Sat.Aug 24, 2024 - Fri.Aug 30, 2024

article thumbnail

AI Readiness Assessment: Preparing Your Organization's Unstructured Data for the Future

AIIM

I recently had the pleasure of hosting a conversation with Rob Bogue, the core author of AIIM's new resource " Organizational Readiness for Generative AI: Leveraging Unstructured Data for Success." This assessment focuses on how to prepare unstructured data for AI implementation. In this blog post, I'll share key insights from our discussion and highlight the importance of this tool for information management professionals.

article thumbnail

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Krebs on Security

Malicious hackers are exploiting a zero-day vulnerability in Versa Director , a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon , a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Credit Union Issues Belated MOVEit Data Breach Notification

Data Breach Today

Texas Credit Union Only Just Notifying 500,000 Members About May 2023 Data Theft Fifteen months after a massive supply-chain attack hit users of MOVEit secure file-transfer software, Texas Dow Employees Credit Union has issued a data breach notification pertaining to 500,474 victims, saying it only discovered last month their personally identifiable information got stolen.

article thumbnail

Linux malware sedexp uses udev rules for persistence and evasion

Security Affairs

Researchers spotted a new stealthy Linux malware named sedexp that uses Linux udev rules to achieve persistence and evade detection. Aon’s Cyber Solutions spotted a new malware family, called sedexp, that relies on a lesser-known Linux persistence technique. The malware has been active since at least 2022 but remained largely undetected for years. The experts pointed out that the persistence method employed by this malware is currently undocumented by MITRE ATT&CK.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published

Schneier on Security

The “ long lost lecture ” by Adm. Grace Hopper has been published by the NSA. (Note that there are two parts.) It’s a wonderful talk: funny, engaging, wise, prescient. Remember that talk was given in 1982, less than a year before the ARPANET switched to TCP/IP and the internet went operational. She was a remarkable person. Listening to it, and thinking about the audience of NSA engineers, I wonder how much of what she’s talking about as the future of computing—minia

IT 121

More Trending

article thumbnail

Breach Roundup: Ex-Verizon Worker Cops to Spying for China

Data Breach Today

Also: Turn in Volodymyr Kadariya, Get $2.5 Million from Uncle Sam This week, an ex-Verizon employee pleaded guilty, SonicWall fixed critical flaws,South Korean hackers exploited a zero-day, U.S. retailer Dick's Sporting Goods was breached, the U.S. government offered a big reward, Grok AI will send election queries to Vote.gov, and HIPAA is 28 years old.

Retail 309
article thumbnail

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns

Security Affairs

Threat actors are actively exploiting a critical flaw in the Atlassian Confluence Data Center and Confluence Server in cryptocurrency mining campaigns. The critical vulnerability CVE-2023-22527 (CVSS score 10.0) in the Atlassian Confluence Data Center and Confluence Server is being actively exploited for cryptojacking campaigns. The vulnerability is a template injection vulnerability that can allow remote attackers to execute arbitrary code on vulnerable Confluence installs.

Mining 137
article thumbnail

US Federal Court Rules Against Geofence Warrants

Schneier on Security

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary—are unconstitutional. The decision seems obvious to me, but you can’t take anything for granted.

article thumbnail

How Does a VPN Work? A Comprehensive Beginner’s Overview

eSecurity Planet

A virtual private network (VPN) does more than just mask your identity—it fundamentally changes how your data moves across the internet. But what’s really going on under the hood when you browse the web using a VPN? Understanding this can be crucial for IT managers and professionals who are keen on maintaining robust cybersecurity practices. In this article, we’ll explain how a VPN works, explore its encryption mechanisms, review common VPN protocols, and discuss its various business appli

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Ransomware Hackers Steal Medical Insurance Data of 1M People

Data Breach Today

Young Consulting Says Health Data Exposed; Ransomware Group Leaked Stolen Data Young Consulting, which develops software for the stop-loss insurance market, is notifying 1 million individuals that their personal information was stolen earlier this year in a hack attack. The BlackSuit ransomware group, a rebrand of Royal, subsequently claimed credit and leaked stolen data.

Insurance 304
article thumbnail

France police arrested Telegram CEO Pavel Durov

Security Affairs

French police arrested Pavel Durov, founder and chief executive of Telegram, due to the lack of content moderation that advantaged criminal activity. Pavel Durov, the founder and CEO of Telegram , was arrested at Bourget airport near Paris on Saturday evening. According to the media, the arrest is linked to an investigation in France concerning the lack of content moderators on Telegram, which authorities believe advantaged criminal activity. “Durov was travelling aboard his private jet, T

article thumbnail

Email Compromise Remains Top Threat Incident Type for the Third Quarter in a Row

KnowBe4

New analysis of Q2 threats shows a consistent pattern of behavior on the part of threat actors and threat groups, providing organizations with a clear path to protect themselves.

Phishing 105
article thumbnail

Vulnerability Recap 8/27/24 – Wide Range of Vulnerabilities This Week

eSecurity Planet

If you updated Chrome and SolarWinds Web Help Desk in the last couple of weeks due to vulnerabilities, get ready to update them again — each has a new flaw. Additionally, a popular WordPress plugin has a critical issue, and AWS’s Application Load Balancer feature has a configuration vulnerability. As always, the best way to get flaws quickly patched is to scan for vulnerabilities frequently and have a plan for fixing and documenting them.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Auditors Uncover Lax FBI Hard Drive Disposal Practices

Data Breach Today

Hard Drives Slated For Destruction Kept in Open Cardboard Boxes The FBI had a loose hard disk disposal problem that auditors say put classified information at risk. The bureau, auditor said, has a tracking system for obsolete computers and servers earmarked for destruction - but not for storage media extracted from the computer chassis.

