Page 2,582«..1020..2,5812,5822,5832,584..2,5902,600..»

Majority of malware occurs via HTTPS-encrypted connections – TechSpot

In a nutshell: A new report from WatchGuard Technologies reveals how nearly all malware is arriving via HTTPS-encrypted connections. The firms latest quarterly Internet Security Report also highlights noticeable increases in fileless malware, as well as network and ransomware attacks.

The network security company said that in Q2 2021, 91.5% of malware arrived over an encrypted connection. It added that any company not examining encrypted HTTPS traffic at the perimeter will miss out on 9/10 of all malware. The data is derived from the firms own active WatchGuard Fireboxes.

With much of the world still firmly operating in a mobile or hybrid workforce model, the traditional network perimeter doesnt always factor into the cybersecurity defence equation, said Corey Nachreiner, chief security officer at WatchGuard.

Ransomware attacks were decreasing between 2018 and 2020, but during just the first half of 2021, attacks equaled the total amount seen in 2020. Thus, this years volume is expected to increase by over 150% compared to 2020.

WatchGuard blocked more than 16.6 million malware variants (438 per device) and nearly 5.2 million network threats (137 per device). The report also shows how even though malware attacks experienced a small 3.8% decline in Q2, threat actors have taken advantage of hybrid work models by targeting malware towards both remote users at home and office infrastructure.

The increase in the use of malware has targeted Microsoft Exchange servers and generic email users to download remote access trojans (RATs) in highly sensitive locations, with the reason most likely attributed to the workforce and learners returning to hybrid offices and academic environments.

Additionally, Microsoft Office continues to be a popular malware target. Debuting on top of the 10 most-widespread network attacks list, the 2017 RCE vulnerability affects Microsoft browsers. Though it may be an old exploit and patched in most systems (hopefully), those that have yet to patch are in for a rude awakening if an attacker is able to get to it before they do, the report warns.

Despite remote workforces becoming more commonplace, WatchGuard detected an increase in network attacks, rising by 22% to 5.1 million compared to a million fewer during Q1. The statistics show an aggressive course that highlights the growing importance of maintaining perimeter security alongside user-focused protections.

A new threat report from Eset, meanwhile, detailed how hackers are turning up their efforts for guessing passwords. Between May and August 2021, the security firm detected 55 billion new brute-force attacks focused on public-facing RDP (Remote Desktop Protocol) services, a 104% increase compared to the 27 billion attacks carried out during the first four months of 2021. Attackers are exploiting the opportunity because of the increase in remote working; the pandemic has led to much of the workforce utilizing remote-desktop services.

Visit link:
Majority of malware occurs via HTTPS-encrypted connections - TechSpot

Read More..

Why James Bond Doesnt Use an iPhone – WIRED

No Time To Die is almost upon us, and scores of James Bond fanatics are eager to see the spy use ingenious gadgets to save the day. But does he actually use the very best tech to get the job done? We think not. Laser Polaroid camera, anyone?

Before we get into what competent real-life spies should be using, lets look at what Bond is set to wield in his long-delayed latest outing. Thanks to the pandemic's cinematic shutdown, the movie will feature the Nokia 3310, Nokia 7.2, and Nokia 8.3 5G. Release dates for these phones came in the year 2000, September 2019, and October 2020, respectively.

Even looking past the unlikely union of Britain's fictional superspy and Nokia, a brand that captured a mere 0.7 percent of the smartphone market in Q4 last year, out-of-date mobiles are hardly cutting edge bad-guy-beating techand thats probably not entirely a good thing.

James Hadley, CEO and founder of Immersive Labsa cybersecurity training and skills platformand previously of the UK's Government Communications Headquarters had this to say on Bonds untimely mobile choices: If Bond is handed an older Android phone, he should check Q has updated the OS to prevent against new software vulnerabilities.

However, Hadley sees the merits in older phones, but they just arent practical for a modern spy. There are some people who believe using dumb phonespre-smartphone devices less reliant on softwarekeep them safer," he says. "However, this would obviously limit Bond's ability to use even the most basic internet applications.

So, for these older phones, its about prepping them to make them less vulnerable. As Hadley says, fingers crossed Q is savvy when it comes to modern security threats and not just lethal fountain pens. Jake Moore, a cybersecurity expert at internet security firm Eset and a former police officer, explains: Usually older devices come with more security threats, but if a device has been set up correctly with limited user control and bespoke tweaks, then the anti-tracking, anti-surveillance would balance out the legacy operating system and other flaws.

What if Bond were using a bleeding-edge technology then, the very latest? Well, we know from the director of another Daniel Craig joint, Rian Johnson of Knives Out, that James Bond would be free to use an iPhone should a deal be struck. The director revealed in an interview with Vanity Fair that Apple disallows movie villains from using its latest and greatest devices.

However, an iPhone would not be a good option for 007. Untraceable phones with anti-surveillance, anti-interception, and location-spoofing functionality are a must for James Bond. An iPhone, however formatted, just wouldnt be able to offer this ability to ensure tracking isnt an option," says Moore. "The security of an iPhone is impressive enough for the normal user, but with threats such as Pegasus around periodically, it makes it difficult for a spy to use one securely and confidently.

Pegasus is a piece of NSO (an Israeli technology firm) spyware affecting the iPhone that could copy messages, record calls, and even access the camera. Apple has responded by releasing patches to fix bugs that were thought to have been exploited by Pegasus.

Pegasus spyware would no doubt be used by adversaries to target James Bond if he were an iPhone user, says Moore. While an iPhone might be good for capturing pictures of explosions and car chases, any downloading of embassy blueprints or covert incursions should be done on a locked-down terminal managed by a specialist team, inside a secure network, Hadley says.

However, theres also more to it than Pegasus, with a recent explosive spywarereportlooking into the further concerns security experts have relating to iOS, stating Apple's closed ecosystem approach restricts their ability to use monitoring tools and conduct investigations necessary to uncover vulnerabilities.

Read the original:
Why James Bond Doesnt Use an iPhone - WIRED

Read More..

IT security day illuminates the interaction between AI and cybersecurity – Market Research Telecast

The use of artificial intelligence will increasingly help cybersecurity systems to detect the intelligent attacks of hackers much better, to avoid damage and to minimize risks in the digitization process. This makes AI a critical factor in corporate cybersecurity. Against this background, the program for this years IT Security Day came about. The event, which will be held online again this year, will take place on November 11th and will include six lectures and three panel discussions.

