BankInfoSecurity.com
Tech Giants, Utility Firms Form AI Consortium
7 months 2 weeks ago
Open Power AI Consortium Members Include Nvidia and Microsoft
Tech giants and utility providers on Thursday formed an alliance to harness artificial intelligence for a more resilient power grid. More than two dozen organizations are participating in the Open Power AI Consortium led by the Electric Power Research Institute.
Tech giants and utility providers on Thursday formed an alliance to harness artificial intelligence for a more resilient power grid. More than two dozen organizations are participating in the Open Power AI Consortium led by the Electric Power Research Institute.
Software Firm Notifying Patients, Practices of Data Exposure
7 months 2 weeks ago
Researcher Found Unsecured Database Server Containing 1,864 GB of OrthoMinds' Data
An orthodontic practice software vendor is notifying an undisclosed number of patients that their data was exposed to the internet for 10 days last November. The security researcher who discovered the data leak said the incident appears to have lasted longer and affected more than 200,000 patients.
An orthodontic practice software vendor is notifying an undisclosed number of patients that their data was exposed to the internet for 10 days last November. The security researcher who discovered the data leak said the incident appears to have lasted longer and affected more than 200,000 patients.
Chinese Hackers Exploit Unpatched Servers in Taiwan
7 months 2 weeks ago
UAT-5918 Breaches Taiwan's Critical Sectors Using N-Day Flaws for Cyberespionage
Hackers with ties to China-based hacking groups including Volt Typhoon are breaching Taiwan's critical infrastructure by exploiting unpatched web and application servers as entry points for a cyberespionage campaign. Cisco Talos threat hunters identified the new threat actor as UAT-5918.
Hackers with ties to China-based hacking groups including Volt Typhoon are breaching Taiwan's critical infrastructure by exploiting unpatched web and application servers as entry points for a cyberespionage campaign. Cisco Talos threat hunters identified the new threat actor as UAT-5918.
Dataminr Raises $85M to Advance Predictive, Agentic AI Tools
7 months 2 weeks ago
Dave DeWalt's NightDragon and HSBC to Back New Product Rollouts and Global Growth
Dataminr received $85 million in convertible pre-IPO funding from Dave DeWalt’s NightDragon and HSBC. The investment will support the rollout of context agents and pre-generative AI capabilities, and enable the company to scale internationally ahead of its planned initial public offering.
Dataminr received $85 million in convertible pre-IPO funding from Dave DeWalt’s NightDragon and HSBC. The investment will support the rollout of context agents and pre-generative AI capabilities, and enable the company to scale internationally ahead of its planned initial public offering.
Shifting the Mindset from Cost Center to Revenue Generator
7 months 2 weeks ago
How Strong AML and Fraud Prevention Controls Can Differentiate Your Fintech and Help You Scale
As fintechs and financial institutions navigate an increasingly complex payments ecosystem, robust AML and fraud prevention controls are no longer just a compliance necessity—they’re a strategic advantage. Discover how risk-based frameworks, intelligent detection systems, and stronger partnerships can enhance trust, streamline operations, and safeguard against evolving financial crime threats.
Why Google and Wiz Struck a Deal Now After 2024 Talks Caved
7 months 2 weeks ago
Major Competitive, Regulatory, Economic and Technological Changes Fueled This Deal
The fact a $32 billion acquisition agreement between Google and Wiz was reached speaks to major changes that have occurred in the market around the competitive landscape, the regulatory environment, the macroeconomic environment, customer buying behavior, and the technology itself.
The fact a $32 billion acquisition agreement between Google and Wiz was reached speaks to major changes that have occurred in the market around the competitive landscape, the regulatory environment, the macroeconomic environment, customer buying behavior, and the technology itself.
Violent ChatGPT Hallucination Sparks GDPR Complaint
7 months 2 weeks ago
Norwegian Man Tells OpenAI: I Didn't Kill My Children
A Norwegian man is peeved that a chatbot hallucinated a violent backstory for his life after seeing that ChatGPT apparently believes he's a child killer spending decades inside prison. "The fact that someone could read this output and believe it is true is what scares me the most," he said.
A Norwegian man is peeved that a chatbot hallucinated a violent backstory for his life after seeing that ChatGPT apparently believes he's a child killer spending decades inside prison. "The fact that someone could read this output and believe it is true is what scares me the most," he said.
Authorities Warn of Security Terror Threats to Hospitals
7 months 2 weeks ago
Health ISAC, AHA Bulletin Urges Entities to Bolster Physical, Cyber, Preparedness
Threats transmitted on social media intimating coordinated terrorist attacks on hospitals in mid-tier U.S. cities have industry authorities warning the healthcare sector to shore up physical and cyber security, as well as emergency management response plans.
Threats transmitted on social media intimating coordinated terrorist attacks on hospitals in mid-tier U.S. cities have industry authorities warning the healthcare sector to shore up physical and cyber security, as well as emergency management response plans.
Fighting Financial Fraud With Adversarial AI Defenses
7 months 2 weeks ago
Experts Weigh the Advantages and Risks of Generative Adversarial Networks
With traditional rule-based fraud detection systems and even conventional machine learning models struggling to identify these highly deceptive fraud patterns, financial institutions are exploring generative adversarial networks to enhance fraud detection.
With traditional rule-based fraud detection systems and even conventional machine learning models struggling to identify these highly deceptive fraud patterns, financial institutions are exploring generative adversarial networks to enhance fraud detection.
White House Shifting Cyber Risk to State and Local Agencies
7 months 2 weeks ago
Executive Order Shifts Cyber Responsibilities to States, Sparking Security Concerns
The White House is shifting cybersecurity risk management from the federal government to states and local agencies, marking a pivot in how Washington supports the protection of elections and critical infrastructure. Many states lack their own national security and cyberthreat intelligence centers.
