Sat.Aug 12, 2023 - Fri.Aug 18, 2023

article thumbnail

Karma Catches Up to Global Phishing Service 16Shop

Krebs on Security

You’ve probably never heard of “ 16Shop ,” but there’s a good chance someone using it has tried to phish you. A 16Shop phishing page spoofing Apple and targeting Japanese users. Image: Akamai.com. The international police organization INTERPOL said last week it had shuttered the notorious 16Shop, a popular phishing-as-a-service platform launched in 2017 that made it simple for even complete novices to conduct complex and convincing phishing scams.

Phishing 198
article thumbnail

Fake Out: Disinformation Campaigns Get Generative AI Boost

Data Breach Today

Nation-States Running Information Operations Embrace AI-Generated Images and Video Hackers wielding generative artificial intelligence tools have yet to pose a serious cybersecurity risk, say researchers at Google's threat intelligence group Mandiant, as they sound the alarm instead about a rise in information operations featuring AI-generated fake images and video.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat insights: Generative AI begins seeping into the security platforms that will carry us forward

The Last Watchdog

LAS VEGAS – Just when we appeared to be on the verge of materially shrinking the attack surface, along comes an unpredictable, potentially explosive wild card: generative AI. Related: Can ‘CNAPP’ do it all? Unsurprisingly, generative AI was in the spotlight at Black Hat USA 2023 , which returned to its full pre-Covid grandeur here last week.

Security 246
article thumbnail

IG Needs a Makeover (or, It’s Just Mayonnaise)

Weissman's World

Q: “Aioli? What’s aioli?” A: “It’s just mayonnaise.” Q: “What’s information governance?” A: That’s the topic of today’s edition of Speaking Of! Join me and Elizabeth Weeks of the Alberta School Employee Benefit Plan as we discuss the need to know our audiences and communicate in their terms. Just as restaurateurs do when telling uninitiated… Read More » IG Needs a Makeover (or, It’s Just Mayonnaise) The post IG Needs a Makeover (or, It’s Just Mayonnaise) appeared first on

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Diligere, Equity-Invest Are New Firms of U.K. Con Man

Krebs on Security

John Clifton Davies , a convicted fraudster estimated to have bilked dozens of technology startups out of more than $30 million through phony investment schemes, has a brand new pair of scam companies that are busy dashing startup dreams: A fake investment firm called Equity-Invest[.]ch , and Diligere[.]co.uk , a scam due diligence company that Equity-Invest insists all investment partners use.

Cloud 169

More Trending

article thumbnail

GUEST ESSAY: A call to decentralize social identities — to curtail social media privacy abuses

The Last Watchdog

Social media giants have long held too much power over our digital identities. Related: Google, Facebook promote third-party snooping Today, no one is immune to these giants’ vicious cycle of collecting personal data, selling it to advertisers, and manipulating users with data metrics. By making people feel like mere products- this exploitative digital environment further encourages a bubble of distrust amongst social media users.

Privacy 245
article thumbnail

Eliminate Bias for Ethical and Responsible Artificial Intelligence

AIIM

"With great power comes great responsibility" is an adage that Stan Lee’s Spider-Man popularized in popular comics, films, and other media. In Information Management today, there is great power in systems that leverage Artificial Intelligence for quickly making decisions and processing massive volumes of information. As information managers, we have a responsibility to understand that these systems have a potential for bias and how to identify and mitigate risks associated with producing reliabl

article thumbnail

Security in small business with Jamf Now

Jamf

Is your Small or Medium-sized Business (SMB) protected against cyber threats? Safeguard your organization's sensitive data and assets with Jamf Now. Read now and enhance your SMB's cybersecurity posture.

article thumbnail

Data Theft Via MOVEit: 4.5 Million More Individuals Affected

Data Breach Today

Latest Tally of Clop Campaign Victims: 670 Organizations, 46 Million Individuals The fallout from the Clop cybercrime group's mass theft of data from MOVEit servers continues to increase. Colorado's state healthcare agency alone is now notifying 4 million affected individuals. The latest tally of victims has reached 670 organizations and 46 million individuals.