Central task of the von Heise Academy in cooperation with the Institute for Internet Security of the Westphalian University of Gelsenkirchen conducted online conference is the answer to the following questions:

The IT security day is aimed at security officers, security experts, data scientists and IT project managers. The event costs 149 euros up to and including October 14th, then 199 euros (all prices including VAT). Further information can be found on the conference website.

(me)

Article Source

Disclaimer: This article is generated from the feed and not edited by our team.

Here is the original post:
IT security day illuminates the interaction between AI and cybersecurity - Market Research Telecast

Read More..

WatchGuard Threat Lab Reports 91.5% Of Malware Arriving Over Encrypted Connections – ISBuzz News

New research also shows dramatic increases in fileless malware, malware detections per appliance and booming network and ransomware attacks

The latest quarterlyInternet Security Report from the WatchGuard Threat Lab released today shows an astonishing 91.5% of malware arriving over HTTPS-encrypted connections during Q2 2021. This is a dramatic increase over the previous quarter and means that any organisation that isnt examining encrypted HTTPS traffic at the perimeter is missing 9/10 of all malware. Researchers also found alarming surges across fileless malware threats, a dramatic growth in ransomware and a big increase in network attacks.

With much of the world still firmly operating in a mobile or hybrid workforce model, the traditional network perimeter doesnt always factor into the cybersecurity defence equation, said Corey Nachreiner, chief security officer at WatchGuard. While a strong perimeter defence is still an important part of a layered security approach, strong endpoint protection (EPP) and endpoint detection and response (EDR) is increasingly essential.

Among its most notable findings, WatchGuards Q2 2021 Internet Security Report reveals:

The rest is here:
WatchGuard Threat Lab Reports 91.5% Of Malware Arriving Over Encrypted Connections - ISBuzz News

Read More..

GriftHorse is a massive Android premium services scam. Facebook open-sources a test tool. Updates on the Sachkov affair. – The CyberWire

Attacks, Threats, and Vulnerabilities

GriftHorse Android Trojan Steals Millions from Over 10 Million Victims Globally | Zimperium Mobile Security Blog (Zimperium Mobile Security Blog) The Zimperium zLabs researchers discovered the GriftHorse malware, a global premium services Trojan leading to millions stolen.

New GriftHorse malware has infected more than 10 million Android phones (The Record by Recorded Future) Security researchers have found a massive malware operation that has infected more than 10 million Android smartphones across more than 70 countries since at least November 2020 and is making millions of dollars for its operators on a monthly basis.

Hundreds of Scam Apps Hit Over 10 Million Android Devices (Wired) The so-called GriftHorse campaign used clever techniques to avoid detection in Google Play for nearly a year.

Cyberespionage Implant Delivered via Targeted Government DNS Hijacking (SecurityWeek) Newly discovered Tomiris backdoor contains technical artifacts suggesting the possibility of common authorship or shared development practices with the group that executed the SolarWinds supply chain compromise.

DarkHalo after SolarWinds: the Tomiris connection (SecureList) In December 2020, news of the SolarWinds incident took the world by storm. While supply-chain attacks were already a documented attack vector leveraged by a number of APT actors, this specific campaign stood out due to the extreme carefulness of the attackers and the high-profile nature of their victims. It is believed that when FireEye discovered the first traces of the campaign, the threat actor (DarkHalo aka Nobelium) had already been working on it for over a year. Evidence gathered so far indicates that DarkHalo spent six months inside OrionITs networks to perfect their attack and make sure that their tampering of the build chain wouldnt cause any adverse effects.

Tomiris Backdoor Linked to SolarWinds Malware (Threatpost) Newly discovered code resembles the Kazuar backdoor and the Sunshuttle second-stage malware distributed by Nobelium in the SolarWinds supply-chain attacks.

Kaspersky links new Tomiris malware to Nobelium group (Register) Typical: you wait months for new nasties then two come along at once

Squirrelwaffle: New Loader Delivering Cobalt Strike (Zscaler) Squirrelwaffle, Cobaltstrike, VBS, Macro, Hidden sheet, xls4.0, Thread Hijacking

Azure Active Directory bug lets hackers attempt brute force attacks without getting caught (Computing) Microsoft thinks it is behaviour 'by design'

China Intensified Attacks on Major Afghan Telecom Firm as U.S. Finalized Withdrawal (SecurityWeek) Four China-linked cyberespionage groups targeted a major Afghan telecom firm as the U.S. was finalizing its withdrawal from the country.

Iran is aware of electric substation cyber threats and vulnerabilities (Control Global) Mojtaba S. is a project manager, consultant, and industrial security specialist for the Electric Industry of Iran. His well-written article, Detecting Cyber Intrusions in Substation Networks, demonstrates detailed knowledge of electric substation designs, protocols, and cyber vulnerabilities.

The Rise of One-Time Password Interception Bots (KrebsOnSecurity) In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service quickly went offline, but new research reveals a

Cybercriminals bypass 2FA and OTP with robocalling and Telegram bots (CSO Online) The automated bots are highly successful because they effectively emulate legitimate service providers.

CISA Warns of Hikvision Camera Flaw as U.S. Aims to Rid Chinese Gear From Networks (SecurityWeek) CISA is telling organizations to patch their Hikvision cameras, just as the FCC announced taking steps toward removing Chinese equipment from U.S. networks.

Russian hacker Q&A: An Interview With REvil-Affiliated Ransomware Contractor (Flashpoint) Flashpoint translates an interview with a Russian-speaking threat actor who claims to work with REvil and other sophisticated ransomware collectives.

REvils Cryptobackdoor Con: Ransomware Groups Tactics Roil Affiliates, Sparking a Fallout - Flashpoint (Flashpoint) REvils tactics have recently come under renewed scrutiny. Threat actors operating on XSS and Exploit are currently reacting to evidence that REvil included a secret backdoor in its ransomware codeallegedly enabling the ransomware group to steal illicit ransom proceeds from its affiliates.Flashpoint cybersecurity analysts examine the chatter and subsequent fallout.

There are now over 250 different ransomware families currently operational worldwide (TechRadar) No industry is immune to ransomware attacks, research claims

Bitdefender Threat Debrief | August 2021 (Bitdefender) Bitdefender's monthly report on the current ransomware threats and threat actors.

Ransomware attacks against hospitals are having some very grim consequences (ZDNet) Researchers asked staff working in healthcare about the impact of cyberattacks - and the findings are worrying.