The White House is shifting cybersecurity risk management from the federal government to states and local agencies, marking a pivot in how Washington supports the protection of elections and critical infrastructure. Many states lack their own national security and cyberthreat intelligence centers.
Rash of Hacks Hits Nursing Homes and Rehab Centers
7 months 2 weeks ago
Why Are Facilities Caring for the Elderly 'Targets of Opportunity' For Cybercrime?
More than a half dozen nursing homes and rehabilitation centers have reported an assortment of major hacks in the last month affecting a total of more than 130,000 individuals. What makes facilities caring for elderly and disabled patients an attractive and vulnerable target to cybercriminals?
More than a half dozen nursing homes and rehabilitation centers have reported an assortment of major hacks in the last month affecting a total of more than 130,000 individuals. What makes facilities caring for elderly and disabled patients an attractive and vulnerable target to cybercriminals?
Hackers Exploit Unpatched ChatGPT Bug
7 months 2 weeks ago
Over 10K Exploit Attempts Recorded in a Week From a Single Malicious IP
Hackers are exploiting a vulnerability in ChatGPT's infrastructure to redirect users to malicious websites, with security researchers recording more than 10,000 exploit attempts in a week from a single malicious IP address. The financial sector has borne the brunt of the attacks.
Hackers are exploiting a vulnerability in ChatGPT's infrastructure to redirect users to malicious websites, with security researchers recording more than 10,000 exploit attempts in a week from a single malicious IP address. The financial sector has borne the brunt of the attacks.
Tesla Owners Doxxed as Elon Musk and DOGE Fallout Grows
7 months 2 weeks ago
'Dogequest' Site Provided Tesla Owners Addresses, Names and Phone Numbers
The White House slammed a website that purported to reveal the names, addresses and phone numbers of Tesla owners - unless they showed proof of selling their vehicles made by Elon Musk's car company - amid growing criticism over his efforts to sharply reduce the size of the federal government.
The White House slammed a website that purported to reveal the names, addresses and phone numbers of Tesla owners - unless they showed proof of selling their vehicles made by Elon Musk's car company - amid growing criticism over his efforts to sharply reduce the size of the federal government.
UK NCSC Sets 2035 Deadline for Post-Quantum Migration
7 months 2 weeks ago
Cyber Agency Urges Critical Infrastructure Operators to Migrate Within the Deadline
The British cybersecurity agency urged critical infrastructure operators to adapt to post-quantum cryptography by 2035 as it and other government agencies prepare for the inevitability of quantum computers capable of breaking current encryption algorithms.
The British cybersecurity agency urged critical infrastructure operators to adapt to post-quantum cryptography by 2035 as it and other government agencies prepare for the inevitability of quantum computers capable of breaking current encryption algorithms.
How to Boost Your Career at Cybersecurity Conferences
7 months 2 weeks ago
Get the Most Out of Your Event by Planning, Networking and Following Up
Conference season is upon us, and there's no better time to work on your career at one or more of the major cybersecurity conferences in the United States this spring and summer. These conferences do cost money, but with a bit of preparation, you can invest in your career.
Conference season is upon us, and there's no better time to work on your career at one or more of the major cybersecurity conferences in the United States this spring and summer. These conferences do cost money, but with a bit of preparation, you can invest in your career.
How Google’s $32B Wiz Acquisition Will Reshape Cloud Defense
7 months 2 weeks ago
Google Boosts Native Cloud Security with Wiz, But Deal Raises Multi-Cloud Concerns
Google’s $32 billion deal to acquire Wiz boosts its cloud security capabilities, shifting away from third-party partnerships. Wiz’s market leadership and acquisitions make it a valuable asset, but concerns remain about its future neutrality in multi-cloud environments and AWS, Azure relationships.
Google’s $32 billion deal to acquire Wiz boosts its cloud security capabilities, shifting away from third-party partnerships. Wiz’s market leadership and acquisitions make it a valuable asset, but concerns remain about its future neutrality in multi-cloud environments and AWS, Azure relationships.
AI Models Trained on Buggy Code Mirror Errors, Study Finds
7 months 2 weeks ago
Researchers Examined 7 LLMs to Determine How they Dealt with Flawed Code
Large language models trained on flawed data tend to replicate those mistakes, researchers found. "In bug-prone tasks, the likelihood of LLMs generating correct code is nearly the same as generating buggy code," found researchers from institutions including the Chinese Academy of Sciences.
Large language models trained on flawed data tend to replicate those mistakes, researchers found. "In bug-prone tasks, the likelihood of LLMs generating correct code is nearly the same as generating buggy code," found researchers from institutions including the Chinese Academy of Sciences.
US DOGE Staffer Sent Unencrypted Treasury Data Over Email
7 months 2 weeks ago
Agency Official Says Ex-DOGE Staffer's Data Breach Violated Security Policy
An ex-Department of Government Efficiency staffer violated Treasury rules by sending unencrypted personal data to two senior Trump administration officials without approval, raising concerns about the task force's apparent disregard for or lack of knowledge about critical data security policies.
An ex-Department of Government Efficiency staffer violated Treasury rules by sending unencrypted personal data to two senior Trump administration officials without approval, raising concerns about the task force's apparent disregard for or lack of knowledge about critical data security policies.
Why States Will Need to Step Up Cyber Help for Healthcare
7 months 2 weeks ago
As uncertainty mounts about the range of cyber resources the federal government will continue to offer healthcare and other critical infrastructure sectors during the Trump administration, states will need to step up their support, said Mike Hamilton, field CISO of cybersecurity firm Lumifi Cyber.
Checked
7 hours 39 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed