Fri.Jan 12, 2024

article thumbnail

Amazon Appeals Privacy Fine of 746 Million Euros

Data Breach Today

E-Commerce Giant Accuses Luxembourg Regulators of Attacking the Company Amazon in a Luxembourg court Tuesday contested a once-record privacy fine levied against the e-commerce giant for its advertising practices by the diminutive country's data protection authority. The fine of 746 million euros stems from a 2018 complaint by French privacy group La Quadrature du Net.

Privacy 299
article thumbnail

Researchers created a PoC for Apache OFBiz flaw CVE-2023-51467

Security Affairs

Researchers published a proof-of-concept (PoC) code for the recently disclosed critical flaw CVE-2023-51467 in the Apache OfBiz. Researchers from cybersecurity firm VulnCheck have created a proof-of-concept (PoC) exploit code for the recently disclosed critical flaw CVE-2023-51467 (CVSS score: 9.8) in the Apache OfBiz. In December, experts warned of an authentication bypass zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system.

Honeypots 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Trends: Medusa and Akira Rage; Tortilla Disrupted

Data Breach Today

Crypto-Malware Trackers Report a Surge in Known Ransomware Victims at End of 2023 Ransomware-wielding attackers show no signs of stopping, and experts report December 2023 was the second-worst month on record for known victims. Lately, Akira-wielding attackers have been hitting Finland hard, and Medusa has been behind a rising number of attacks.

article thumbnail

Team Liquid’s wiki leak exposes 118K users

Security Affairs

Liquipedia, an online e-sports platform run by Team Liquid, exposed a database revealing its users’ email addresses and other details. Users of the e-sports knowledge base were exposed via a publicly accessible and passwordless MongoDB database, the Cybernews research team has discovered. The database was closed after researchers informed Liquipedia’s admins about the issue.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ISMG Editors: Will We Ever Get a Handle on API Security?

Data Breach Today

Also: Why We Should Care About the New York Times' Copyright Lawsuit Against OpenAI In the latest weekly update, ISMG editors discussed how the surge in API usage poses challenges for organizations, why good governance is so crucial to solving API issues and how The New York Times' legal action against OpenAI and Microsoft highlights copyright concerns.

Security 292

More Trending

article thumbnail

US CISA Must Improve Water Sector Assistance, Says Watchdog

Data Breach Today

DHS Office of Inspector General Finds Lack of Coordination With EPA A U.S. federal watchdog said government agencies could better synchronize efforts to improve water and wastewater sector cybersecurity efforts and faulted the Cybersecurity and Infrastructure Security Agency for not coordinating well with the Environmental Protection Agency.

article thumbnail

News alert: Trimarc launches Active Directory security posture tool for enterprise, M&A

The Last Watchdog

Washington, DC, Jan. 12, 2024 – Trimarc Security , the professional services company with extensive expertise in securing Active Directory for enterprise organizations, today announced the early access availability of its new product, Trimarc Vision. Trimarc Vision is a powerful security posture analysis product that provides visibility into the most important security components of Active Directory.

Security 100
article thumbnail

Chinese Nation-State Hacker Is Exploiting Cisco Routers

Data Breach Today

'Volt Typhoon' Could Be Preparing for Renewed Burst of Activity A Chinese state hacking group is attacking superseded Cisco routers to target government entities in the United States, the United Kingdom and Australia. Beijing cyberespionage hackers dubbed "Volt Typhoon" are using vulnerabilities that were first disclosed in early 2019.

article thumbnail

6 Best Cloud Log Management Services in 2024 Reviewed

eSecurity Planet

Cloud log management is the comprehensive processing of log data, including generation, aggregation, storage, analysis, archive, and disposal. The top log management services offer troubleshooting and operational efficiency through seamless integration, secure log handling, advanced security analytics, and more. To help you select an ideal cloud log management solution, we’ve evaluated the top options and their use cases.

Cloud 117
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Fertility Test Lab Will Pay $1.25M to Settle Breach Lawsuit

Data Breach Today

ReproSource Also Agrees to Beef Up Security in Wake of 2021 Ransomware Attack A fertility testing laboratory has agreed to improve its data security practices and pay up to $1.25 million to settle a consolidated class action lawsuit filed in the wake of a 2021 ransomware attack that compromised sensitive health information of about 350,000 patients.

article thumbnail

Vast Voter Data Leaks Cast Shadow Over Indonesia ’s 2024 Presidential Election

Security Affairs

Investigators from Resecurity’s HUNTER (HUMINT) warn that Indonesia is increasingly being targeted by cyber-threat actors. Investigators from Resecurity’s HUNTER (HUMINT) have found that Indonesia is increasingly being targeted by cyber-threat actors who have staged attacks that pose significant long-term risks to the integrity of the country’s elections.

Sales 135
article thumbnail

On IoT Devices and Software Liability

Schneier on Security

New law journal article : Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims Abstract: Smart devices are used to facilitate cyberattacks against both their users and third parties. While users are generally able to seek redress following a cyberattack via data protection legislation, there is no equivalent pathway available to third-party victims who suffer harm at the hands of a cyberattacker.

IoT 111
article thumbnail

How Jamworks protects confidentiality while integrating AI advantages

IBM Big Data Hub

The integration of artificial intelligence (AI) has ushered in a new era of technological progress, offering a spectrum of benefits across industries. AI’s potential to revolutionize operations, enhance decision-making and drive innovation is undeniable. The advantages of AI are numerous and impactful, from predictive analytics that refine strategies, to natural language processing that fuels customer interactions and assists users in their daily tasks, to assistive tools that enhance acce

Cloud 94
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Stop Your X Account From Getting Hacked Like the SEC's

WIRED Threat Level

The US Securities and Exchange Commission and security firm Mandiant both had their X accounts breached, possibly due to changes to X’s two-factor authentication settings. Here’s how to fix yours.

article thumbnail

Webianr: HOW TO BUILD AND SUSTAIN YOUR RECORDS MANAGEMENT PROGRAM WITH A RECORDS MANAGEMENT PLAYBOOK via the St. Louis ARMA Chapter on January 18 at 1:30 Central

IG Guru

REGISTER HERE The post Webianr: HOW TO BUILD AND SUSTAIN YOUR RECORDS MANAGEMENT PROGRAM WITH A RECORDS MANAGEMENT PLAYBOOK via the St. Louis ARMA Chapter on January 18 at 1:30 Central first appeared on IG GURU.

article thumbnail

4 reasons information management is at the heart of Formula E racing

OpenText Information Management

Some of you may wonder why OpenText, a software company focused on information management, is involved with ABB FIA Formula E World Championship, and Jaguar TCS Racing in particular. It’s not the unlikely pairing you might think. The heartbeat of Gen3: Information If you don’t already know, Formula E was created as a testbed of … The post 4 reasons information management is at the heart of Formula E racing appeared first on OpenText Blogs.

article thumbnail

IBM Cloud patterns: Private wireless network on IBM Cloud Satellite 

IBM Big Data Hub

Communication service providers (CSPs) are teaming up with hyperscalers to offer private wireless networks that are owned and fully managed by whoever builds them. A private wireless network (PWN) provides the same kind of connectivity as public wireless networks, and enterprises must weigh the pros and cons of private wireless networks using 5G technology.

Cloud 58
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

VAI Forges AI Partnership to Boost ERP Offerings

Information Matters

US enterprise software developer VAI has kickstarted 2024 by joining forces with Proton, an AI-powered customer relationship management (CRM) specialist, in a move that promises to strengthen its offerings for Read more The post VAI Forges AI Partnership to Boost ERP Offerings appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52
article thumbnail

Webinar: Versatile 2023 Records Management Reveal on Tue, Jan 16, 2024 11:00 AM – 11:30 AM EST

IG Guru

Zasio is kicking off its 2024 webinar schedule with an important software demonstration! We are thrilled for our next release of Versatile 2023, which showcases a preview of our basic and standard physical records management features. Physical records management is one of the available feature packs that can be included in Versatile 2023. If […] The post Webinar: Versatile 2023 Records Management Reveal on Tue, Jan 16, 2024 11:00 AM – 11:30 AM EST first appeared on IG GURU.

article thumbnail

Calabrio Snaps Up AI Specialist in Customer Service Tech Push

Information Matters

US call centre software developer Calabrio has moved to tap into the growth in artificial intelligence-enabled customer service solutions by acquiring Toronto-based analytics specialist Wysdom. The purchase, for an undisclosed Read more The post Calabrio Snaps Up AI Specialist in Customer Service Tech Push appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Breaking Down Data Silos: How to Achieve Data Efficiency

Docuware

In an increasingly digitalized world, data is a company's most valuable asset. However, it is all too often trapped in data silos, stand-alone systems, that are an obstacle to efficient data management. These isolated areas in a company's IT infrastructure make it difficult to smoothly exchange and integrate information between different departments and systems.

IT 29
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

LexisNexis Launches AI-Powered Legal Research Tool in Canada and UK

Information Matters

LexisNexis Legal & Professional has announced the launch of a new artificial intelligence-powered legal research solution, Lexis+ AI, in Canada and the UK. The tool aims to streamline legal work Read more The post LexisNexis Launches AI-Powered Legal Research Tool in Canada and UK appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s

Schneier on Security

Interesting article , with photographs. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 105
article thumbnail

PubHive Unveils New AI-Powered Research Platform

Information Matters

PubHive, a provider of scientific literature analysis tools, has launched a new platform called PubHive Navigator Enterprise Portal aimed at streamlining research and collaboration for life sciences companies. The cloud-based Read more The post PubHive Unveils New AI-Powered Research Platform appeared first on Information Matters - Where AI Meets Knowledge Management.

Cloud 52