Sat.Dec 07, 2024 - Fri.Dec 13, 2024

article thumbnail

From Passive Collection to Process Integrity: How Information Management Has Changed

AIIM

The Early Days: When We Just Collected Everything When I first joined the information management industry some 25-30 years ago, there was an assumption that information was simply what the business did. They produced it, we trusted it, and our job was to collect it. We never really questioned the information - we just collected it.

IT 160
article thumbnail

Powering Information: Shell's Approach for the Future of IM

AIIM

At Shell, we recently held an IM business strategy workshop that brought together IM business leads from different lines of business. The goal? To connect the dots between information and data management and chart our approach for the coming years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday, December 2024 Edition

Krebs on Security

Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138 , a security weakness in the Windows Common Log File System (CLFS) driver — used by applications to write transaction logs — that could let an authenticated attacker gain “system” level privileges on a vulnerable Windows device.

article thumbnail

The ‘Ghost Gun’ Linked to Luigi Mangione Shows Just How Far 3D-Printed Weapons Have Come

WIRED Threat Level

The design of the gun police say they found on the alleged United Healthcare CEO's killerthe FMDA or Free Men Dont Askwas released by a libertarian group.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

OpenAI rolls out Canvas to all ChatGPT users - and it's a powerful productivity tool

Collaboration 2.0

For 12 days, the OpenAI daily live stream is unveiling 'new things, big and small.' Here's what's new today.

IT 133

More Trending

article thumbnail

Phishing Holds the Top Spot as the Primary Entry Point for Ransomware Attacks

KnowBe4

New analysis of ransomware attacks shows that phishing is the primary delivery method and organizations need to offer more effective security awareness training to mitigate the threat.

Phishing 103
article thumbnail

Poker Cheaters Allegedly Use Tiny Hidden Cameras to Spot Dealt Cards

WIRED Threat Level

Several recent schemes were uncovered involving poker players at casinos allegedly using miniature cameras, concealed in personal electronics, to spot cards. Should players everywhere be concerned?

Security 119
article thumbnail

Full-Face Masks to Frustrate Identification

Schneier on Security

This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual scrutiny. And they’re cheap and easy to swap.

IT 100
article thumbnail

8Base ransomware group hacked Croatia’s Port of Rijeka

Security Affairs

The 8Base ransomware group attacked Croatia’s Port of Rijeka, stealing sensitive data, including contracts and accounting info. A cyber attack hit the Port of Rijeka in Croatia, the 8Base ransomware group claimed responsibility for the security breach. The Port of Rijeka (Luka Rijeka d.d.), Croatia’s largest dry cargo concessionaire, provides maritime traffic services, port operations, and cargo storage.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Phishing Attacks Are Now Leveraging Google Ads to Hijack Employee Payments

KnowBe4

Researchers at Silent Push warn that a phishing campaign is using malicious Google Ads to conduct payroll redirect scams.

article thumbnail

Police Arrest UHC CEO Shooting Suspect, App Developer Luigi Mangione

WIRED Threat Level

Luigi Mangione, a 26-year-old graduate of the University of Pennsylvania, was apprehended on Monday after visiting a McDonald's in Altoona, Pennsylvania.

Security 118
article thumbnail

Shared Intel Q&A: A thriving ecosystem now supports AWS ‘shared responsibility’ security model

The Last Watchdog

The Amazon Web Services (AWS) Shared Responsibility Model has come a long way, indeed. Related: Shared Responsibility best practices In 2013, Amazon planted a stake in the ground when it divided cloud security obligations between AWS and its patrons, guaranteeing the integrity of its infrastructure, but placing a huge burden on customers to secure things on their end.

Security 100
article thumbnail

Russia’s FSB used spyware against a Russian programmer

Security Affairs

Russia’s FSB used spyware against a Russian programmer after detaining him for allegedly donating to Ukraine earlier this year. The Federal Security Service (FSB) used spyware to monitor a Russian programmer, Kirill Parubets, after he was detained earlier this year for allegedly donating to Ukraine. Researchers fromthe First Department and the Citizen Lab discovered that the Russian intelligence agency installed the malware on the programmer’s Android device after he was detained for

Passwords 132
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

U.S. Treasury Issues Final Rule Restricting Outbound Investments in Chinese-Affiliated Entities

Data Matters

On October 28, 2024, the U.S. Department of the Treasury (Treasury) released the Final Rule for its new regulations prohibiting or requiring notification of U.S. outbound investments in certain Chinese-affiliated companies in the semiconductor and microelectronics, quantum information technology, and artificial intelligence (AI) sectors. The Final Rule will take effect on January 2, 2025.

article thumbnail

Why the US Military Can't Just Shoot Down the Mystery Drones

WIRED Threat Level

Small, easily weaponizable drones have become a feature of battlefields from the Middle East to Ukraine. Now the threat looms over the US homelandand the Pentagon's ability to respond is limited.

article thumbnail

Jailbreaking LLM-Controlled Robots

Schneier on Security

Surprising no one, it’s easy to trick an LLM-controlled robot into ignoring its safety instructions.

IT 88
article thumbnail

U.S. authorities seized cybercrime marketplace Rydox

Security Affairs

The U.S. Department of Justice (DoJ) announced the seizure of the cybercrime marketplace Rydox (“rydox.ru” and “rydox[.]cc”). The U.S. Department of Justice (DoJ) seized Rydox, a cybercrime marketplace for selling stolen personal data and fraud tools. Kosovars authorities arrested three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli.

Sales 99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Be Careful of Malicious Ads

KnowBe4

For decades, we have all been warned to be appropriately skeptical of internet search engine results. Sadly, most people are not.

article thumbnail

US Officials Recommend Encryption Apps Amid Chinese Telecom Hacking

WIRED Threat Level

Plus: Russian spies keep hijacking other hackers infrastructure, Hydra dark web market admin gets life sentence in Russia, and more of the weeks top security news.

article thumbnail

The top 5 trends transforming retail and CPG in 2025 

OpenText Information Management

The retail and Consumer Packaged Goods (CPG) industries are experiencing a profound technological metamorphosis, driven by rapid digital innovation, changing consumer expectations, and the need for operational efficiency. As we navigate through 2025, five groundbreaking technological trends are fundamentally reimagining how businesses engage with consumers, manage supply chains , and create value.

Retail 75
article thumbnail

2023 Anna Jaques Hospital data breach impacted over 310,000 people

Security Affairs

Anna Jaques Hospital revealed thatthe ransomware attack it suffered last year has exposed sensitive health data for over 316,000 patients. On December 25, 2023, a ransomware attack hit the Anna Jaques Hospital. The hospital revealed that the security breach exposed sensitive health data for over 316,000 patients. Anna Jaques Hospital is a not-for-profit community healthcare facility located in Newburyport, Massachusetts.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Nearly Half a Billion Emails in 2024 Were Malicious

KnowBe4

A new report from Hornetsecurity has found that 427.8 million emails received by businesses in 2024 contained malicious content.

article thumbnail

Human Misuse Will Make Artificial Intelligence More Dangerous

WIRED Threat Level

AI creates what its told to, from plucking fanciful evidence from thin air, to arbitrarily removing peoples rights, to sowing doubt over public misdeeds.

article thumbnail

Discover the Benefits of Glucophage SR at Our Trusted Pharmacy

IG Guru

Understanding Glucophage SR: A Comprehensive Guide for Patients In today’s fast-paced world, managing health conditions such as type 2 diabetes has become increasingly important. Glucophage SR, a widely recognized medication, plays a crucial role in controlling blood sugar levels. It’s designed to release metformin slowly, providing a steady effect throughout the day.

IT 77
article thumbnail

US Bitcoin ATM operator Byte Federal suffered a data breach

Security Affairs

US Bitcoin ATM operator Byte Federal suffered a data breach impacting 58,000 customers, attackers gained unauthorized access to a server via GitLab flaw. US Bitcoin ATM operator Byte Federal disclosed a data breach after threat actors gained unauthorized access to a company server by exploiting a GitLab vulnerability. Byte Federal is a company specializing in cryptocurrency services through its network of over 1,200 Bitcoin ATMs across the United States.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Mobile Phishing Campaign Targets Job Seekers

KnowBe4

Researchers at Zimperium warn that a phishing campaign is targeting Android phones to deliver the Antidot banking trojan.

article thumbnail

The New Jersey Drone Mystery May Not Actually Be That Mysterious

WIRED Threat Level

A flurry of drone sightings across New Jersey and New York has sparked national intrigue and US government responses. But experts are pouring cold water on Americas hottest new conspiracy theory.

article thumbnail

Rising AI Enforcement: Insights From State Attorney General Settlement and U.S. FTC Sweep for Risk Management and Governance

Data Matters

Recent enforcement actions by both state and federal law enforcement signal that companies that make or use artificial intelligence products are facing increased scrutiny under existing unfair and deceptive acts and practices laws. Several late-2024 examples present important insights for companies navigating how to effectively and legally implement artificial intelligence technologies in their businesses.