Connect with us

Technology

Change Healthcare hackers breached using stolen credentials – no MFA, says UHG CEO

Published

on

The ransomware gang that breached US health tech giant Change Healthcare used a set of stolen credentials to remotely access the corporate’s systems that weren’t protected by multi-factor authentication, in response to the CEO of parent company UnitedHealth.

UnitedHealth CEO Andrew Witty gave written testimony ahead of Wednesday’s House subcommittee hearing on the February ransomware attack that caused months of disruption to the U.S. health care system.

For the primary time, the medical health insurance giant has assessed how hackers breached Change Healthcare’s systems, during which huge amounts of health data were extracted from its systems. Last week, UnitedHealth said hackers had stolen health data for “a significant portion of people in America.”

Advertisement

Change Healthcare processes medical health insurance claims and billing for about half of all U.S. residents.

According to Witty’s testimony, the hackers “used the compromised credentials to gain remote access to the Change Healthcare Citrix portal.” Organizations like Change use Citrix software to enable employees to remotely access work computers on internal networks.

Witty didn’t explain intimately how the credentials were stolen. Wall Street Journal was the primary to report the hacker’s use of compromised credentials last week.

Witty, nevertheless, said the portal “lacks multi-factor authentication,” which is a basic security feature that forestalls the misuse of stolen passwords by requiring a second code to be sent to an worker’s trusted device, comparable to a phone. It’s unclear why Change didn’t arrange multi-factor authentication on this technique, but it surely’s prone to be of interest to investigators trying to grasp potential deficiencies within the insurer’s systems.

Advertisement

“Once the attacker gained access, they moved around systems and extracted data in a more sophisticated way,” Witty said.

Witty said hackers deployed the ransomware nine days afterward Feb. 21, prompting the health care giant to shut down its network to contain the breach.

Last week, UnitedHealth confirmed that the corporate had paid a ransom to hackers who claimed responsibility for the cyberattack and subsequent theft of terabytes of stolen data. The hackers, generally known as RansomHub, are the second gang to say data theft after they posted among the stolen data on the dark web and demanded a ransom for not selling the data.

Earlier this month, UnitedHealth said a ransomware attack cost it greater than $870 million in the primary quarter through which the corporate had revenue of nearly $100 billion.

Advertisement

This article was originally published on : techcrunch.com

Technology

The latest model AI Google Gemma can work on phones

Published

on

By

It grows “open” AI Google, Gemma, grows.

While Google I/O 2025 On Tuesday, Google removed Gemma 3N compresses, a model designed for “liquid” on phones, laptops and tablets. According to Google, available in a preview starting on Tuesday, Gemma 3N can support sound, text, paintings and flicks.

Models efficient enough to operate in offline mode and without the necessity to calculate within the cloud have gained popularity within the AI ​​community lately. They will not be only cheaper to make use of than large models, but they keep privacy, eliminating the necessity to send data to a distant data center.

Advertisement

During the speech to I/O product manager, Gemma Gus Martins said that GEMMA 3N can work on devices with lower than 2 GB of RAM. “Gemma 3N shares the same architecture as Gemini Nano, and is also designed for incredible performance,” he added.

In addition to Gemma 3N, Google releases Medgemma through the AI ​​developer foundation program. According to Medgemma, it’s essentially the most talented model to research text and health -related images.

“Medgemma (IS) OUR (…) A collection of open models to understand the text and multimodal image (health),” said Martins. “Medgemma works great in various imaging and text applications, thanks to which developers (…) could adapt the models to their own health applications.”

Also on the horizon there may be SignGEMMA, an open model for signaling sign language right into a spoken language. Google claims that Signgemma will allow programmers to create recent applications and integration for users of deaf and hard.

Advertisement

“SIGNGEMMA is a new family of models trained to translate sign language into a spoken text, but preferably in the American sign and English,” said Martins. “This is the most talented model of understanding sign language in history and we are looking forward to you-programmers, deaf and hard communities-to take this base and build with it.”

It is value noting that Gemma has been criticized for non -standard, non -standard license conditions, which in accordance with some developers adopted models with a dangerous proposal. However, this didn’t discourage programmers from downloading Gemma models tens of tens of millions of times.

.

(Tagstransate) gemma

Advertisement
This article was originally published on : techcrunch.com
Continue Reading

Technology

Trump to sign a criminalizing account of porn revenge and clear deep cabinets

Published

on

By

President Donald Trump is predicted to sign the act on Take It Down, a bilateral law that introduces more severe punishments for distributing clear images, including deep wardrobes and pornography of revenge.

The Act criminalizes the publication of such photos, regardless of whether or not they are authentic or generated AI. Whoever publishes photos or videos can face penalty, including a advantageous, deprivation of liberty and restitution.

According to the brand new law, media firms and web platforms must remove such materials inside 48 hours of termination of the victim. Platforms must also take steps to remove the duplicate content.

Advertisement

Many states have already banned clear sexual desems and pornography of revenge, but for the primary time federal regulatory authorities will enter to impose restrictions on web firms.

The first lady Melania Trump lobbyed for the law, which was sponsored by the senators Ted Cruz (R-TEXAS) and Amy Klobuchar (d-minn.). Cruz said he inspired him to act after hearing that Snapchat for nearly a 12 months refused to remove a deep displacement of a 14-year-old girl.

Proponents of freedom of speech and a group of digital rights aroused concerns, saying that the law is Too wide And it will probably lead to censorship of legal photos, similar to legal pornography, in addition to government critics.

(Tagstransate) AI

Advertisement
This article was originally published on : techcrunch.com
Continue Reading

Technology

Microsoft Nadella sata chooses chatbots on the podcasts

Published

on

By

Satya Nadella at Microsoft Ignite 2023

While the general director of Microsoft, Satya Nadella, says that he likes podcasts, perhaps he didn’t take heed to them anymore.

That the treat is approaching at the end longer profile Bloomberg NadellaFocusing on the strategy of artificial intelligence Microsoft and its complicated relations with Opeli. To illustrate how much she uses Copilot’s AI assistant in her day by day life, Nadella said that as a substitute of listening to podcasts, she now sends transcription to Copilot, after which talks to Copilot with the content when driving to the office.

In addition, Nadella – who jokingly described her work as a “E -Mail driver” – said that it consists of a minimum of 10 custom agents developed in Copilot Studio to sum up E -Mailes and news, preparing for meetings and performing other tasks in the office.

Advertisement

It seems that AI is already transforming Microsoft in a more significant way, and programmers supposedly the most difficult hit in the company’s last dismissals, shortly after Nadella stated that the 30% of the company’s code was written by AI.

(Tagstotransate) microsoft

This article was originally published on : techcrunch.com
Continue Reading
Advertisement

OUR NEWSLETTER

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending