Thu.Oct 12, 2023

article thumbnail

ISMG Editors: How Crypto Helped Finance Hamas' Attacks

Data Breach Today

Also: North Korean Cryptocurrency Activity, Ex-FTX CEO Sam Bankman-Fried Trial In the latest weekly update, Ari Redbord, head of Legal and Government Affairs at TRM Labs, joined ISMG editors to discuss how Hamas is using crypto to finance operations, the latest illicit activities by North Korean actors, and how the trial of FTX's Sam Bankman-Fried could impact the industry.

article thumbnail

News alert: Nerds On Site develops ‘SME Edge’ solution for small- and mid-sized enterprises

The Last Watchdog

Toronto, Ontario – October 12, 2023 – Nerds On Site Inc. (CSE: NERD), a cybersecurity and mobile IT solutions company servicing the small and medium enterprise (SME) marketplace in Canada and the U.S., has developed SME Edge , a complete cybersecurity package that provides small-to-medium businesses comprehensive protection from the threat of data breaches.

Phishing 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Day Attacks Exploit 'Rapid Reset' Weakness in HTTP/2

Data Breach Today

Web Servers Need Patching; Google, Amazon, Cloudflare See Massive DDoS Attacks Attackers have been actively exploiting vulnerabilities in the HTTP/2 protocol via so-called rapid request attacks, which Amazon Web Services, Cloudflare and Google report have led to record-breaking distributed-denial-of-service attacks. Experts recommend immediate patching or mitigation.

292
292
article thumbnail

Ransomlooker, a new tool to track and analyze ransomware groups’ activities

Security Affairs

Ransomlooker monitors ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide. Cybernews presented Ransomlooker , a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide. The researchers have created the tool to help cybersecurity experts in their daily jobs by providing real-time updates and actionable insights.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptohack Roundup: Crackdown on Hamas Crypto

Data Breach Today

Also: FTX Trial, Voyager Capital Settles With US FTC and Money Laundering and Hacks This week: Crackdown on Hamas cryptocurrency accounts, more revelations from the trial of Sam Bankman-Fried and Voyager Capital settles with the U.S. FTC but former CEO Stephen Ehrlich does not. Also: Elliptic said hackers laundered $7 billion and HTX hacker returned the stolen funds for a "bounty.

292
292

More Trending

article thumbnail

CISA Exec: 'We've Been Lucky In the Cyber Realm' With Israel

Data Breach Today

CISA's Brandon Wales Warns of Disruptive Chinese Attacks on Critical Infrastructure A top U.S. cybersecurity official said Israel has avoided significant cyberattacks since Hamas' invasion Saturday but said that wouldn't necessarily be America's experience should armed conflict break out with China. "There have not been significant cyberattacks as of right now," said Brandon Wales.

article thumbnail

More than 17,000 WordPress websites infected with the Balada Injector in September

Security Affairs

In September more than 17,000 WordPress websites have been compromised by the Balada Injector malware. Sucuri researchers reported that more than 17,000 WordPress websites have been compromised in September with the Balada Injector. The researchers noticed that the number of Balada Injector infections has doubled compared with August. The Balada injector is a malware family that has been active since 2017.

CMS 122
article thumbnail

Breach Roundup: Google Phases out Passwords

Data Breach Today

Also: Microsoft Will Bid VBSript Goodbye and A Novel Magecart Attack This week: Google began phasing out passwords, Microsoft will bid VBSript goodbye, payment card information exposed in Air Europa hack, Magecart attack uses sneaky 404 page tactic, U.S. voter registration data stolen from District of Columbia and Volex reports a cyberattack.

Passwords 273
article thumbnail

Phishing, the campaigns that are targeting Italy

Security Affairs

This post analyzed the numerous phishing campaigns targeting users and organizations in Italy. Phishing is a ploy to trick users into revealing personal or financial information through an e-mail, Web site, and even through instant messaging. Particularly very popular is so-called brand phishing, which occurs when criminals impersonate the official website of a well-known brand of a public or private entity using a domain name, URL, logos and graphics similar to the original website: This is a r

Phishing 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US SEC Probes MOVEit Hack

Data Breach Today

Progress Software Says Investigation Is Fact-Finding Inquiry The zero day that fueled a mass attack on Progress Software's MOVEit file transfer software is now the vulnerability fueling a flotilla of attorneys, the company disclosed in a regulatory filing listing pending litigation and governmental investigations.

270
270
article thumbnail

A new Magecart campaign hides the malicious code in 404 error page

Security Affairs

Researchers observed a new Magecart web skimming campaign changing the websites’ default 404 error page to steal credit cards. Researchers from the Akamai Security Intelligence Group uncovered a Magecart web skimming campaign that is manipulating the website’s default 404 error page to hide malicious code. The attacks are targeting a large number of Magento and WooCommerce websites, including large organizations in the food and retail industries. “In this campaign, all the victim web

Retail 114
article thumbnail

Could Middle Eastern Cyberwarfare Spill Into Health Sector?

