Thu.Nov 09, 2023

article thumbnail

Experts Urge Congress to Combat Deepfake Technology Threats

Data Breach Today

Digitally Manipulated Media Already Poses National Security and Privacy Concerns A panel of legal experts and technologists warned lawmakers that deepfake technologies were already causing security and privacy concerns across the country, particularly for women and minority communities, as research shows that current detection systems contain biases and high error rates.

Privacy 293
article thumbnail

Dolly.com pays ransom, attackers release data anyway

Security Affairs

On-demand moving and delivery platform Dolly.com allegedly paid a ransom but crooks found an excuse not to hold their end of the bargain. Cybercriminals are hardly a trustworthy bunch. Case in point: Dolly.com. The Cybernews research team believes that the platform suffered a ransomware attack and at least partially paid the ransom – but was duped. The attackers complained that the payment wasn’t generous enough and published the stolen data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ontario Hospitals Expect Monthlong Ransomware Recovery

Data Breach Today

Patient Care Still Disrupted and IT Network, EHR System Down Until Mid-December A shared IT services provider and its five Ontario member hospitals say their recovery from a Daixin Team ransomware attack in October could last into December as the group rebuilds its IT network. Meanwhile, the outage will continue to disrupt patient services, including diagnostics and treatments.

article thumbnail

Russian Sandworm disrupts power in Ukraine with a new OT attack

Security Affairs

Mandiant reported that Russia-linked Sandworm APT used a novel OT attack to cause power outages during mass missile strikes on Ukraine. Mandiant researchers reported that Russia-linked APT group Sandworm employed new operational technology (OT) attacks that caused power outages while the Russian army was conducting mass missile strikes on critical infrastructure in Ukraine in October.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Breach Roundup: Mr. Cooper Recovers From Hacking Incident

Data Breach Today

Also: ChatGPT Struggles to Stay Online Amid DDoS Attacks This week, mortgage lender Mr. Cooper recovered from a cyberattack, ChatGPT struggled with distributed denial-of-service attacks, a cybercrime group’s business model was exposed, hackers stole data of loyalty club members of Marina Bay Sands in Singapore, and more.

284
284

More Trending

article thumbnail

Cryptohack Roundup: Avraham Eisenberg's Trial Pushed to 2024

Data Breach Today

Also: Bitfinex, Terraform Labs, $54M Civil Forfeiture Request This week, the trial of the alleged Mango Markets hacker was delayed, Bitfinex reported a "minor" cybersecurity incident, the U.S. Securities and Exchange Commission sought summary judgement in the Terraform Labs case and the U.S. Department of Treasury designated a Russian money launderer.

Marketing 276
article thumbnail

CISA adds SLP flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added the vulnerability CVE-2023-29552 in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability CVE-2023-29552 (CVSS score: 7.5) in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities catalog. The Service Location Protocol (SLP) is a legacy service discovery protocol that allows computers and other devices to find services in a local area net

IT 116
article thumbnail

Iranian Hackers Target Israeli Logistics and IT Companies

Data Breach Today

Iranian Espionage Group Used Tactics From Previous Campaigns Security company CrowdStrike said it had observed Iranian hacker group Imperial Kitten, also known as TA456, Crimson Sandstorm and Tortoiseshell, conducting web compromise operations between 2022 and 2023 to infiltrate Israeli logistics, transportation and technology companies.

IT 273
article thumbnail

Here’s How Violent Extremists Are Exploiting Generative AI Tools

WIRED Threat Level

Experts are finding thousands of examples of AI-created content every week that could allow terrorist groups and other violent extremists to bypass automated detection systems.

Security 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Embracing Precision for Enhanced Security

Data Breach Today

Reconsidering the One-Size-Fits-All Healthcare Risk Analysis For over a decade, the HIPAA Security Rule has required covered entities and business associates to engage in risk analysis and management. But due to the recent surges in data breaches within the healthcare sector, it's time to embrace an information asset-based approach to risk analysis.

Security 273
article thumbnail

Sandworm Hackers Caused Another Blackout in Ukraine—During a Missile Strike

WIRED Threat Level

Russia's most notorious military hackers successfully sabotaged Ukraine's power grid for the third time last year. And in this case, the blackout coincided with a physical attack.