Ransomware attack disrupts hundreds of bookstores across France, Belgium, and the Netherlands (The Record by Recorded Future) Hundreds of bookstores across France, Belgium, and the Netherlands have had their operations disrupted this week after a ransomware attack crippled the IT systems of TiteLive, a French company that operates a SaaS platform for book sales and inventory management.

COVID-19's Healthcare Feeding Frenzy for Cybercriminals (SecurityWeek) The COVID-19 pandemic has enlarged the threat landscape for all industry sectors; but none more so than healthcare. The primary areas of concern include insecure working from home, and stress related lax behavior at the office.

Device Security is 'The Big Hairy Monster Under the Bed' (Decipher) The security of IoT and non-general purpose computing devices represents a systemic risk to corporate and national security, experts say.

Trucking giant Forward Air reports ransomware data breach (BleepingComputer) Trucking giant Forward Air has disclosed a data breach after a ransomware attack that allowed threat actors to access employees' personal information.

Results of Operations and Financial Condition (FWRD Forward Air 8-K) As previously disclosed, on December 15, 2020, Forward Air Corporation (the Company) detected a ransomware incident impacting its operational and information technology systems. The Companys internal security teams, supplemented by leading cyber defense firms, took active steps to assess, contain and remediate this incident.

Bandwidth hit by cyber attack that causes disruptions to some business phone calls (Herald-Sun) Raleigh technology company Bandwidth, which makes software for internet-based voice and text communication, is experiencing outages after it was hit by a cyber attack over the weekend, the company said Tuesday.

Pottawatomie Co. services back to normal following cyber-attack (WIBW) Pottawatomie Co. officials tell 13 NEWS late Wednesday afternoon, Sept. 29, their services are back up.

New leak of Epik data exposes company's entire server (The Daily Dot) The hacking collective Anonymous has released what it claims to be new data from the controversial web hosting company Epik.

All Trains Cancelled: How an e-Signature Failure Derailed a 3bn Swiss-Austrian Transport Deal (Crytpomathic) Last week an order for 186 double decker trains was nullified due to a legal formality surrounding the Qualified Electronic Signature used to ink the deal. Here, we unpack what went wrong and highlight what businesses everywhere can learn from the debacle.

Systemic risk in private sector dominates conversation at cyber summit (SC Media) With a changing understanding of what denotes a national security risk, this year's Aspen Cyber Summit traditionally a hub for talks about statecraft in infosec veered toward systemic risk across the private sector.

NSA Cyber Chief Warns Hackers Increasingly Use Commercial Tools to Stay Hidden (Nextgov.com) Advanced persistent threat actors are becoming harder to spot and making attribution more difficult.

Around the world with the NSA's cyber chief (The Record by Recorded Future) The head of the National Security Agencys cyber branch on Wednesday warned that the number of digital threats has proliferated.

CISA chief: Cyber incident reporting can't become a burden (FCW) Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, stressed the importance of cyber incident reporting but said mandates should be careful of potentially overburdening companies -- and CISA -- with 'reporting noise.'

WatchGuard Threat Lab Reports 91.5% of Malware Arrived over Encrypted Connections in Q2 2021 (Yahoo Finance) New research also shows dramatic increases in fileless malware, malware detections per appliance, and booming network and ransomware attacksSEATTLE, Sept. 30, 2021 (GLOBE NEWSWIRE) -- WatchGuard Technologies, a global leader in network security and intelligence, advanced endpoint protection, multi-factor authentication (MFA) and secure Wi-Fi, today released its latest quarterly Internet Security Report, detailing the top malware trends and network security threats analyzed by WatchGuard Threat

Theres a Multibillion-Dollar Market for Your Phones Location Data (The Markup) A huge but little-known industry has cropped up around monetizing peoples movements

Cyberattacks from Russia and the Targeting of US Businesses (The Cipher Brief) Cipher Brief Expert Dan Hoffman is a former senior CIA Officer, three-time station chief and former senior executive Clandestine Services officer. He is currently a national security analyst with Fox News. This column first appeared in FOX News Opinionon FoxNews.com. Shawnee Delaney was a Clandestine Officer and former Detachment Chief for the Defense Intelligence Agency Continue reading "Cyberattacks from Russia and the Targeting of US Businesses"

Highlights From the Unit 42 Cloud Threat Report, 2H 2021 (Unit42) The Unit 42 Cloud Threat Report, 2H 2021, covers supply chain attacks in the cloud and provides actionable recommendations to help prevent them.

Behavioral Analytics Provider ForMotiv Raises $6 Million (SecurityWeek) Real-time user behavior analysis platform ForMotiv this week announced it has raised $6 million in a third seed funding round.

BlueVoyant Acquires Concanon to Augment the Deployment of End-to-End Splunk Cloud Platform Capabilities (PR Newswire) BlueVoyant, a cybersecurity company, today announced the acquisition of global professional services and big data solutions consultancy,...

Akamai to acquire cloud security firm Guardicore for about $600 mln (Reuters) Akamai Technologies Inc will acquire Israel-based Guardicore for about $600 million, it said on Wednesday, to beef up its cloud security offerings and help businesses combat ransomware attacks.

Akamai to Acquire Guardicore in $600M Zero Trust Tech Deal (SecurityWeek) Akamai to acquire Guardicore for new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise.

Israeli cybersecurity merger: HUB Security buys Comsec (Globes) HUB says the main goal of the acquisition is to enter more markets worldwide and double its revenue.

SecZetta Announces $20.5 Million Series B Funding to Advance its Leadership in Third-Party Identity Lifecycle and Risk Management (BusinessWire) SecZetta announced an oversubscribed Series B round led by SYN Ventures, with participation from MassMutual Ventures, ClearSky, and Rally Ventures

Peraton Books $109M Cybercom Task Order for Cyberspace Operations Support Services; Tom Afferton Quoted (GovCon Wire) Looking for the latest GovCon News? Check out our story: Peraton Books $109M Cybercom Task Order for Cyberspace Ops Support Services. Click to read more!

The Security Interviews: How SolarWinds came through its darkest hour (ComputerWeekly) In his first major UK press interview, SolarWinds CEO Sudhakar Ramakrishna tells Computer Weekly how a relentless focus on transparency saw the company safely through a nightmare cyber breach scenario.

Google Announces Rewards for Tsunami Security Scanner Plugin (SecurityWeek) Google this week announced that it is offering monetary payouts to individuals who help expand the detection capabilities of the Tsunami security scanner.

Crypto Firms Beef Up Compliance Hiring as Regulatory Scrutiny Mounts (Wall Street Journal) The hunt for crypto-focused compliance executives has intensified in recent months as the industry faces growing regulatory pressure, both in the U.S. and abroad.

Relativity Recognized for Threat Intelligence Innovation in 2021 CyberSecurity Breakthrough Awards Program (PR Newswire) Relativity, a global legal and compliance technology company, today announced that its free-to-use Threat Intel Feed has been named the winner...

KnowBe4 Enhances Research Capabilities And Appoints Kai Roer Chief Research Officer (PR Newswire) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced that it has enhanced...

Variscite and Sequitur Labs' new partnership accelerates the development of reliable and secure IoT products (PR Newswire) Variscite, a leading worldwide System on Module vendor in the embedded market, announced a new partnership with Sequitur Labs, a leading...

PDI to Showcase Fully Managed XDR Complete Security Service at NACS Show 2021 (Professional Datasolutions, Inc.,) PDI XDR Complete will be featured in NACS Cool New Products Preview Room. Dont miss Ransomware Is a Symptom live education session presented by Rob Chapman, Director of Information Security at PDI.

2021.09.29 | Dell Technologies Drives the Evolution of Modern Support and Security (Dell Technologies) Dell Technologies Drives the Evolution of Modern Support and Security

Cowbell Cyber Further Unites Cybersecurity and Cyber Insurance with Connector to Secureworks Taegis VDR (Cowbell) Cowbell Connector for Secureworks Taegis VDR Vulnerability, Detection and Response enhances policyholders risk ratings, resulting in insurance terms better aligned with covered exposures

Relativity Trace to Introduce New AI-Powered Data Cleansing Capabilities at Relativity Fest (PR Newswire) Relativity, a global legal and compliance technology company, will showcase new data cleansing capabilities integrated in its AI-powered...

Huawei Launches OceanProtect Data Protection Solution (Yahoo) At Huawei Connect 2021, Huawei launched the OceanProtect Data Protection Solution, covering both Disaster Recovery (DR) and backup fields to offer comprehensive protection for diversified types of data throughout the lifecycle. It belongs to the Huawei All-Flash Data Center Solution to build the fast, green, reliable, and intelligent infrastructure for various industries. The solution is built on the concept of "full DR of hot data, and quick backup and restore of warm data", which ensures zero

Shared Assessments Introduces 2022 Third Party Risk Management Toolkit (BusinessWire) The Shared Assessments Program, the member-driven leader in third party risk assurance, today issued the 2022 Shared Assessments Third Party Risk Mana

Sumo Logic Addresses Digital Transformation Complexity Driven By Exponential Growth of Digital Services (Sumo Logic) New DevSecOps Enhancements Including Advanced Analytics for Alert Response, Open XDR, and Open Integration Framework to Collect and Analyze Telemetry Data Across Cloud, Applications, Endpoints and End Users to Provide Universal Approach to Digital Service Management

Microsoft and At-Bay partner to offer data-driven cyber insurance coverage (Microsoft Stories) Customers managing cyber-risk with Microsoft 365s built-in security controls qualify for savings on At-Bay cyber insurance policies

Israel's SCADAfence to supply cybersecurity for OT infrastructures worldwide (Israel Defense) The company is partnering with Keysight Technologies to accelerate innovation in the fields of connectivity and security as well as to help organizations gain better cyber control of industrial environments

Exabeam Announces Availability of Exabeam Fusion SIEM and Exabeam Fusion XDR on Google Cloud Marketplace (BusinessWire) Exabeam announced the availability of Fusion SIEM and Fusion XDR on Google Cloud Marketplace.

Buoyant Introduces Secure, Zero Trust Network Policies for Kubernetes in Linkerd 2.11 and Buoyant Cloud (PR Newswire) Buoyant, the creators of the world's lightest and fastest service mesh, Linkerd, today unveiled new security features in Linkerd and in Buoyant...

Approov Introduces Free Tool to Help Thwart Mobile App API Man-in-the-Middle Attacks (BusinessWire) Approov Offers Free Tool to Help Thwart Mobile App API Man-in-the-Middle Attacks; Helps Organizations Meet OWASP Guidelines for Mobile App Security

AttackIQ Introduces New Vanguard Managed Security Validation Service To Proactively Discover and Remediate Security Gaps Before Adversaries Mount Cyberattacks (BusinessWire) AttackIQ, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced the availability of the new AttackIQ Vanguard

Securiti Launches Free Data Privacy Certification Program (BusinessWire) Multi-module training program covers data privacy management concepts including data privacy laws, governance and operations for enterprises.

Stratasys Introduces Data Security Platform Supporting Growing U.S. Government Implementations of 3D Printing (BusinessWire) Stratasys Ltd. (NASDAQ: SSYS), a leader in polymer 3D printing solutions, today announced that the company has introduced a new data security solution

New DNV recommended practice defends power grid substations from growing threat of cyber-attacks (DNV) DNV Recommended Practice DNV-RP-0575 outlines 45 risk-reducing measures to improve the cyber security of protection devices and digital technologies in power system substations

Improving the Nations Cybersecurity: Progress and Next Steps in Carrying Out Executive Order 14028 (NIST) Officials responsible for carrying out the

Insider Risk Self-Assessment Tool (CISA) Insider threats pose significant risk to the safety and security of Americas critical infrastructure and the organizations that keep infrastructure operational. The Insider Risk Self-Assessment is a tool to assist owners and operators or organizations, especially small and mid-sized ones who may not have in-house security departments, to gauge their vulnerability to an insider threat incident.

TRAM: Advancing Research into Automated TTP Identification in Threat Reports (Medium) Written by Jon Baker and Richard Struse.

Platform Security Controls Defend Against Adversaries: Heres How (Medium) Written by Nicholas Amon, Suneel Sundar, and Jon Baker.

What Can We Learn From the Top Cloud Security Breaches? (Check Point Software) By Jonathan Maresky, Cloud Product Marketing Manager, published September 30, 2021 (This blog post was first published in TheNewStack.) According

Facebook open-sources tool to find Android app security flaws (BleepingComputer) Facebook today open-sourced astatic analysis tool its software and security engineers use internally to find potentially dangerous security and privacy flaws in the company's Android and Java applications.

