Thu.Nov 02, 2023

article thumbnail

Boeing Reports 'Cyber Incident'; Ransomware Group Claims Hit

Data Breach Today

Aerospace Giant Says Elements of Parts and Distribution Business Are Affected Boeing has confirmed suffering a "cyber incident" affecting its parts and distribution business days after the notorious LockBit ransomware group claimed to have breached systems at the world's biggest aerospace company and to have stolen "a tremendous amount of sensitive data.

article thumbnail

Russian Reshipping Service ‘SWAT USA Drop’ Exposed

Krebs on Security

The login page for the criminal reshipping service SWAT USA Drop. One of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. Here’s a closer look at the Russia-based SWAT USA Drop Service , which currently employs more than 1,200 people across the United States who are knowingly or unwittingly involved in reshipping expensive consumer goods purchased with stolen credit cards.

Marketing 256
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Canada Bans WeChat and Kaspersky Apps

Data Breach Today

Also: Iranian State Hackers Stalk Middle Eastern Governments This week, Canada banned WeChat and Kaspersky apps, REvil members faced trial in a Russian military court, the British Library experienced an IT outage, Iranian state-backed hackers targeted Middle East governments and European officials extended the ban on Meta's behavioral advertising practices.

Military 283
article thumbnail

UK Information Commissioner’s Office Publishes Toolkit for Data Sharing with Law Enforcement

Data Matters

The Information Commissioner’s Office (“ ICO ”) has introduced a toolkit on data sharing with law enforcement (“ Toolkit ”) which supplements the ICO’s existing guidance on sharing personal data with law enforcement authorities. The Toolkit is intended to function as a tool for smaller organisations to make an informed decision about whether to share personal data with law enforcement.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK AI Summit: Aspirations, Benefits and a Lack of 'Doom'

Data Breach Today

The Model Will Be Replicated in France and South Korea The U.K. summit on artificial intelligence was a venue for officials to tout their AI aspirations and for participants to stress benefits of the emerging technology. Participants lauded the U.K. government for bringing together stakeholders, a model that will be replicated in France and South Korea.

More Trending

article thumbnail

Fortinet Invests In SASE, SecOps Amid Network Security Slump

Data Breach Today

Fortinet's Stock Falls to Lowest Price Since January As Product Revenue Declines Fortinet plans to shift its R&D and go-to-market investments to the faster-growing SASE and security operations segments as growth slows in the network security market. The company expects "more modest growth" in the near-term given that 70% of Fortinet's billings today come from network hardware.

Security 277
article thumbnail

The UN Hired an AI Company to Untangle the Israeli-Palestinian Crisis

WIRED Threat Level

CulturePulse's AI model promises to create a realistic virtual simulation of every Israeli and Palestinian citizen. But don't roll your eyes: It's already been put to the test in other conflict zones.

IT 122
article thumbnail

Cryptohack Roundup: Sam Bankman-Fried Testifies

Data Breach Today

Also: More Crypto Regulation Is Coming in the UK Every week, ISMG rounds up cybersecurity incidents in digital assets. This week, Sam Bankman-Fried testified in his U.S. criminal trial, the United Kingdom issued further crypto regulation, U.S. federal law enforcement arrested SafeMoon executives, and Onyx and Unibot each fell victim to a hack.

article thumbnail

Okta discloses a new data breach after a third-party vendor was hacked

Security Affairs

Okta warns approximately 5,000 employees that their personal information was compromised due to a third-party vendor data breach. Cloud identity and access management solutions provider Okta warns nearly 5,000 employees that their personal information was exposed due to a data breach suffered by the third-party vendor Rightway Healthcare. According to the data breach notification, Rightway Healthcare notified Okta that an unauthorized actor gained access an eligibility census file maintained by

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Accenture Buys Innotec Security to Expand Footprint in Spain

Data Breach Today

Innotec Deal Will Allow Accenture to Support Global Companies With Spanish Presence Accenture acquired one of Spain's most prominent cybersecurity service providers to better support multinational companies with a presence in the country. The consulting giant said its buy of Madrid-based Innotec Security will add 500 cyber professionals to Accenture Security's 20,000-person staff.

Security 261
article thumbnail

Suspected exploitation of Apache ActiveMQ flaw CVE-2023-46604 to install HelloKitty ransomware

Security Affairs

Rapid7 researchers warn of the suspected exploitation of a recently disclosed critical security flaw (CVE-2023-46604) in the Apache ActiveMQ. Cybersecurity researchers at Rapid7 are warning of the suspected exploitation of the recently disclosed critical vulnerability CVE-2023-46604 in the Apache ActiveMQ. Apache ActiveMQ is an open-source message broker software that serves as a message-oriented middleware (MOM) platform.

article thumbnail

Weekly Update 372

Troy Hunt

Yes, the Lenovo is Chinese. No, I'm not worried about Superfish. Yes, I'm running windows. No, I don't want a Framework laptop. Seemed to be a lot of time this week gone on talking all things laptops, and there are clearly some very differing views on the topic. Some good suggestions, some neat alternatives and some ideas that, well, just seem a little crazy.