Military 111
article thumbnail

MOVEit Hackers Turn to SysAid Zero-Day Bug

Data Breach Today

Path Traversal Bug Leads to Code Execution Within SysAid On-Premises Software A Russian digital extortion gang behind a raft of attacks on file transfer applications is now targeting a newly patched vulnerability in SysAid IT support software. Attacks can lead to ransomware and data theft, tweeted Microsoft late on Wednesday.

article thumbnail

MOVEit Hackers Pivot to SysAid Zero-Day in Ransomware Attacks

Dark Reading

The Clop ransomware group is actively exploiting a SysAid zero-day flaw after running rampant through enterprise systems using MOVEit file transfer bug.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

“Skillful Social Engineering of the IT Support Desk” One of the Most Common Tactics in Ransomware Attacks

KnowBe4

As ransom payments reach an all-time high, it’s time to look at attacks from a data perspective and find the greatest opportunities to stop these attacks.

article thumbnail

There's Only One Way to Solve the Cybersecurity Skills Gap

Dark Reading

The cybersecurity skills gap is making businesses more vulnerable, but it won't be fixed by upskilling high-potential recruits alone.

article thumbnail

The largest Russian bank Sberbank hit by a massive DDoS attack

Security Affairs

The largest and oldest bank in Russia Sberbank faced the record-breaking DDoS attack that reached 1 million RPS. Sberbank , the Russian banking and financial services giant, announced that it was recently hit by a record-breaking distributed denial of service (DDoS) attack that reached 1 million RPS. After the invasion of Ukraine, most Russian organizations and international companies still operating in Russia became the targets of multiple groups of Pro-Ukraine hacktivists.

article thumbnail

How to Outsmart Malware Attacks That Can Fool Antivirus Protection

Dark Reading

One of the main challenges for Android users is protecting themselves malicious applications that can damage devices or perform other harmful actions.

109
109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

KnowBe4 Wins Multiple 2023 Best Of Awards From TrustRadius

KnowBe4

KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms in three categories for Best Value for Price, Best Relationship and Best Feature Set.

article thumbnail

Sandworm Cyberattackers Down Ukrainian Power Grid During Missile Strikes

Dark Reading

A premier Russian APT used living-off-the-land techniques in a major OT hit, raising tough questions about whether or not we can defend against the attack vector.

101
101
article thumbnail

Online Retail Hack

Schneier on Security

Selling miniature replicas to unsuspecting shoppers: Online marketplaces sell tiny pink cowboy hats. They also sell miniature pencil sharpeners, palm-size kitchen utensils, scaled-down books and camping chairs so small they evoke the Stonehenge scene in “This Is Spinal Tap.” Many of the minuscule objects aren’t clearly advertised. […] But there is no doubt some online sellers deliberately trick customers into buying smaller and often cheaper-to-produce items, Witcher said

Retail 92
article thumbnail

Imperial Kitten APT Claws at Israeli Industry with Multiyear Spy Effort

Dark Reading

The Iran-linked group uses redirected websites to compromise victims and exfiltrate data in a campaign that has lasted over 2022 and 2023.

105
105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Omegle Was Forced to Shut Down by a Lawsuit From a Sexual Abuse Survivor

WIRED Threat Level

Omegle connected strangers to one another and had a long-standing problem of pairing minors with sexual predators. A legal settlement took it down.

IT 104
article thumbnail

What We Can Learn from Major Cloud Cyberattacks

Dark Reading

Analysis of six major cloud incidents shows how some common mistakes can lead to serious consequences.

Cloud 115
article thumbnail

How to Get Facebook Without Ads—if It’s Available for You

WIRED Threat Level

Meta now offers users an ad-free option, but it’s only available in Europe for those who can afford the €10-a-month subscription.

Security 100
article thumbnail

AI Use in Drug Discovery

Data Matters

Artificial Intelligence (AI) has the potential to revolutionize how we find, develop, and deliver new life-saving therapies. Join “State of the Art” host and Sidley partner Stephen Abreu as he speaks with Colin Hill , CEO and Co-Founder of Aitia. Together, they discuss the challenges and opportunities AI presents for the pharmaceutical industry, particularly how AI is accelerating the pace of drug discovery and its implications for the future of medicine.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Treasury Markets Disrupted by ICBC Ransomware Attack

Dark Reading

The US Treasury states that it is in contact with financial regulators as it monitors the breach.

Marketing 104
article thumbnail

Optus loses court bid to keep report into cause of cyber-attack secret

The Guardian Data Protection

Federal court rejects legal privilege claim over Deloitte’s assessment of 2022 breach that affected millions Follow our Australia news live blog for latest updates Get our morning and afternoon news emails , free app or daily news podcast Optus has lost a bid in the federal court to keep secret a report on the cause of the 2022 cyber-attack – which resulted in the personal information of about 10 million customers being exposed – after a judge rejected the telco’s legal privilege claim.

IT 74
article thumbnail

'BlazeStealer' Python Malware Allows Complete Takeover of Developer Machines

Dark Reading

Checkmarx researchers warn that BlazeStealer can exfiltrate information, steal passwords, disable PCs, and take over webcams.