Sat.Apr 22, 2023 - Fri.Apr 28, 2023

article thumbnail

ITRC: Lack of Details in Data Breach Notices on the Rise

Data Breach Today

James E. Lee Shares 2023 Q1 Data Breach Report Highlights According to findings from the Identity Theft Resource Center's 2023 Q1 Data Breach Report, the number of publicly reported data compromises decreased, but the number of data breaches with no actionable information about the root cause of the compromise grew.

article thumbnail

Many Public Salesforce Sites are Leaking Private Data

Krebs on Security

A shocking number of organizations — including banks and healthcare providers — are leaking private and sensitive information from their public Salesforce Community websites, KrebsOnSecurity has learned. The data exposures all stem from a misconfiguration in Salesforce Community that allows an unauthenticated user to access records that should only be available after logging in.

Access 317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK Threatens End-to-End Encryption

Schneier on Security

In an open letter , seven secure messaging apps—including Signal and WhatsApp—point out that the UK’s Online Safety Bill could destroy end-to-end encryption: As currently drafted, the Bill could break end-to-end encryption,opening the door to routine, general and indiscriminate surveillance of personal messages of friends, family members, employees, executives, journalists, human rights activists and even politicians themselves, which would fundamentally undermine everyone’s ab

article thumbnail

The White House National Cybersecurity Strategy Has a Fatal Flaw

Dark Reading

The government needs to shift focus and reconsider how it thinks about securing our nation's digital and physical assets.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Brace Yourself for the 2024 Deepfake Election

WIRED Threat Level

No matter what happens with generative AI, its disruptive forces are already beginning to play a role in the fast-approaching US presidential race.

IT 143

More Trending

article thumbnail

MY TAKE: RSAC 2023 roundup – evidence of ‘stronger together’ innovation takes shape

The Last Watchdog

“Stronger together” was the theme of RSA Conference 2023 , which returned to its pre-Covid grandeur under the California sunshine last week at San Francisco’s Moscone Center. Related: Demystifying ‘DSPM’ Rising from the din of 625 vendors, 700 speakers and 26,000 attendees came the clarion call for a new tier of overlapping, interoperable, highly automated security platforms needed to carry us forward.

article thumbnail

Worried About AI? You Should Be, But Not For Why You Think

Weissman's World

Many of our fears about Artificial Intelligence (AI) are absolutely terrifying! So, no surprise, it’s becoming a major talking point in the information profession. And while there’s definitely something to be worried about here., it probably isn’t what you think it is. It’ll take just 3 minutes for me to tell you what it is.… Read More » Worried About AI?

article thumbnail

Announcing OpenText Cloud Editions (CE) 23.2

OpenText Information Management

As information expands exponentially, it is becoming more complex and extensive than ever before. To remain competitive, organizations must explore new ways of harnessing information – to not only power and protect it – but to innovate, ramp up growth, and increase speed to market. Since the acquisition of Micro Focus 90 days ago, OpenText … The post Announcing OpenText Cloud Editions (CE) 23.2 appeared first on OpenText Blogs.

Cloud 126
article thumbnail

ISMG Editors: Opening Day Overview of RSA Conference 2023

Data Breach Today

Emerging AI Tech, Identity Concerns and Latest Threats Are Among the Hot Topics ISMG editors are live at RSA Conference 2023 in San Francisco with an overview of opening-day speakers and hot topics including the emergence of AI, the latest intel on nation-state threats, security product innovation and deals, and ransomware trends. Join us for daily updates from RSA.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Guest essay: A roadmap for how — and why — all MSSPs should embrace live patching

The Last Watchdog

Patch management has always been time-consuming and arduous. But it gets done, at least to some degree, simply because patching is so crucial to a robust cybersecurity posture. Patch programs are rarely perfect though, and imperfect patching arguably enables successful cybersecurity breaches – it’s an ever-growing concern for countless IT teams. Related: MSSPs shift to deeper help Managed Security Service Providers (MSSPs) do their best to patch their client’s systems while also juggling a long

article thumbnail

DOJ Detected SolarWinds Breach Months Before Public Disclosure

WIRED Threat Level

In May 2020, the US Department of Justice noticed Russian hackers in its network but did not realize the significance of what it had found for six months.

IT 132
article thumbnail

ChatGPT Security and Privacy Issues Remain in GPT-4

eSecurity Planet

After two years of development, OpenAI launched GPT-4 last month, and it’s a major leap beyond GPT-3 and even ChatGPT. But in addition to vastly improved reasoning and visual capabilities, GPT-4 also retains many of ChatGPT’s security and privacy issues , in some cases even enhancing them. Here’s a look at some of those issues — including some that came up at this week’s RSA Conference in San Francisco.

Privacy 116
article thumbnail

The Best Cybersecurity Defense Is a Good Offense

Data Breach Today

AllegisCyber Capital's Bob Ackerman on the Need to Understand Offensive Playbooks Offense is what paces innovation in cybersecurity since threat actors constantly look for new ways to compromise systems, said AllegisCyber Capital's Bob Ackerman. Many offensive cyber capabilities developed by the national intelligence community make their way into the wild and become exploitable.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

RSAC Fireside Chat: Turning full attention to locking down the security of ‘open source’

The Last Watchdog

Software composition analysis — SCA – is a layer of the security stack that, more so than ever, plays a prominent role in protecting modern business networks. Related: All you should know about open-source exposures This is especially true as software developers increasingly rely on generic open source and commercial components to innovate in hyperkinetic DevOps and CI/CD mode.