Recovering locked Facebook accounts is a nightmare. Thats on purpose. (Washington Post) Social media companies are juggling account security and recovery and failing users in the process

Latvian Operator LMT Tests Data Encryption with Quantum Technologies (Fast Mode) LMT has collaborated with MikroTik, and the Institute of Mathematics and Computer Science of the University of Latvia (LU

Tying quantum computing to AI prompts a smarter power grid (Cornell Chronicle) Fumbling to find flashlights during blackouts soon may be a memory, as quantum computing and AI may quickly solve an electric grids hiccups so fast, humans may not notice.

Designing smart security for smart devices (EurekAlert!) Modern society is inundated with different types of smart devices designed to make peoples lives easier, from virtual assistants to household appliances and health-monitoring devices not to mention smartphones. While each device has some amount of built-in security to help combat the threat of cyberattacks, the increased prevalence of these devices in recent years has created an industry-wide need for a new, smart approach to protect all smart devices from cyberattacks, since the mass-production of these devices by different manufacturers prohibits them from being managed manually for security purposes.

Designing an Australian DARPA (The Strategist) In The Strategist in July, we outlined our concept for an Australian equivalent of the US Defense Advanced Research Projects Agency (DARPA), mooted by ASPI. We envisaged this Australian version of DARPA filling the valley ...

Data-Privacy Impasse Hangs Over U.S.-EU Trade and Technology Summit (Wall Street Journal) Companies including Google urge officials to strike a new deal to ease trans-Atlantic data flows.

Call for coordinated response to Singapores OT security challenge (Channel Asia) Cooperation and collaboration on the agenda at Singapore's inaugural Operational Technology Cybersecurity Expert Panel (OTCEP) Forum.

Government departments asked to disclose use of personal phones and emails for official business (Computing) Campaigners hope the evidence will support the call for a judicial review into what they call a 'WhatsApp government'

The whos who of NZs government & public cybersecurity agencies (Security Brief) With every new technology-enabledpath we forge, we must also defend ourselves from cyber threats and exploitation. Here we take a look at some of Aotearoa's main cyber defenders.

FTC Weighs New Online Privacy Rules (Wall Street Journal) Under Democratic Chairwoman Lina Khan, the agency is considering ways to strengthen consumer privacy protections, including for children, as legislative logjams persist in Congress.

US Mulls Cyber-attack Reporting Mandate (Infosecurity Magazine) Critical infrastructure companies may be required to report cyber-attacks to federal government

What you should know about Bitskrieg: The New Challenge of Cyberwarfare (Military Times) Its less about an arms race and more about an organizational race.

Schools Aren't Required to Report Increasing Cyber Attacks: Kids at Risk, Parents in The Dark (Good Day Sacramento) Cybercriminals are targeting schools at an alarming rate and putting kids at risk of identity theft - and their parents may never know.

The whos who of NZs government & public cybersecurity agencies (Security Brief) With every new technology-enabledpath we forge, we must also defend ourselves from cyber threats and exploitation. Here we take a look at some of Aotearoa's main cyber defenders.

In U.S. v Wilson, the Ninth Circuit Reaffirms Fourth Amendment Protection for Electronic Communications (Electronic Frontier Foundation) In a powerful new ruling for digital privacy rights, the Ninth Circuit Court of Appeals has confirmed that the police need to get a warrant before they open your email attachmentseven if a third partys automated system has flagged those attachments as potentially illegal. We filed an amicus brief...

Facebook whistleblower to testify at U.S. Senate hearing next week, lawmakers say (Reuters) Two U.S. senators said on Tuesday a Facebook Inc whistleblower will testify at a Senate hearing next week about what one of them called the social media company's "toxic effects" on young users.

Opinion: The Supreme Court has a chance to shed light on a secretive judicial process (Washington Post) Judicial power, although superficially anomalous in a nation committed to regular elections and majority rule, is indispensable to limited government and minority rights.

Russia Detains Head of Cybersecurity Group on Treason Charges (SecurityWeek) A Moscow court on Sept. 29 ordered Ilya Sachkov, co-founder of one of Russia's leading cybersecurity firms, Group-IB, to be detained on charges of treason.

Top Russian Cybersecurity CEO Charged with Treason (GovInfoSecurity) The founder of Group-IB, one of Russia's largest cybersecurity companies, has been detained on state treason charges and will be held in custody for two months,

Russia detains cyber-security tycoon Ilya Sachkov in treason case (BBC News) Ilya Sachkov, co-founder of the firm Group-IB, will be held in pre-trial custody for two months.

Russia arrests cybersecurity expert on treason charge (Ars Technica) Ilya Sachkov is founder of Group-IB, which specializes in ransomware attack prevention.

Russia Arrests One Of Its Biggest Cyber Stars On Treason Charges (Forbes) A Moscow news agency suggests Ilya Sachkov has been accused of sharing classified information with a foreign entity, as Group-IB's offices are raided.

Ilya Sachkov handed over classified cybersecurity data to foreign intelligence source (TASS) According to the source, Sachkov could have been "employed" by intelligence agencies of several countries

Russian Cybersecurity Group-IB CEO Arrested for Treason by FSB (Security Boulevard) The evening of September 28, 2021, the FSB rolled up to the offices of Group-IB in marked vehicles and a full-size passenger bus and raided the companys

How Meme Detectives Stop NFT Fraud (Wired) Many classic memes were recently auctioned off for big bucks by their owners as NFTs. But how do you determine meme ownership? Don Caldwell and his team from Know Your Meme from been using their extensive knowledge of meme history to thwart NFT fraud. This is how they do it.

Read more from the original source:
GriftHorse is a massive Android premium services scam. Facebook open-sources a test tool. Updates on the Sachkov affair. - The CyberWire

Read More..

Washington Adventist University in Md. confirms ongoing ransomware attack – WTOP

Washington Adventist University, a private four-year college in Montgomery County, confirmed an ongoing ransomware attack.

Washington Adventist University, a private four-year college in Montgomery County, Maryland, confirmed an ongoing ransomware attack Sunday.

The attack has restricted access to several pieces of technology on campus, ranging from campus intranet services to digital signage around the property.

In a statement, the school confirmed that the ransomware attack was first discovered after 11 p.m. on Saturday by its technology services department.

School officials have since said that Wi-Fi and internet access will not be available to students on campus until further notice.

There is a balance that has to be reached between access and security, the school wrote. The timeline therefore may be incremental rather than an overnight solution.

Despite the attack, the school will remain open for in-person instruction and will continue to hold virtual courses through Zoom. Access to services outside of the university intranet like campus email and Zoom also remain unaffected.

