AI is a new generation technology where machines and information systems demonstrate a form of intelligence that simulates the natural intelligence of human beings in interacting with the environment. However, the success of any AI-based system also depends on the trust displayed by the beneficiaries on AI technology, besides other factors. Data, models, and analytics are the three key components of AI technology. One can decentralize these three key components using blockchain technology, and it will undoubtedly enhance the end users’ trust and confidence levels in AI-based systems.
Source: https://QUE.com
The key characteristics of blockchain technology that make it so popular and appealing are:
Decentralized technology: There is no central authority to monitor the network, unlike the traditional banking system. Authentication and authorization of transactions can take place without the help of any single ruling power.
Distributed ledgers: Instead of storing data in a central repository, it is synchronized, shared, and recorded in various nodes in a shared infrastructure.
Consensus-based: Any transaction in the blockchain network is executed when all pertinent network nodes agree on the transaction.
Immutability & security: In the Blockchain network, a transaction, once recorded, cannot be altered by anyone at any time. Hashing is irreversible in the case of Blockchain, which makes the technology highly secure.
continue reading: https://venturebeat.com/2021/12/20/use-of-blockchain-technology-could-increase-human-trust-in-ai/
Apache Log4j bug: China’s industry ministry pulls support from Alibaba Cloud for not reporting flaw to government first
The Ministry of Industry and Information Technology said it will suspend work with Alibaba Cloud as a cybersecurity threat intelligence partner for six months.
Notifying vendors first about security flaws is a cybersecurity industry norm, but a new law encourages Chinese companies to first notify the government.
continue reading: https://www.scmp.com/tech/big-tech/article/3160670/apache-log4j-bug-chinas-industry-ministry-pulls-support-alibaba-cloud
UK Cyber Security Strategy: Challenges and Opportunities
Patefield says there are two key areas in which this strategy has the opportunity to improve upon the last one, which was released in 2016. The first is in identifying key performance indicators, or KPIs, and measuring success effectively. “Sometimes these big lofty ambitions like maintaining the U.K. as a lead-in and responsible cyber power, are quite hard to gauge. So in five years, how will we judge this across our locations?”
The second is in how the strategy relates to other strategies across government. “Cyber needs to become a more prominent element of other key strategies across government departments, which then ensures key collaboration, not just amongst government, but amongst wider industry, academia and other stakeholders,” he says.
continue reading: https://www.govinfosecurity.com/uk-cyber-security-strategy-challenges-opportunities-a-18166
Hackers continue to target health care organizations
December 21, 2021 – Healthcare cyberattacks and network outages are not slowing down as the end of the year approaches. The Cybersecurity & Infrastructure Security Agency (CISA) and the FBI released a statement in November warning US critical infrastructure entities to remain vigilant against cyber threats and ransomware during the upcoming holiday season.
“CISA and the Federal Bureau of Investigation (FBI) are reminding critical infrastructure partners that malicious cyber actors aren’t making the same holiday plans as you,” the statement warned.
continue reading: https://healthitsecurity.com/news/network-outages-healthcare-cyberattacks-ramp-up-as-holidays-approach
2easy now a significant dark web marketplace for stolen data
A dark web marketplace named ‘2easy’ is becoming a significant player in the sale of stolen data “Logs” harvested from roughly 600,000 devices infected with information-stealing malware.
“Logs” are archives of data stolen from compromised web browsers or systems using malware, and their most important aspect is that they commonly include account credentials, cookies, and saved credit cards.
2easy launched in 2018 and has experienced rapid growth since last year when it only sold data from 28,000 infected devices and was considered a minor player.
continue reading: https://www.bleepingcomputer.com/news/security/2easy-now-a-significant-dark-web-marketplace-for-stolen-data/
Major services including Slack, AWS, Hulu, Imgur facing outages
Popular sites and apps can’t be reached
These services include Amazon, AWS, Hulu, Slack, Imgur, Asana, Grindr, Scruff, HubSpot, Zendesk, among other popular sites and services.
Tests by BleepingComputer confirmed that IMs and file uploads have been failing on Slack, and connectivity is also impacted.
Users are receiving errors when sending or editing messages on Slack, such as:
“Couldn’t send message. Your message, along with any files and attachments, has been saved to your drafts,” or “Sorry, something went wrong with editing your message. Try again in a moment.”
continue reading: https://www.bleepingcomputer.com/news/technology/major-services-including-slack-aws-hulu-imgur-facing-outages/
The Log4j flaw is the latest reminder that quick security fixes are easier said than done
Cybersecurity professionals have spent weeks scrambling to address a bug in a widely used software library that could enable hackers to steal data, launch ransomware attacks or otherwise knock systems offline.
The bug, known as Log4Shell, exists in Log4j, an open-source software tool that is used widely in the technology industry. The flaw could allow for attackers, in some cases, to take over vulnerable systems by duping a target into logging code capable of downloading malware hosted elsewhere.
continue reading: https://www.cyberscoop.com/log4j-hack-security-update-ransomware/
Read more Cyber Security News at https://que.com/tag/cybersecurity/
Merry Christmas to everyone.
Thank you for reading. Stay safe and stay healthy.
@Yehey [ Witness ]