244
244
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

No one likes the hassle of dealing with patch management or vulnerability management , but it is universally agreed that security breaches are far worse. Many organizations try to proactively patch and manage vulnerabilities to prevent attackers from gaining any foothold. Google announced this week that it will now push out weekly security updates to Chrome to help make users more secure.

Access 98
article thumbnail

5 steps to strengthen critical information protection

OpenText Information Management

In our discussions with customers and countless surveys, cybersecurity and sensitive data protection are always top-ranking issues. IT now has available some of the most advanced cybersecurity innovations in its arsenal than ever before, with excellent authentication and real-time threat detection. While these tools are critical to secure IT infrastructure, many organizations still struggle with … The post 5 steps to strengthen critical information protection appeared first on OpenText Blo

article thumbnail

Fake Airplane Mode: A mobile tampering technique to maintain connectivity

Jamf

Jamf Threat Labs developed a post-exploit persistence technique on iOS 16 that falsely shows a functional Airplane Mode. In reality, after successful device exploit the attacker plants an artifical Airplane Mode that edits the UI to display Airplane Mode icons and cuts internet connection to all apps except the attacker application. This enables the attacker to maintain access to the device even when the user believes it is offline.

Access 98
article thumbnail

More UK Police Suffer Freedom of Information Data Breach

Data Breach Today

Constabularies of Norfolk and Suffolk Alert Follows FOIA Breach in Northern Ireland England's Norfolk and Suffolk constabularies report that they accidentally exposed information on victims and witnesses in response to freedom of information requests just one week after police in Northern Ireland accidentally exposed information on all police officers and staff via an FOI request.

FOIA 243
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

What Is Edge Security? Overcoming Edge Computing Risks

eSecurity Planet

Edge security provides protection for resources beyond the edge of the traditional network. The fastest growing need stems from edge computing for the Internet of Things (IoT) such as fitness bands, self-driving cars, and retail point-of-sale (POS) registers. However, the same need for security exists for remote workers, cloud computing networks, and operational technology (OT) such as smart industrial pumps, temperature sensors, and industrial control systems (ICS).

Risk 98
article thumbnail

The Most Feared Teacher in the History of Beverly Hills High

Information Governance Perspectives

The following excerpt is from an inspiring new memoir, The Bastard of Beverly Hills, from JIA Publishing Group, available on Amazon , Barnes & Noble and wherever fine books are sold. Mr. Hale was menacing—a carbon copy of boxer Muhammad Ali, with beefy forearms, scarred knuckles, and a perfectly cut Afro. Even his chubby cheeks looked mean. He sat the entire lecture, staring at us like plebs.

IT 98
article thumbnail

Accenture + Collibra: 2023 data mesh reading list

Collibra

Created in 2019, the concept of the data mesh is one of the most-discussed topics in data management. As more and more zettabytes of data are created every year, organizations everywhere are seeking better ways to accelerate turning data into better decisions, better products, and ultimately better organizations. Over the last year, together with Accenture, we’ve created a number of helpful data mesh assets, and we wanted to pull them together to help you quickly get to what you need.

article thumbnail

Using AI to Separate the Good Signals From the Bad

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Oliver Tavakoli, CTO at Vectra AI, discusses ways that discriminative AI technology can filter out all of the noise from the massive volume of alerts from a portfolio of cybersecurity tools.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Power Management Vulnerabilities Could Shut Down Data Centers: Researchers

eSecurity Planet

Trellix researchers are disclosing a number of critical data center power management platform vulnerabilities at DEFCON 2023 today. The vulnerabilities “could allow attackers to shut down entire data centers in minutes, slowly infect entire data center deployments to steal key data and information, or utilize compromised resources to initiate massive attacks at a global scale,” Sam Quinn and Jesse Chick of the Trellix Advanced Research Center wrote in a blog accompanying their presen

article thumbnail

New approaches to leadership and combatting imposter syndrome at CILIP conference 2023

CILIP

New approaches to leadership and combatting imposter syndrome at CILIP conference 2023 Leadership was the main theme of CILIP Conference 2023, and for an academic librarian and recently-joined CILIP member, the programme of keynotes and seminars that covered topics from imposter syndrome to rethinking leadership was welcoming and insightful. At conferences, it can often feel like there is an over-abundance of new information and people, that can lead to feelings of low-confidence and helplessnes

article thumbnail

A massive campaign delivered a proxy server application to 400,000 Windows systems

Security Affairs

Researchers discovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems. AT&T Alien Labs researchers uncovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems. The experts identified a company that is charging for proxy service on traffic that goes through infected machines.

IT 98
article thumbnail

Law Firm Facing Lawsuit in Aftermath of Its Own Big Breach

Data Breach Today

153,000 Individuals Affected in Hack, Including Client Linked to an Earlier Breach A global law firm that handles data breach litigation is faced with defending itself against a proposed class action lawsuit filed in the aftermath of its own data breach. The lawsuit stems from a March hacking incident at San Francisco-based Orrick, Herrington & Sutcliffe.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Zoom Can Spy on Your Calls and Use the Conversation to Train AI, But Says That It Won’t

Schneier on Security

This is why we need regulation: Zoom updated its Terms of Service in March, spelling out that the company reserves the right to train AI on user data with no mention of a way to opt out. On Monday, the company said in a blog post that there’s no need to worry about that. Zoom execs swear the company won’t actually train its AI on your video calls without permission, even though the Terms of Service still say it can.

IT 97
article thumbnail

[FREE RESOURCE KIT] Cybersecurity Awareness Month Kit 2023 Now Available

KnowBe4

Get the resources you need to help keep your users safe from malicious social engineering attacks during this year's Cybersecurity Awareness Month with our free resource kit.

article thumbnail

Hacking ATMs by exploiting flaws in ScrutisWeb ATM fleet software

Security Affairs

Researchers found several flaws in the ScrutisWeb ATM fleet monitoring software that can expose ATMs to hack. Researchers from the Synack Red Team found multi flaws ( CVE-2023-33871, CVE-2023-38257, CVE-2023-35763 and CVE-2023-35189 ) in the ScrutisWeb ATM fleet monitoring software that can be exploited to remotely hack ATMs. ScrutisWeb software is developed by Lagona, it allows to remotely manage ATMs fleets.

article thumbnail

CrowdStrike, Google, Recorded Future Lead Threat Intel Wave

Data Breach Today

Kaspersky Falls From Leaderboard as Deliberate Decision Made to Nix Russian Firms Recorded Future has joined CrowdStrike and Google atop Forrester's external threat intelligence services rankings, while Kaspersky tumbled from the leaders category. Leading threat intelligence providers have expanded into adjacent use cases such as brand protection and vulnerability management.

241
241
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

US Open heralds new era of fan engagement with watsonx and generative AI

IBM Big Data Hub

As the tournament’s official digital innovation partner, IBM has helped the US Open attract and engage viewers for more than three decades. Year after year, IBM Consulting works with the United States Tennis Association (USTA) to transform massive amounts of data into meaningful insight for tennis fans. This year, the USTA is using watsonx , IBM’s new AI and data platform for business.

article thumbnail

LinkedIn Suffers 'Significant' Wave of Account Hacks

Dark Reading

Users report losing access to their accounts, with some being pressured into paying a ransom to get back in or else face permanent account deletion.

Access 98
article thumbnail

WinRAR flaw enables remote code execution of arbitrary code

Security Affairs

A flaw impacting the file archiver utility for Windows WinRAR can allow the execution of commands on a computer by opening an archive. WinRAR is a popular file compression and archival utility for Windows operating systems. The utility is affected by a now-fixed high-severity vulnerability, tracked as CVE-2023-40477 (CVSS score 7.8), that can allow remote execution of arbitrary code on a computer by opening a crafted RAR archive.