The school is currently working with the Montgomery County Cyber Taskforce and the Federal Bureau of Investigation to resolve the situation. A spokesperson did not tell WTOP the requested ransom amount or what data may have been accessed.

Like WTOP on Facebook and follow @WTOP on Twitter to engage in conversation about this article and others.

Get breaking news and daily headlines delivered to your email inbox by signing up here.

2021 WTOP. All Rights Reserved. This website is not intended for users located within the European Economic Area.

See the article here:
Washington Adventist University in Md. confirms ongoing ransomware attack - WTOP

Read More..

Women and BAME individuals are hardest hit by cyber crime – IT PRO

Women, black, Asian and Minority Ethnic (BAME) individuals are more likely to be affected by cyber crime, causing substantial stress as well as financial loss.

That's according to a new report fromMalwarebytes, which surveyed more than 5,000people across the UK, US, and Germany.

According to its findings, 48% of people dont feel private online and 28% do not feel safe, with this number rising to 36% forBAME respondents in the UK.

Similarly, women weremore likely to feel unsafe online, with 35% admitting to feeling so, compared to 27% of men and were also more likely to have their social media accounts hacked, with 46% having fallen victim to the crime, compared to 37% of men.

Financial loss related to cyber crime was most likely to affect BAME individuals, having been experienced by more than half (53%) of respondents the highest percentage of all demographics considered by Malwarebytes survey.

Unsurprisingly, these experiences can affect the victims wellbeing: 21% of women and 23% of BAME respondents admitted to having experienced substantial stress as a result of dealing withsuspicious online activity, compared to 17% of all respondents. The survey also found that cyber crime is ever-present, with not a single respondent being able to avoid suspicious online activities.

Nine traits you need to succeed as a cyber security leader

What characteristics and certifications make a successful cyber security leader?

Malwarebytes CEO Marcin Kleczynski said that the disparity between populations feeling safe online and the emotional impact of threats on already vulnerable communities is unacceptable.

Understanding the impact that cybercrime has on vulnerable people (or populations), particularly women and minorities, across the world is critical as online access becomes essential to modern life. As an industry, we need to work together to make safe internet access available to everyone, he added.

Commenting on the findings, Robert Burda, interim CEO of Cybercrime Support Network, a non-profit organisation thatsupports victims of cyber crime, said that the digital world has an increasing effect on our private lives:

As technology and internet accessibility become more entwined in our day-to-day routines, our financial and emotional lives are more significantly impacted by cyber crime. With a greater understanding of how the digital world impacts disadvantaged communities, we can provide better programmes and resources that meet people where they are, he added.

The ultimate guide to going mobile for fire/emergency medical services

Get your free guide to going mobile for fire services and EMS

VMware Cloud workload migration tools

Cloud migration types, phases, and strategies

Eight steps to fight ransomware

Insights into how you can protect yourself from this ever increasing threat

IDC: The business value of Avi Vantage

A study of enterprises using next-generation application delivery

View original post here:
Women and BAME individuals are hardest hit by cyber crime - IT PRO

Read More..

Artificial intelligence to the rescue | Agriculture | lmtribune.com – Lewiston Morning Tribune

Washington State University will lead a consortium of institutions in the development of new artificial intelligence tools to help address problems in the agricultural field.

Whats being called the AgAID Institute is being funded with a five-year, $20 million grant from the National Science Foundation.

Ananth Kalyanaraman, who holds the Boeing Chair at WSUs School of Electrical Engineering and Computer Science, is the lead principal investigator for the institute.

Kalyanaraman said the agricultural industry has tremendous potential to benefit from AI applications. However, researchers still need to learn how best to marry the technology with the human ability to make complex decisions.

What AI is really good at is looking at past actions and consequences and learning from them, he said. But the reasoning part thats hard to do. Part of this initiative is to understand what humans are good at and what AI is good at, so we can create a partnership.

Other participants in the AgAID Institute include Oregon State University, the University of California-Merced, University of Virginia, Carnegie Mellon University, Heritage University, Wenatchee Valley College and Kansas State University. Private industry partners include IBM Research and innov8.ag.

During its first year of operation, the institute will emphasize stakeholder interaction, Kalyanaraman said. The goal is to create software applications and other AI tools that have a high likelihood of being adopted and used in the field.

To improve the chances of that happening, he said, researchers will work closely with growers to develop the new technology.

And rather than focus on commodity crops like wheat, the institute intends to look at specialty crops like apples, cherries, mint or almonds.

The reason for that, Kalyanaraman said, is that specialty crops involve a mix of complex decisions. They provide a broad range of problems and conditions, so tools developed for those environments should be flexible enough to help other agricultural producers.

AI needs a lot of data, he said. But for tools to be practical in the field, theyll need to be able to handle a variety of data sources.

Some data might be noisy, some might be unreliable, some might be incomplete, Kalyanaraman said. So a huge part of this research is about how to develop robust tools that take into account uncertainties.

Writing software programs and refining the tools will be the focus of the second and third years of the grant, he said. Pilot projects testing the new technology will begin in years three and four.

WSU will build a demonstration farm where we can test the technology and collect data in a field setting, Kalyanaraman said. Well also use it for education and training.

As an example of the type of problems AI tools might be able to address, he pointed to tree pruning.

It requires a lot of skill to decide which limbs to remove from a fruit tree, he said. However, it may be possible to develop a phone-based AI app that allows lower-skilled workers to take a photo of the tree and get a recommendation on where to trim. That not only enables them to get the job done, it helps them learn proper technique as they go along.

It would help close the skill level gap, Kalyanaraman said.

Researchers also plan to create learning circles with ag producers, possibly as early as this month. That will give growers an opportunity to offer their own ideas and suggestions for ways AI applications can help the industry.

It will help us find other places where AI can have a quick impact, Kalyanaraman said. Well be learning from growers about what matters most to them.

Follow this link:
Artificial intelligence to the rescue | Agriculture | lmtribune.com - Lewiston Morning Tribune

Read More..

Artificial Intelligence Myth Vs Reality: Where Do Healthcare Experts Think We Stand? – Forbes

Artificial intelligence's applicability in healthcare settings may not have lived up to corporate ... [+] and investor hype yet, but AI experts believe we're still in the very early stages

The AI in healthcare: myth versus reality discussion has been happening for well over a decade. From AI bias and data quality issues to considerable market failures (e.g., the notorious missteps and downfall of IBMs Watson Health unit), the progress and efficacy of AI in healthcare continues to face extreme scrutiny.

John Halamka, M.D., M.S., is President of The Mayo Clinic Platform

As President of the Mayo Clinic Platform, John Halamka, M.D., M.S., is not disappointed in the least about AIs progress in healthcare. I think of it as a maturation process, he said. Youre asking why your three-year-old isnt doing calculus. But can your three-year-old add a column of numbers? Thats actually not so bad.

In an industry as complicated and high-stakes as healthcare, the implementation of artificial intelligence and machine learning comes with challenges that have created a credibility gap. Among the many challenges that Halamka and others acknowledge and are working to address include:

Its not all gloom and doom, though, especially when it comes to AI and machine learning for healthcare administration and process efficiency. For example, hospitals and health systems have successfully employed AI to improve physician workflows, optimize revenue cycle and supply chain management strategies, and improve the patient experience.

Iodine Software is one such company thats making an impact in hospital billing and administration through its AI engine, which is designed to help large health systems capture more mid-cycle revenue through clinical documentation improvement (CDI). The companys co-founder and CEO, William Chan, agrees that perceived shortcomings of AI are an overgeneralization.

"The impression that AI hasn't yet been successful is an assumption when you look primarily at the big headline applications of AI over the past 10 years. Big tech has, in many cases, thrown big money at broad and highly publicized efforts, many of which have never met their proclaimed and anticipated results," said Chan. "There are multiple examples of AI in healthcare that can be deemed successful. However, the definition of success is important, and each use case and AI application will have a different definition of success based on the problem that the 'AI' is trying to solve."

And when it comes to solving problems in clinical care delivery, AI-driven clinical decision support (CDS) solutions are another animal altogether. But for those deep in the field, who have been studying, testing and developing AI and machine learning solutions in healthcare for decades, the increase in real-world evidence (RWE) and heightened focus on responsible AI development are reason enough to be hopeful about its future.

Real World Evidence (RWE) and Clinical Effectiveness: An Exciting Time for Healthcare AI

Dr. Suchi Saria is Founder and CEO at Bayesian Health, and the John C. Malone Associate Professor at ... [+] Johns Hopkins University

Personally I think its a very exciting time for AI in healthcare, said Suchi Saria, Ph.D, CEO and CSO at Bayesian Health, an AI-based clinical decision support platform for health systems using electronic health record (EHR) systems. For those of us in the field, weve been seeing steady progress, including peer-reviewed studies, showing the efficacy of ideas in practice.

This spring, Bayesian Health published findings from a large, five-site study that analyzed the impact of its AI platforms sepsis model. The two-year study showed that Bayesian's sepsis module drove faster antibiotic treatment by nearly two hours. Of note, while most CDS tools historically have adoption rates in the low teens, this study, over a wide base of physicians (2000+), showed sustained adoption at 89%. Another separate, single-site study found a 14% reduction in ICU admissions and 12% reduction in ICU length of stay, which translated to a $2.5M annualized benefit for the 250 bed study site hospital.

A 2020 study from scientists at UCSF Radiology and Biomedical Imaging also showed AIs promise in improving care for those with Glioblastoma, the most common and difficult to treat form of brain cancer. Using an AI-driven "virtual biopsy" approach beyond the scope of human abilities UCSF is able to predict the presence of specific genetic alterations in individual patient's tumors using only an MRI. UCSF found that it was also able to accurately identify several clinically relevant genetic alterations, including potential treatment targets.

Most recently, Johns Hopkins Kimmel Cancer Center researchers found that a novel AI blood testing technology they developed could detect lung cancer in patients. Using the DELFI approach DNA evaluation of fragments for early interception on 796 blood samples, researchers found that, when combined with clinical risk factor analysis, a protein biomarker, and computer tomography imaging, the technology accurately detected 94% of patients with cancer across different stages and subtypes.

Abroad, AI is bringing precision care to cardiology with impressive results through HeartFlows AI-enabled software platform a non-invasive option to assist with the diagnosis, management and treatment of patients with heart disease. HeartFlows technology has proven to limit redundant non-invasive diagnostic testing, reduce patient time in hospital and face-to-face clinical contact, and streamline hospital visits, while demonstrating higher diagnostic accuracy compared to other noninvasive tests with an 83% reduction in unnecessary invasive angiograms and significant reduction in the total cost of care.

Data Quality, Availability, Labeling, and Transparency Challenges

In her dual role as director of machine learning and professor of engineering and public health at Johns Hopkins University, Saria lives and breathes AI research, analysis and development. She also deeply understands the benefits, challenges and possibilities of the marriage between AI and real world datasets, including those in EHRs. Bayesian makes the EHR proactive, dynamic and predictive, said Saria, by bringing together data from diverse sources including the EHR to provide a clinical decision support platform that catches life threatening disease complications early, with their sepsis module and results being just one example of a clinical impact area.

However, as anyone working with EHR data can attest to, issues with EHR data quality and usability remain an issue. As Saria notes, In order to draw safe, reliable inferences, you're going to need high-quality approaches that correct for the messiness that exists in the data.

AI is only as good as the curated training set that is used to develop it, said Halamka, noting that EHR data is, by its very nature, incomplete and highly-unfit for purpose. EHR data repositories may only have a small subset of data, for example, or limited API functionally, and thus might not have the richness to develop a comprehensive algorithm.

At Mayo, there is an AI model for breast cancer prediction that has 84 input variables; the EHR data is only a small portion of that. Additionally, in order to account for social determinants of health (SDoH) which drive 80% of an individuals health status and other information thats material to the model, Halamka noted that youre going to have to go beyond traditional EHR data extraction.

EHR vendor AI adoption tactics and results have also been scrutinized. Algorithms from industry EHR giant Epic were found to be delivering inaccurate or irrelevant information to hospitals about the care of seriously ill patients, a STAT News investigation found. Additionally, STAT found that Epic financially incentivizes hospitals and health systems to use its AI algorithms for sepsis. This is concerning for many reasons, chief among them being false predictions and other concerns voiced by health system leaders who have used the algorithm, as well as adding to AIs longstanding credibility problem. It also makes clear the industrys need for broader AI standards and oversight.

Fixing AIs Credibility Problem: Responsible AI Development

To develop a responsible AI model and help to fix AIs credibility problem Halamka notes that there are a number of data must-haves: a longitudinal data record, including structured and unstructured data, telemetry and images, omics, and even digital pathology. Importantly, AI developers also need to continually evaluate the purpose of the data over the course of its lifetime in order to account for and correct dataset shifts.