Risk 289
article thumbnail

Hackers can take over Ecovacs home robots to spy on their owners

Security Affairs

Recently, researchers warned vacuum and lawn mower robots made by Ecovacs could be hacked to spy on their owners, the company will fix it. During the recent Def Con hacking conference, security researchers Dennis Giese and Braelynn explained that attackers can exploit flaws in vacuum and lawn mower robots made by Ecovacs to spy on their owners. The researchers analyzed the following devices: Ecovacs Deebot 900 Series, Ecovacs Deebot N8/T8, Ecovacs Deebot N9/T9, Ecovacs Deebot N10/T10, Ecovacs De

article thumbnail

The tablet I recommend most for business travel is not an iPad or ThinkPad

Collaboration 2.0

The 11th-edition Surface Pro is Microsoft's first Copilot+ PC to hit the market, featuring a brilliant OLED display and snappy processor that's as versatile as it is efficient.

article thumbnail

Weekly Update 414

Troy Hunt

This is such a significant week for us, to finally have Stefan join us as a proper employee at HIBP. When you start out as a pet project, you never really consider yourself a "proper" employee because, well, it's just you mucking around. And then when Charlotte started "officially" working for HIBP a few years ago, well, that's my wife helping me out.

Access 98
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

French Police Arrest Telegram CEO and Owner

Data Breach Today

Pavel Durov Reportedly Detained For Complicity Over Criminal Use French media reported Saturday the detention outside Paris of Pavel Durov, CEO and owner of social media network Telegram, reportedly for failing to take steps to curb criminal activity on the platform. The Russian Embassy in France said it has demanded an explanation from the French government.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

China-linked APT group Volt Typhoon exploited a zero-day flaw in Versa Director to upload a custom webshell in target networks. China-linked APT Volt Typhoon exploited a zero-day vulnerability, tracked as CVE-2024-39717 , in Versa Director, to deploy a custom webshell on breached networks. Versa Director is a centralized management and orchestration platform used primarily by Internet Service Providers (ISPs) and Managed Service Providers (MSPs) to manage and monitor Software-Defined Wide Area N

article thumbnail

This 13-inch laptop I recommend for work travel is not a MacBook or a Dell

Collaboration 2.0

Lenovo's ThinkBook 13x Gen 4 has the lightweight and durable form factor the series is known for, with added integrations from the new Magic Bay, which makes swapping peripherals easy.

98
article thumbnail

AI governance versus model management: What’s the difference?

Collibra

The world of artificial intelligence (AI) is chock-full with so many buzzwords and nomenclature that it’s hard to keep track of what’s really been said. It also causes a lot of confusion for those that aren’t steeped in this world on a regular basis, and even for those that are, there’s often disagreement on terms or phrases. Case in point — AI governance and AI model management.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Small Rural Alabama Hospital Reports Big 2023 Hacking Breach

Data Breach Today

Why Did it Take So Long to Notify Regulators and Affected Patients? A small rural Alabama hospital is notifying more than 61,000 patients that their sensitive information was potentially compromised in an October 2023 hacking incident. Why the many months-long delay in notifying regulators and affected individuals?

IT 268
article thumbnail

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa

Security Affairs

Russia-linked APT29 group was spotted reusing iOS and Chrome exploits previously developed by surveillance firms NSO Group and Intellexa. Google TAG (Threat Analysis Group) researchers observed the Russia-linked group APT29 (aka SVR group , BlueBravo , Cozy Bear , Nobelium , Midnight Blizzard , and The Dukes ). using exploits previously used by surveillance software vendors NSO Group and Intellexa.

article thumbnail

Latest Govee Permanent Outdoor Lights are brighter than ever. Put them up this weekend

Collaboration 2.0

Available now at the same price as Govee's previous model, these second-generation lights promise improved reliability, Matter compatibility, and white lights for daily use and security.

article thumbnail

Google, Apple, and Discord Let Harmful AI 'Undress' Websites Use Their Sign-On Systems

WIRED Threat Level

Single sign-on systems from several Big Tech companies are being incorporated into deepfake generators, WIRED found. Discord and Apple have started to terminate some developers’ accounts.

Privacy 98
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Seattle-Tacoma Airport IT Outages Persist Into Day 3

Data Breach Today

Travelers in the Pacific Northwest's busiest airport should travel light and gird for extra levels of frustration in the aftermath of a suspected Saturday cyberattack. The Seattle-Tacoma International Airport said that systems "experienced certain system outages indicating a possible cyberattack.

IT 252
article thumbnail

US offers $2.5M reward for Belarusian man involved in mass malware distribution

Security Affairs

The US Department of State offers a $2.5 million reward for information leading to the arrest of a Belarusian cybercriminal involved in the mass malware distribution. The US Department of State announced a $2.5 million reward for information leading to the arrest of Volodymyr Kadariya (38), a Belarusian national allegedly involved in a significant malware organization.

article thumbnail

Fewer, High-Profile Ransomware Attacks Are Yielding Higher Ransoms

KnowBe4

Analysis of cryptocurrency payments made on the blockchain highlights shifts in the size and frequency of ransomware attacks and may paint a bleak picture for the remainder of the year.