IT 106
article thumbnail

Clop group obtained access to the email addresses of about 632,000 US federal employees

Security Affairs

Clop ransomware gang gained access to the email addresses of more than 632K US federal employees at the departments of Defense and Justice. Russian-speaking Clop ransomware group gained access to the email addresses of about 632,000 US federal employees at the departments of Defense and Justice. The security breach is the result of the MOVEit hacking campaign that took place this summer.

Access 113
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Okta Data Compromised Through Third-Party Vendor

Dark Reading

After 1Password, MGM, and Caesars, yet more cybersecurity woes mount for the identity and access management company.

article thumbnail

Resecurity: Insecurity of 3rd-parties leads to Aadhaar data leaks in India

Security Affairs

Data leaks containing Aadhaar IDs in India was caused by the insecurity of 3rd parties while aggregating such information for KYC. According to Resecurity , a global cybersecurity provider protecting Fortune 500 companies and governments globally, one of the key issues leading to data leaks containing Aadhaar IDs in India is the insecurity of 3rd parties while aggregating such information for KYC (Know Your Customer) and such other purposes.

article thumbnail

Small Businesses are Experiencing More Cyber Attacks

KnowBe4

As large organizations realize the likelihood of cyber attacks and improve their cyber readiness, small businesses are seeing increases not experienced by their larger counterparts.

article thumbnail

Boeing confirmed its services division suffered a cyberattack

Security Affairs

Boeing confirmed it is facing a cyber incident that hit its global services division, the company pointed out that flight safety isn’t affected. The Boeing Company, commonly known as Boeing, is one of the world’s largest aerospace manufacturers and defense contractors. In 2022, Boeing recorded $66.61 billion in sales, the aerospace giant has 156,000 (2022).

IT 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NYDFS finalizes cybersecurity rule amendments

Data Protection Report

On November 1, 2023, the New York Department of Financial Services (NYDFS) finalized the second amendment to its cybersecurity regulations, which are available here. The rules contain the provisions we had described in the original NYDFS proposal a year ago (see our blog post here ), but include some changes. NYDFS included comments on the proposed regulation and its response, in many cases indicating the NYDFS did not see a reason to change its proposal, but did change the provisions in some

article thumbnail

Who is behind the Mozi Botnet kill switch?

Security Affairs

Researchers speculate that the recent shutdown of the Mozi botnet was the response of its authors to the pressure from Chinese law enforcement. ESET researchers speculate that the recent shutdown of the Mozi botnet was the result of its operators’ choice, possibly due to pressure from Chinese authorities. Mozi is an IoT botnet that borrows the code from Mirai variants and the Gafgyt malware , it appeared on the threat landscape in late 2019.

IoT 101
article thumbnail

Cybersecurity Expert: AI Lends Phishing Plausibility for Bad Actors

KnowBe4

Cybersecurity experts expect to see threat actors increasingly make use of AI tools to craft convincing social engineering attacks, according to Eric Geller at the Messenger.

article thumbnail

Spyware in India

Schneier on Security

Apple has warned leaders of the opposition government in India that their phones are being spied on: Multiple top leaders of India’s opposition parties and several journalists have received a notification from Apple, saying that “Apple believes you are being targeted by state-sponsored attackers who are trying to remotely compromise the iPhone associated with your Apple ID ….” AccessNow puts this in context : For India to uphold fundamental rights, authorities must initiate an immedi

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Saudi Aramco CEO Warns of New Threat of Generative AI

Dark Reading

Oil executive Amin H. Nasser calls for global cooperation and international standards to combat the dark side of artificial intelligence.

article thumbnail

Microsoft Does Damage Control With Its New 'Secure Future Initiative'

WIRED Threat Level

Following a string of serious security incidents, Microsoft says it has a plan to deal with escalating threats from cybercriminals and state-backed hackers.

IT 78
article thumbnail

How Do We Truly Make Security 'Everyone's Responsibility'?

Dark Reading

When everybody is responsible for a task, sometimes nobody takes ownership. Here are three steps to distribute cybersecurity throughout your organization.

article thumbnail

How the National Archives is using AI to make records more accessible in the digital age via GeekWire

IG Guru

Check out the article here. The post How the National Archives is using AI to make records more accessible in the digital age via GeekWire first appeared on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

'Scarred Manticore' Unleashes the Most Advanced Iranian Cyber Espionage Yet

Dark Reading

The government-backed APT's new malware framework represents a step up in Iran's cyber sophistication.

article thumbnail

Avoiding, Managing And Responding To Cyber Incidents

Data Protection Report

Lessons From Recent Enforcement Background The Financial Conduct Authority ( FCA ) announced on 13 October 2023 that it had fined Equifax Limited ( Equifax ), a credit reference agency and data, analytics and technology business, £11,164,400 for failing to manage and monitor the security of UK consumer data it had transferred to its parent company based in the US, Equifax Inc, for processing.

GDPR 77
article thumbnail

Threat Prevention Begins With IT & Security Team Collaboration

Dark Reading

As cyber threats evolve, so does the shared responsibility mindset that calls for IT and security to work in tandem.

IT 93