Left unchecked, a dataset shift can severely impact AI model development. Dataset shifts occur when the data used to train machine learning models differs from the data the model uses to provide diagnostic, prognostic, or treatment advice. Because data and populations can and will shift, AI developers need to continually monitor, detect, and correct for these shifts, which means continuous evaluation. Evaluation not just of performance and models, but of use, said Saria, adding that overreliance can lead to overtreatment.

On top of dataset quality and shifts, there are also financial obstacles to getting usable data. While one of the most exciting domains for AI is in medicine and healthcare, labeled data is an incredibly scarce resource. And its incredibly expensive to get it labeled, said Nishith (Nish) Khandwala, founder of BunkerHill, a startup and consortium connecting health systems to facilitate multi-institutional training, validation and deployment of experimental AI algorithms for medical imaging.

Born out of Stanford University's Artificial Intelligence in Medicine and Imaging (AIMI) Center, BunkerHill does not develop AI algorithms itself, but instead is building a platform and network of health systems to allow them to test algorithms against different data sets. This kind of validation and health-system partnership is aimed at addressing the legal and the technical roadblocks to collaboration across different health systems, which BunkerHill partner UKHC calls key to successful AI development and application in radiology.

Taking a step back, there are a number of other questions and problems that AI developers must consider when initially creating an algorithm, explained Khandwala. What does it even mean to make an algorithm for healthcare? What problem or subset of a problem do you start with? Another challenge is bringing AI to market, which is a moving/non-existent target at the moment.

For medical devices and novel drug development, there is a clear, established regulatory process: there are documented procedures and institutions to guide the way. That does not exist with AI, said Khandwala.

And this continues to be an issue for AI development: While there is an established methodical, research-first mindset and regulatory process when it comes to drug discovery, research, development and clinical validation as youd expect to see in any other scenario of invention for therapeutic benefit this is not the case when it comes to AI, where the healthcare industry is still learning how to evaluate these types of solutions.

Standards, Reimbursement and Regulatory Oversight

Dale C. Van Demark is a Partner at McDermott Will & Emery and co-chair of its Digital Health ... [+] practice

The industry is also still evaluating how to pay for AI solutions. Figuring out how a new delivery tool actually gets traction as a commercial product can be very difficult because the healthcare payment system and all the ways we regulate is a fairly unusual marketplace, said Dale Van Demark, Health Industry Advisory Practice partner at McDermott Will & Emery.

Healthcare also operates under a highly complex and regulated set of payment systems federal, quasi federal, private and employer plans with myriad experimentations happening in terms of new care models for better, quality care, said Van Demark. And within all of that, you have lots of regulatory and program integrity concerns especially in Medicare, for example.

And anything having to do with the delivery of care to an individual is ultimately where you get the most regulation. Thats where the rubber meets the road, Van Demark says, though he doesnt see the FDA regulatory process today to be particularly challenging when it comes to getting an AI product to market. The challenge is in figuring out the business of that technology in the market, and having a deep understanding of how that market works in the regulatory environment.

Jiayan Chen is a Partner at McDermott Will & Emery

Another challenging component? Getting real-world evidence. For AI to be paid for, you need data that shows your product is making a difference, says Jiayan Chen, also a partner in the Health Industry Advisory Practice Group of McDermott Will & Emery. To do that, you need massive quantities of data to develop the tool or algorithm, but you also have to show that it works in a real-world setting.

Chen also sees issues stemming from the constant blurring of lines in terms of the frequently changing roles of an AI developer. At what point are you engaging in product development and research, or acting as a service provider? The answer to that will determine the path forward from a regulatory standpoint.

So what should an AI development process look like, and who should be involved? In terms of developing an AI certification process, similar to the early days of Meaningful Use, EHR software certifications and implementation guides, Halamka notes that there will eventually be certifying entities for AI as well to ensure an algorithm is doing what its supposed to do.

AI oversight should not be limited to government bodies. Starting this year, Halamka predicts healthcare will see new public-private collaborations develop to tackle concerns about AI bias, equity and fairness, and wants to see more oversight and higher standards in terms of published studies. Medical journals shouldnt publish the results of an algorithm model unless it has a label that says it's been peer-reviewed and clinically validated.

At the moment, theres no governing body explaining the right way to do predictive tool evaluations. But the idea is to ultimately give the FDA better tools for avoiding common pitfalls when evaluating AI and predictive solutions, says Saria; for example, only considering workflow implications instead of looking deeper at the models themselves, or incorrectly measuring impact on health outcomes.

This is also what she is focused on in her role at Bayesian Health: evaluating the underlying technology, making it easy to use and actionable in nature, monitoring and adjusting models in real time, and making sure everything is studied and clinically validated.

Its not rocket science; were doing things that everyone should be doing.

Originally posted here:
Artificial Intelligence Myth Vs Reality: Where Do Healthcare Experts Think We Stand? - Forbes

Read More..

Bank of Italy initiatives on Artificial Intelligence in the banking, financial and payment sector – JD Supra

Bank of Italy launched initiatives regarding the use of Artificial Intelligence for innovating the banking, financial and payment sector and complaints handling.

Last week the Bank of Italy published a Call for Proposals to submit FinTech projects to the Milano Hub, i.e. the Bank of Italy hub established with the aim of supporting the development of innovative projects and fostering the digital evolution of the Italian banking and financial market.

The theme of the Call for Proposals is the contribution of Artificial Intelligence (AI) in improving the provision of banking, financial and payment services to businesses, households and public administrations, with a particular focus on financial inclusion, adequate consumer protection and data security.

The projects can be submitted to Milano Hub by three different categories of aspiring (Italian and foreign) participants. Indeed, within Milano Hub there is a dedicated area of operations for each type of participant:

Specific requirements must be met to participate to the Call for Proposals.

Moreover, in the context of the annual report on complaints of banks and financial intermediaries customers, published by the Bank of Italy on 28 September 2021, the regulator highlighted the opportunity to use AI for a more efficient complaints handling process.

Applications to the Milano Hub Call for Proposals may be submitted from 27 September to 29 October 2021.

Maximum of 10 projects will be eligible for support from the Milano Hub.

[View source.]

Read more:
Bank of Italy initiatives on Artificial Intelligence in the banking, financial and payment sector - JD Supra

Read More..