article thumbnail

The Dark Side of AI: Previewing Criminal Uses

Data Breach Today

Threats Include Social Engineering, Insider Trading, Face-Seeking Assassin Drones "Has anyone witnessed any examples of criminals abusing artificial intelligence?" A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging

article thumbnail

Ransomware Attackers Exfiltrate Data From Magellan Health

Data Breach Today

Another Example of How Cybercriminals' Tactics Are Changing Magellan Health, a U.S. managed care company that focuses on specialty areas of healthcare, says it was hit by a ransomware attack that involved the exfiltration of data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Memo to Ransomware Victims: Seeking Help May Save You Money

Data Breach Today

The latest example: Errors in DarkSide - and its BlackMatter rebrand - enabled security experts to quietly decrypt many victims' files for free, saving millions in potential ransom payments.

article thumbnail

Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves

Data Breach Today

The DoppelPaymer operation, for example, appears to have reinvented itself as Grief, while the administrator of Babuk has launched a ransomware-friendly cybercrime forum called RAMP.

article thumbnail

The Definitive Guide to Dashboard Design

Download the Definitive Guide to learn why dashboard design matters, and how to do it well.

article thumbnail

Panasonic India's Data Released in Extortion Plot

Data Breach Today

Experts Say Attack is Textbook Example of Hack and Extort Campaign A 4GB data archive belonging to Panasonic India has been released by a hacker who waged an extortion plot. The company says no highly confidential data was revealed, but a look at the data suggests otherwise.

Archiving 299
article thumbnail

Kaspersky: SolarWinds Backdoor Similar to Russian 'Kazuar'

Data Breach Today

For Example, Both Backdoors Use Same 'Sleeping' Algorithm The "Sunburst" backdoor deployed in the breach of SolarWinds' Orion network monitoring tool uses some of the same code found in the "Kazuar" backdoor, which security researchers have previously tied to Russian hackers, the security firm Kaspersky reports.

Security 297
article thumbnail

Introducing CDEs to Your Enterprise

Gain insights into best practices for implementing scalable CDEs, using real-world examples and guidance to successfully roll out managed platforms across enterprise environments.

article thumbnail

Get Better Network Graphs & Save Analysts Time

For example, instead of a graph with six related nodes, you get a resolved graph that condenses six nodes into one person. Critical graph visualizations with overly complex nodes and connections transform into network graphs that are much easier and faster for analysts to understand.

article thumbnail

The Definitive Guide to Predictive Analytics

The Definitive Guide to Predictive Analytics has everything you need to get started, including real-world examples, steps to build your models, and solutions to common data challenges. By embedding predictive analytics, you can future-proof your application and give users sophisticated insights.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Sales Effectiveness: The B2B Sales Leader's Guide

You’ll get a deep dive on: Proven methods for warming up cold calls Coaching points for responding to price pressure early and often Front-line examples of how to win the battle for customer retention This guide is designed to help today’s B2B sales leaders ramp up their effectiveness in any economic environment.

article thumbnail

Outrun Your Competition: Best Practices for Accelerating Sales Processes

Dig into our data-backed guide to learn: Proven methods for warming up cold calls Coaching points for responding to price pressure early and often Front-line examples of how to win the battle for customer retention

article thumbnail

Solving the Biggest Tech Challenges in RevOps

In this eBook, we’ll run through real-world examples that show how RevOps teams can benefit from modern solutions for the access, management, and activation of their GTM data.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.