhance scalability, and cut costs.

article thumbnail

CISA Ramping Up Election Security Warnings As Voting Begins

Data Breach Today

US Cyber Defense Agency Says Election is Secure Despite Intensifying Threats The Cybersecurity and Infrastructure Security Agency is ramping up its warnings of potential election interference and influence campaigns in the lead up to the November vote. But voters can be assured their ballots are secure and will be counted as cast, the agency said.

Security 271
article thumbnail

Where Do I Point the Camera?

KnowBe4

It's October 10th, 2024, and I've just stepped out of KB4-CON EMEA, my head buzzing with insights and my notebook filled with scribbles. I walk down the familiar streets around Liverpool Street station, I can't help but feel a sense of nostalgia - this is where my career in cybersecurity began, after all.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Sophos Fortifies XDR Muscle With $859M Secureworks Purchase

Data Breach Today

Deal Enhances Sophos’ Managed Security Portfolio, Adds AI-Powered Taegis XDR Tool Sophos is acquiring Secureworks in a deal valued at $859 million, aiming to integrate its managed security services with Secureworks' Taegis XDR platform. This merger is expected to deliver advanced detection and response capabilities, and enhance global cybersecurity for businesses of all sizes.

article thumbnail

Cyber Attackers are Adopting a “Mobile First” Attack Strategy

KnowBe4

With 16+ billion mobile devices in use worldwide, new data sheds light on how cyber attackers are shifting focus and tactics to put attacks into the victim’s hands.

Phishing 106
article thumbnail

The Amazon Fire TV Omni QLED is great for gaming and streaming, and still $150 off

Collaboration 2.0

The Amazon Fire TV Omni QLED offers great picture and audio quality for both streaming and console gaming. Save $150 on the 55-inch model, but you'll have to hurry because you might not see a deal this good again until Black Friday.

97
article thumbnail

US Government Says Relying on Chinese Lithium Batteries Is Too Risky

WIRED Threat Level

A new document shows the Department of Homeland Security is concerned that Chinese investment in lithium batteries to power energy grids will make them a threat to US supply chain security.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

AI and the SEC Whistleblower Program

Schneier on Security

Tax farming is the practice of licensing tax collection to private contractors. Used heavily in ancient Rome, it’s largely fallen out of practice because of the obvious conflict of interest between the state and the contractor. Because tax farmers are primarily interested in short-term revenue, they have no problem abusing taxpayers and making things worse for them in the long term.

article thumbnail

My favorite iPhone car mount charger just got a cool upgrade (and it supports Qi2)

Collaboration 2.0

ESR's new Qi2 car mount can wirelessly charge your iPhone at 15W while staying cool, thanks to its CryoBoost feature.

IT 98
article thumbnail

Identity Revolution: Welcome to the Dynamic World of IAM 360

Thales Cloud Protection & Licensing

Identity Revolution: Welcome to the Dynamic World of IAM 360 madhav Tue, 10/22/2024 - 05:02 It’s been quite the journey, but here it is—the first issue of IAM 360! For too long, Identity and Access Management (IAM) has played a background role—a fundamental but ‘invisible’ part of digital transformation. That’s why I’m so excited to present IAM 360—the magazine where IAM shifts from a behind-the-scenes function into a dynamic, forward-thinking conversation.

article thumbnail

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI

Collaboration 2.0

Only weeks after Red Hat released Red Hat Enterprise Linux AI, the company rolled out the next version: RHEL AI 1.2.

98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Vulnerability Recap 10/21/24 – Immediate Patching Is Critical

eSecurity Planet

One theme that our recent vulnerability recaps have revealed is that threat actors are consistently exploiting flaws with already-active patches. Sometimes, the flaws have been fixed for months during an exploit. It’s challenging for security teams to patch all the software solutions your business uses rapidly, but let this be your weekly reminder to prioritize patching schedules.

article thumbnail

Gartner's 2025 tech trends show how your business needs to adapt - and fast

Collaboration 2.0

A future full of AI agents, postquantum cryptography, hybrid computing and more is speeding your way. What has you most excited? Most worried? Personally, I find one of Gartner's predictions pretty far-fetched.

75
article thumbnail

Learn about functional test automation with AI and codeless testing

OpenText Information Management

November 4, 2024 at 11:00am-12:00pm ET Revolutionize your functional testing strategy and stay ahead in a constantly changing digital space. Get at the forefront of this revolution and learn how to leverage cutting-edge AI technologies to transform test automation and codeless scripting in the upcoming OpenText™ webinar: Revolutionizing functional test automation with AI and codeless testing.

article thumbnail

How to easily fly away from X to Bluesky without losing your flock - for now

Collaboration 2.0

The Sky Follower Bridge extension lets you easily migrate your follows and block list from X (formerly Twitter) to Bluesky, but you need to act fast because its functionality may be short-lived. Here's why.

IT 98
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Rewrite the rules of software delivery with OpenText quality management

OpenText Information Management

Enterprises are under increasing pressure to deliver innovative and high-quality applications at an accelerated pace. Striking the right balance between speed, agility, and quality is crucial for success. The slightest mishap can lead to late software delivery, poor customer satisfaction, and rework. OpenText™ quality management helps organization rewrite the rules of software delivery by fostering a culture of continuous improvement, so your software is delivered faster and more reliable.

article thumbnail

Ready to ditch X? This tool makes migrating to Bluesky easy - for now

Collaboration 2.0

The Sky Follower Bridge extension lets you easily migrate your follows and block list from X (formerly Twitter) to Bluesky, but its functionality may be short-lived - once X takes note of it. Here's why.

IT 98
article thumbnail

Plural Leads £17 Million Investment in UK AI Startup

Information Matters

Plural, an investment group led by government AI advisor Ian Hogarth, has spearheaded a £17 million ($22 million) funding round for Oriole Networks, a London-based artificial intelligence startup. This latest Read more The post Plural Leads £17 Million Investment in UK AI Startup appeared first on Information Matters - AI in the UK.

article thumbnail

Grab a lifetime license for Microsoft Office for Windows for $55

Collaboration 2.0

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 81% off right now (there's a deal for a Mac version, too).

98
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Reltio Data Cloud™: powering enterprise data in the age of AI

Reltio

Today marks an exciting milestone for Reltio as we announce Reltio Data Cloud —a refreshed name for our platform that reflects the limitless potential of what unified enterprise data can do for your organization. Reltio Data Cloud updates the former name, Reltio Connected Data PlatformTM, while continuing to solve the challenges created by application proliferation that are exacerbating data silos in today’s enterprise.

Cloud 52
article thumbnail

The best QLED TV I've tested got an upgrade, and it's $1,000 off at Amazon

Collaboration 2.0

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. And if you've been looking to invest in a truly cinema-sized TV, you can save $1,000 on the 98-inch model at Amazon.

IT 75
article thumbnail

Behavioral segmentation, prebuilt integrations, FERN GA and more

Reltio

Across every industry there is one constant—the demand for outstanding customer experiences is on the rise. Meeting these expectations requires trusted, unified data with a rich understanding of customers and their behavior. And of course, this data needs to be kept secure and made easily accessible where it is needed, when it is needed. Our 2024.3 release delivers key updates to meet these needs across our platform Reltio Data Cloud (formerly Reltio Connected Data Platform).

B2C 52