Data Breach Today

The violent surprise attack on Israel by Hamas and the region's escalating war spotlights the critical importance of situational awareness, and especially for healthcare organizations that rely on medical or tech products from Israeli technology firms, said Denise Anderson, president of the H-ISAC.

264
264
article thumbnail

Apple releases iOS 16 update to fix CVE-2023-42824 on older devices

Security Affairs

Apple released versions iOS 16.7.1 and iPadOS 16.7.1 to address the CVE-2023-42824 vulnerability that has been actively exploited in attacks. Apple has released iOS 16.7.1 and iPadOS 16.7.1 to address the recently disclosed zero-day CVE-2023-42824. The vulnerability is a privilege escalation issue that resides in the Kernel, it was addressed with improved checks.

Security 113
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bounty to Recover NIST’s Elliptic Curve Seeds

Schneier on Security

This is a fun challenge: The NIST elliptic curves that power much of modern cryptography were generated in the late ’90s by hashing seeds provided by the NSA. How were the seeds generated? Rumor has it that they are in turn hashes of English sentences, but the person who picked them, Dr. Jerry Solinas, passed away in early 2023 leaving behind a cryptographic mystery, some conspiracy theories, and an historical password cracking challenge.

Passwords 111
article thumbnail

Blackbaud to Pay $49.5 Million in Data Breach Settlement

Hunton Privacy

On October 5, 2023, Blackbaud Inc., a software provider for the philanthropy, healthcare, and education sectors, has resolved claims that the District of Columbia and 49 U.S. states raised. The claims stem from a ransomware attack that impacted Blackbaud in 2020. The company was affected by a ransomware attack that exposed user information to unauthorized third parties.

article thumbnail

Improved user provisioning leads to calmer seas and smoother sailing

Collibra

In the vast and ever-changing world of Identity & Access Management, enterprises face the challenge of navigating through complex waters to effectively manage user identities and their access. They are constantly in search of a robust solution – a compass that can guide them through the tumultuous seas. This blog explores the significance of the System for Cross-domain Identity Management (SCIM) capability we recently delivered as a public beta.

Access 104
article thumbnail

Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month

KnowBe4

Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of attacks your organization should watch out for.

Sales 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Backdoor Lurks Behind WordPress Caching Plugin to Hijack Websites

Dark Reading

Evasive malware disguised as a caching plugin allows attackers to create an admin account on a WordPress site, then take over and monetize sites at the expense of legitimate SEO and user privacy.

Privacy 99
article thumbnail

New Cyber Attack Techniques Will Not Replace Old-School Social Engineering

KnowBe4

Even though there are new attack types for cybercriminals, they are still leveraging old-school attack vectors. Why? Because they still work.

article thumbnail

Protect Critical Infrastructure With Same Rigor as Classified Networks

Dark Reading

Government security processes are often viewed as tedious and burdensome — but applying the lessons learned from them is imperative for private industry to counter a nation-state threat.

article thumbnail

Business Email Compromise Attempts Skyrocket in the Last Year

KnowBe4

Threat actors launched 156,000 business email compromise (BEC) attempts per day between April 2022 and April 2023, according to Microsoft’s latest Digital Defense Report. While most of these attempts go unanswered, criminals can receive massive payouts when they succeed.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Everything you need to know about NHS England’s biggest ever IT contract

The Guardian Data Protection

What is the contract for? Which firms are in the running? And why are there privacy concerns about the deal? The biggest IT contract in the history of NHS England could be awarded as soon as next week, with the frontrunner currently the controversial US tech firm Palantir. The £480m contract for the “federated data platform” has been under consideration for months, and was due to be announced in September.

IT 97
article thumbnail

Brands Beware: X's New Badge System Is a Ripe Cyber-Target

Dark Reading

Scammers have targeted the vaunted blue check marks on the platform formerly known as Twitter, smearing individuals and brands alike.

106
106
article thumbnail

How the FTX Thieves Have Tried to Launder Their $400 Million Haul

WIRED Threat Level

Whoever looted FTX on the day of its bankruptcy has now moved the stolen money through a long string of intermediaries—including a service owned by FTX itself.

IT 94
article thumbnail

Microsoft Set to Retire Grunge-Era VBScript, to Cybercrime's Chagrin

Dark Reading

Popular malware like QakBot and DarkGate rely on VBScript, which dates back to 1996 — but their days are numbered now that Microsoft is finally deprecating the Windows programming. language.

90
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

“Human-Operated” Ransomware Attacks Double in the Last Year

KnowBe4

As attackers leave little-to-no traces of their attack patterns, more ransomware groups are shifting from automated attacks to manual attacks.

article thumbnail

Pan-African Financial Apps Leak Encryption, Authentication Keys

Dark Reading

Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.

article thumbnail

Beware of Bogus Roborock Retailers: The Perils of Misleading URLs in E-Commerce

KnowBe4

Roborock's online storefronts have been used for cybercrime schemes in the past, and it seems attackers are continuing to create fake online shops. After all, the Chinese-originated robot vacuum cleaner brand only sells through resellers in Germany.

Retail 85