Security 201
article thumbnail

2023 Jamf Event Recap

Jamf

This was the second year of our Jamf Event, a follow-up to the Jamf Nation User Conference. Dean Hager, Jamf CEO, joined other key Jamf team members to provide an exclusive look at the progress we’ve made on product features announced at JNUC as well as some exciting new and planned capabilities that will help simplify work with Apple.

116
116
article thumbnail

Patch Management vs Vulnerability Management: What’s the Difference?

eSecurity Planet

Vulnerability management improves the security posture of all IT systems by locating vulnerabilities, implementing security controls to fix or protect those vulnerabilities, and then testing the fixes to verify vulnerability resolution. Patch management is the subset of vulnerability management that applies to third-party vendors and updates third-party systems using vendor-issued patches.

IoT 109
article thumbnail

Novel Technique Exploits Kubernetes RBAC to Create Backdoors

Data Breach Today

Attackers Deployed DaemonSets to Steal Resources From Victims Threat actors are exploiting Kubernetes Role-Based Access Control in the wild to create backdoors and to run cryptocurrency miners. Researchers observed a recent campaign that targeted at least 60 Kubernetes clusters by deploying DaemonSets to hijack and steal resources from the victims' clusters.

Access 200
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Security Risks of AI

Schneier on Security

Stanford and Georgetown have a new report on the security risks of AI—particularly adversarial machine learning—based on a workshop they held on the topic. Jim Dempsey, one of the workshop organizers, wrote a blog post on the report: As a first step, our report recommends the inclusion of AI security concerns within the cybersecurity programs of developers and users.

Risk 106
article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

Insider threats are one of the most difficult security challenges that organisations face. Staying safe isn’t simply about stopping criminal hackers from breaking into your systems, because the vulnerabilities already inside your organisation. A malicious threat can be an employee, contractor or business partner who is liable to leak sensitive information.

article thumbnail

Cybersecurity Survival: Hide From Adversarial AI

Dark Reading

Consider adding some security-through-obscurity tactics to your organization's protection arsenal to boost protection. Mask your attack surface behind additional zero-trust layers to remove AI's predictive advantage.

article thumbnail

RTM Locker RaaS Group Turns to Linux, NAS and ESXi Hosts

Data Breach Today

Highly Structured Group Using Traces of Babuk Ransomware's Leaked Source Code RTM Locker ransomware-as-a-service operators have now turned their attention to Linux, network-attached storage devices and ESXi hosts. The highly structured group appears to be using a new ransomware strain that shows traces of Babuk ransomware's leaked source code.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cyberweapons Manufacturer QuaDream Shuts Down

Schneier on Security

Following a report on its activities , the Israeli spyware company QuaDream has shut down. This was QuadDream: Key Findings Based on an analysis of samples shared with us by Microsoft Threat Intelligence , we developed indicators that enabled us to identify at least five civil society victims of QuaDream’s spyware and exploits in North America, Central Asia, Southeast Asia, Europe, and the Middle East.

article thumbnail

Automated Patch Management: Definition, Tools & How It Works

eSecurity Planet

Automated patch management can help prevent security breaches by automatically identifying, downloading, testing, and delivering software and firmware updates to devices and applications through the use of specialized software tools. Automated patching can save IT and security staff time by deploying the latest security and performance enhancements, fixing bugs, and conducting other upgrades to ensure that software is in its most current state.

IT 98
article thumbnail

Firmware Looms as the Next Frontier for Cybersecurity

Dark Reading

Software bugs are ubiquitous, and we're familiar with hardware threats. But what about the gap in the middle? Two researchers at Black Hat Asia will attempt to focus our attention there.

article thumbnail

Feds Urge 15-Month Sentence for Ex-Uber CISO Joe Sullivan

Data Breach Today

Sullivan Says Prison Sentence for Him Would Deter Others From Taking CISO Positions Prosecutors are urging a U.S. federal judge to sentence former Uber CISO Joe Sullivan to 15 months in prison for his role in impeding an investigation into the ride-hailing company's security practices. Sullivan exploited "his position to cover up a deeply embarrassing event," prosecutors wrote.

Security 162
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

My top five moments from season one of The Data Download

Collibra

Over a year ago the marketing team came to me and asked if I wanted to be the host of Collibra’s first ever podcast. I was interested, but hesitant at first. I had never done something like this before and had no idea what to expect. But now, just two weeks out from launching season two , I couldn’t be more excited about what the future holds for The Data Download.

article thumbnail

The Downside of ESG: The Dangers of Greenwashing

Hanzo Learning Center

In recent years, there has been an increasing trend for companies to claim environmental sustainability, making public commitments to lower carbon emissions and other eco-friendly measures. However, this rise in environmental claims has also led to the concern of greenwashing, where companies make false or exaggerated statements about their environmental practices.

Risk 98
article thumbnail

Rethinking Safer AI: Can There Really Be a 'TruthGPT'?

Dark Reading

Is Elon Musk's "maximum truth-seeking AI" achievable? Overcoming bias in artificial technologies is crucial for cybersecurity, but doing it could be a challenge.