Did you know that your Ring doorbell video footage could be part of police surveillance? Ring saw search warrants increase 33 percent in 2022 from the previous year. The lack of legal controls on what police can ask for, and judges failing to properly scrutinize these warrants, opens the door for even indoor home footage […]
In a recent report Cyberhaven detected and blocked requests to input data into ChatGPT from 4.2% of the 1.6 million workers at its client companies because of the risk of leaking confidential information, client data, source code, or regulated information to the ChatGPT. In one case, an executive cut and pasted the firm’s 2023 strategy document into […]
Almost half of all Dutch company websites are vulnerable to attacks by cyber criminals due to vulnerabilities in software, configurations and web services. The result is often data theft or extortion through ransomware. “Entrepreneurs are insufficiently aware of the risks,” says cybersecurity specialist ID Control based on three studies of web shops, government websites and […]
How did the crooks get in given that the needed access credentials of 4 developers at LastPass were locked up in a secure password vault to which only they had access? Access to the vault password was accomplished by targeting the DevOps engineer’s home computer and exploiting a vulnerable third-party media software package, which enabled […]
The Bundesamt für Sicherheit in der Informationstechnik (BSI), part of the German Ministry of Internal Affairs, has investigated web shops which show that they are often unsafe. Seven out of ten researched webshop platforms use vulnerable JavaScript libraries. In addition, almost all solutions had inadequate password policies and nearly half of the products use end-of-life […]
The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended states that the executive order is too vague, and leaves US courts — who would be the sole interpreters of the proposed EU-US Data Privacy Framework — wiggle room to approve the bulk collection of data for signals intelligence, and doesn’t apply […]
The ChatGPT tool is a language model based on the GPT-3.5 architecture and trained by OpenAI. It uses a web crawler to collect data and generate responses to user input. While this technology has many useful applications, it also raises concerns about the potential misuse of proprietary information. One way that the ChatGPT tool collects […]
A cybersecurity insurer predicts that a 13% growth to 1,900 CVEs monthly would include 270 high-severity and 155 critical-severity vulnerabilities. The predictions are based on data collected over the last ten years. For most CVEs, the time to exploit is within 90 days of public disclosure, while the majority of exploits take place within the […]
The EDPS – European Data Protection Supervisor states in an opinion that in order to act as a controller, the entity / involved party must determine the purposes & essential means of the processing. “Essential means” are closely linked to the purpose and the scope of the processing.On the other hand, “non-essential means” concern more […]
Irish university MTU Cork has decided to close all four campuses for two days and cancel all classes due to an intrusion into its IT systems. The attack took place last weekend and would have been detected at an early stage. The university gives no details about what kind of attack it is exactly and […]