Tue.Oct 24, 2023

article thumbnail

1Password Finds 'Suspicious Activity' Tied to Okta Breach

Data Breach Today

Stolen Customer Support Files From Okta Used to Attack 1Password, BeyondTrust Widely used password management software provider 1Password said a hacker breached had one of its systems but failed to steal any sensitive data, after stealing a valid session cookie from the customer support system of its access and identity management provider, Okta.

Passwords 296
article thumbnail

Shared Drives & Email as Low-Hanging InfoGov Fruit

Weissman's World

If you know – or have been told – you have to do SOMETHING to get a grip on your exploding piles of information … and you’ve been given next-to-no resources to get anything done … then let me remind you that you don’t have wait until you can do it all. No, you can start small,… Read More » Shared Drives & Email as Low-Hanging InfoGov Fruit The post Shared Drives & Email as Low-Hanging InfoGov Fruit appeared first on Holly Group.

Cleanup 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keyfactor Earns $1.3B Valuation After Sale of Minority Stake

Data Breach Today

Funds Comes Two Years After Insight-Backed Keyfactor Merged With CA Vendor PrimeKey A machine identity management provider led by an ex-Tricentis executive notched a $1.3 billion valuation after getting a minority investment from Sixth Street Group. Keyfactor said the funds will support high market demand for technology that secures devices and simplifies public key infrastructure.

Sales 294
article thumbnail

'Log in with.' Feature Allows Full Online Account Takeover for Millions

Dark Reading

Hundreds of millions of users of Grammarly, Vidio, and the Indonesian e-commerce giant Bukalapak are at risk for financial fraud and credential theft due to OAuth misfires -- and other online services likely have the same problems.

Risk 141
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Attack on Shared IT Supplier Affects 5 Hospitals in Ontario

Data Breach Today

Nonemergency Patients Asked to Cancel or Reschedule Appointments During Outage A cyberattack on a shared IT services organization is forcing five member hospitals in Ontario to cancel or reschedule patient appointments and steer nonemergency patients to other facilities. Attacks against third-party vendors are rising, and many regional hospitals are unprepared.

IT 290

More Trending

article thumbnail

Experts Urge Safeguards Before AI Can 'Feign Obedience'

Data Breach Today

Academics Call for Adoption of AI Guardrails to Prevent Potential Existential Risk Leading artificial intelligence experts are calling on governments and tech companies to swiftly develop safeguards for AI systems to mitigate potential existential threats posed by the technology. More capable future AI systems might "learn to feign obedience" to human directives, they say.

article thumbnail

Artificial Governance Resources

AIIM

AI Governance Resources Patricia C. Franks and Scott Cameron provided this list of helpful resources. Be sure to check out their AIIM blog post about paradata and documenting artificial intelligence (AI) processes.

article thumbnail

Report Suggests CISA Should Dominate Federal Cybersecurity

Data Breach Today

Federal Civilian Agencies 'Are Likely to Resist This Dramatic Change,' Report Says A study of federal government cybersecurity suggests the Department of Homeland Security could play a more prominent role in securing civilian networks, in a report that touts a "more centralized defensive strategy." CISA doesn't approach the authority of its military equivalent, the JFHQ-DODIN.

article thumbnail

News alert: Lumifi seeking to acquire MDR cybersecurity firms to accelerate growth

The Last Watchdog

Scottsdale, Ariz., Oct. 24, 2023 — Lumifi , a cybersecurity industry leader, is embarking on a strategic expansion plan by targeting cybersecurity firms. This strategic direction gains its foundation from Lumifi’s recent landmark acquisition, Castra, valued at $14 million, which further fortifies the SOC Visibility Triad, a concept initially introduced in a Gartner® research report titled “ Apply Network-Centric Approaches for Threat Detection and Response “ 1 We believ

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

A Better Way to Cover the Bases for Breach Protection

Data Breach Today

The biggest challenges in threat detection and response today are the inability to cover the entire attack surface and a lack of insight into who is attacking and why. To address these issues, Cisco introduced Breach Protection, a suite of products that combines email, endpoint and XDR protection.

263
263
article thumbnail

Unlocking AI’s Strategic Imperative: From Proof of Concept to Production

Hanzo Learning Center

We will likely now all agree that the latest generation of AI has emerged as a game-changer. Its potential is undeniable and prevalent across every sector, industry, and use case. Yet, many enterprises remain stuck in the "Proof of Concept" (POC) phase due to various barriers, testing the waters but never diving in. It's time to move beyond this and build real-world applications using AI.

IT 117
article thumbnail

Censys Gets $75M to Grow Globally, Spend on Cloud, Analytics

Data Breach Today

New Capital, Debt Funding Will Help Censys Analyze History of Vulnerable Data A threat hunting and exposure management startup led by ex-OneLogin CEO Brad Brooks received $75 million to invest in cloud and analytics and growing globally. Censys said the combined equity and debt funding will allow the company to offer a more complete look at the history of vulnerable data.

Analytics 262
article thumbnail

Experts released PoC exploit code for VMware Aria Operations for Logs flaw. Patch it now!

Security Affairs

VMware is aware of the availability of a proof-of-concept (PoC) exploit code for an authentication bypass flaw in VMware Aria Operations for Logs. VMware warned customers of the availability of a proof-of-concept (PoC) exploit code for an authentication bypass vulnerability, tracked as CVE-2023-34051 , in VMware Aria Operations for Logs (formerly known as vRealize Log Insight).

IT 117
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

On Point: Overcoming Vulnerability Management Challenges

Data Breach Today

Security Director Ian Keller on Addressing Telecommunications Industry Challenges The unique characteristics of the telecommunications industry pose significant challenges to the implementation of robust vulnerability management programs. Security director Ian Keller lists the top four challenges and discusses strategies to overcome them.

Security 178
article thumbnail

It's Time to Establish the NATO of Cybersecurity

Dark Reading

Cybercriminals already operate across borders. Nations must do the same to protect their critical infrastructure, people, and technology from threats foreign and domestic.

article thumbnail

A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

WIRED Threat Level

An EU government body is pushing a proposal to combat child sexual abuse material that has significant privacy implications. Its lead advocate is making things even messier.

Privacy 109
article thumbnail

1Password Becomes Latest Victim of Okta Customer Service Breach

Dark Reading

Okta's IAM platform finds itself in cyberattackers' sights once again, as threat actors mount a supply chain attack targeting Okta customer support engagements.

120
120
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Former NSA employee pleads guilty to attempted selling classified documents to Russia

Security Affairs

A former NSA employee has pleaded guilty to charges of attempting to transmit classified defense information to Russia. Jareh Sebastian Dalke (31), a former NSA employee has admitted to attempting to convey classified defense information to Russia, pleading guilty to the charges. The man pleaded guilty today to six counts of attempting to transmit classified National Defense Information (NDI) to an agent of the Russian Federation (Russia).

article thumbnail

The Week in Cyber Security and Data Privacy: 16–22 October 2023

IT Governance

Welcome to a new series of weekly blog posts rounding up the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks City of Philadelphia discloses data breach after five months Date of breach: 24 May 2023 ( notice issued 20 October 2023).

article thumbnail

Functionality Misuse from Multiple Legitimate Company Websites is the Latest Example of ‘Site Hopping’

KnowBe4

A new technique is becoming increasingly common as a way to bypass security scanners. The challenge is that the specific execution is constantly evolving, making it difficult to detect, but not impossible to spot.

Security 105
article thumbnail

New England Biolabs leak sensitive data

Security Affairs

On September 18th, the Cybernews research team discovered two publicly hosted environment files (.env) attributed to New England Biolabs. Leaving environment files open to the public is one of the simplest mistakes that web admins can make, but it can have disastrous consequences. Despite leaving some of its sensitive credentials exposed, New England Biolabs seems to have dodged a bullet.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Vietnam-Based Cyber Groups Using Fake Job Postings to Deliver Malware

KnowBe4

Several cybercriminal groups based in Vietnam are using fake job postings to trick users into installing malware, according to researchers at WithSecure. The researchers are tracking several related malware campaigns, including “DarkGate” and “Ducktail.

101
101
article thumbnail

How did the Okta Support breach impact 1Password?

Security Affairs

1Password detected suspicious activity on its Okta instance after the recent compromise of the Okta support system. The password management and security application 1Password announced it had detected suspicious activity on its Okta instance on September 29, but excluded that user data was exposed. The activity is linked to the recent attack on the Okta support case management system.

Archiving 106
article thumbnail

One Out of Every Eight Emails Found to be Malicious as Attackers Continue to Hone Their Skills

KnowBe4

An increase in the number of malicious emails being sent is resulting in more phishing attacks reaching inboxes. New data clarifies the factors that determine their malicious nature and identifies the most prevalent types of attacks.

article thumbnail

A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise

WIRED Threat Level

Though often viewed as the “crown jewel” of the US intelligence community, fresh reports of abuse by NSA employees and chaos in the US Congress put the tool's future in jeopardy.

IT 90
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Most Organizations Believe Malicious Use of AI is Close to Evading Detection

KnowBe4

As organizations continue to believe the malicious use of artificial intelligence (AI) will outpace its defensive use, new data focused on the future of AI in cyber attacks and defenses should leave you very worried.

article thumbnail

CILIP awards Joseph Coelho, Alison Wheeler and Professor Briony Birdi with Honorary Fellowship

CILIP

CILIP awards Joseph Coelho, Alison Wheeler and Professor Briony Birdi with Honorary Fellowship The Chartered Institute of Library and Information Professionals (CILIP) has awarded its highest accolade, the Honorary Fellowship, to Joseph Coelho, Alison Wheeler, and Briony Birdi in recognition of their outstanding contributions to the library and information sectors.

article thumbnail

Leadership Less Involved in Cyber-Preparedness Despite a Majority of Orgs Thinking Data Loss from a Cyber Attack Likely in the Next 12 Months

KnowBe4

You probably expect executive leadership to not just support cybersecurity efforts, but to be involved. New data shows organizations have a way to go until this is a reality.