Thu.Feb 01, 2024

article thumbnail

Breach Roundup: CIA Hacking Tool Leaker Gets 40 Years

Data Breach Today

Also: Cloudflare Was Hacked With Stolen Okta Token This week, former CIA programmer gets 40-year sentence, zero trust prevents widespread damage, possible ransomware attack in Georgia, alleged hacker detained in Ukraine, USB-spread malware in Italy, LockBit attack on non-bank home mortgage lender, and Ukrainian critical infrastructure disrupted.

article thumbnail

Arrests in $400M SIM-Swap Tied to Heist at FTX?

Krebs on Security

Three Americans were charged this week with stealing more than $400 million in a November 2022 SIM-swapping attack. The U.S. government did not name the victim organization, but there is every indication that the money was stolen from the now-defunct cryptocurrency exchange FTX , which had just filed for bankruptcy on that same day. A graphic illustrating the flow of more than $400 million in cryptocurrencies stolen from FTX on Nov. 11-12, 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Palo Alto Told to Pay Centripetal $150M for Patent Theft

Data Breach Today

Federal Court Says Palo Alto Networks Violated Centripetal's Patent Rights A federal jury said Wednesday that Palo Alto Networks directly violated another cybersecurity firm's patent rights for a "threat intelligence gateway" network security technology and awarded Centripetal Networks more than $150 million in the verdict.

article thumbnail

Facebook’s Extensive Surveillance Network

Schneier on Security

Consumer Reports is reporting that Facebook has built a massive surveillance network: Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of 186,892 companies sent data about them to the social network. On average, each participant in the study had their data sent to Facebook by 2,230 companies.

Archiving 124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Uber Fined 10 Million Euros by Dutch Data Regulator

Data Breach Today

Ride-Hailing Company Fined for Inadequate Data Transparency Practices Under GDPR Uber must pay a fine of 10 million euros to the Dutch data protection authority after the agency found the ride-hailing app maker had not been transparent about how long it kept driver data and which employees outside of Europe had access to the data.

GDPR 279

More Trending

article thumbnail

FTC Blasts Blackbaud's 'Shoddy' Practices in Ransomware Hack

Data Breach Today

FTC Is Latest Agency to Rebuke Fundraising Firm for Lax Security in 2020 Attack The Federal Trade Commission is the latest regulatory agency taking action against fundraising and customer relationship management software provider Blackbaud in the aftermath of a 2020 ransomware incident that compromised the data of tens of thousands of clients and millions of consumers.

article thumbnail

Multiple malware used in attacks exploiting Ivanti VPN flaws

Security Affairs

Mandiant spotted new malware used by a China-linked threat actor UNC5221 targeting Ivanti Connect Secure VPN and Policy Secure devices. Mandiant researchers discovered new malware employed by a China-linked APT group known as UNC5221 and other threat groups targeting Ivanti Connect Secure VPN and Policy Secure devices. The attackers were observed exploiting CVE-2023-46805 and CVE-2024-21887 to execute arbitrary commands on the unpatched Ivanti devices.

article thumbnail

Cryptohack Roundup: 2024's Biggest Heist - So Far

Data Breach Today

Also: US Courts Announce Guilty Pleas and Hand Out Sentences in Crypto-Linked Cases This week, a Ripple co-founder and a karaoke platform were hacked, Mexican crypto banks were targeted, authorities seized crypto in the U.S. and Germany, the DOJ made charges in crypto cases, people pleaded guilty to money laundering and SIM swapping, monero was traced, and FTX will not restart.

274
274
article thumbnail

CISA orders federal agencies to disconnect Ivanti VPN instances by February 2

Security Affairs

CISA is ordering federal agencies to disconnect Ivanti Connect Secure and Ivanti Policy Secure products within 48 hours. For the first time since its establishment, CISA is ordering federal agencies to disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products within 48 hours. The CISA’s emergency directive orders to disconnect all instances no later than 11:59PM on Friday February 2, 2024. “As soon as possible and no later than 11:59PM on Friday February 2,

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Long Will FBI's 'Volt Tycoon' Router Interdiction Stick?

Data Breach Today

Volume of Poorly Secured, Legacy IoT That Can Be Turned Against Us Keeps Growing The FBI announcing that it has forcibly removed "KV Botnet" Chinese nation-state malware from "hundreds" of poorly secured SOHO routers across America highlights the risk posed by the growing volume of outdated IoT devices. The FBI's fix is temporary, and we need a more permanent solution.

IoT 274
article thumbnail

3.5M exposed in COVID-19 e-passport leak

Security Affairs

Passports, mobile numbers, and email addresses of Indian travelers who requested COVID e-pass have been leaked, 3.5M individuals at risk of identity theft. Last year, due to an increase in the number of people with COVID-19, Tamil Nadu, the southernmost state in India with a population of 79 million, made a COVID e-pass mandatory. This meant that all inter-zone travelers needed to apply for it online and enter a great deal of their personally identifiable information (PII).

Risk 110
article thumbnail

Okta Lays Off 400 Employees in Second Round of Dismissals

Data Breach Today

The Identity Provider Experienced a String of Embarrassing Cybersecurity Incidents Okta announced layoffs amounting to 7% of its workforce in a restructuring that will cost 400 employees their jobs. Thursday's disclosure is the second round of layoffs the company has undergone in the past 12 months. CEO Todd McKinnon said the cuts are needed to run Okta with "greater efficiency.

article thumbnail

A Startup Allegedly ‘Hacked the World.’ Then Came the Censorship—and Now the Backlash

WIRED Threat Level

A loose coalition of anti-censorship voices is working to highlight reports of one Indian company’s hacker-for-hire past—and the legal threats aimed at making them disappear.

Security 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How 2023 Broke Long-Running Records for Health Data Breaches

Data Breach Today

What Will 2024 Be Like If the Healthcare Sector Doesn't Step Up? Thanks to the massive Anthem hack, for nearly a decade 2015 has been the record year for U.S. health data breaches - with 112.5 million people affected. But 2023 shattered that record, big-time. Will 2024 be another banner year for health data compromises?

article thumbnail

Forging a framework for central bank digital currencies and tokenization of other financial assets

IBM Big Data Hub

Ever since the COVID-19 pandemic, cash usage has been decreasing worldwide and digital payments based on cryptocurrencies or legacy digital payment systems have prevailed. As a result, new forms of centrally managed digital currencies are emerging alongside cryptocurrencies like Bitcoin, the notorious volatility of which has challenged their acceptance worldwide.

Retail 98
article thumbnail

New Future Libraries project supports resilience and strategy in Public Libraries

CILIP

New Future Libraries project to support resilience and strategic growth in Public Libraries Future Libraries is a two-part initiative from CILIP to challenge and engage librarians and library leaders to reimagine libraries in a world of evolving living and working patterns in the context of a rapidly changing world. Part 1 is 'Come Rain or Shine: Preparing public libraries for the future in an age of uncertainty' that envisions the challenges and demands that public libraries will face from now

article thumbnail

Top concerns industry leaders have about cyberattacks in 2024 and beyond

IBM Big Data Hub

Cyberattacks are becoming increasingly sophisticated. Read about the concerns that industry leaders have for the future and three approaches organizations can take to build up their defenses. Cyber workforce shortage There are over four million unfilled cybersecurity jobs in the world today. Filling these vacancies has become a security imperative, and several global compliance mandates have been established to tackle the issue.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Teams: The New Phishing Battlefront - How Attackers Are Exploiting Trusted Platforms

KnowBe4

Attackers are abusing Microsoft Teams to send phishing messages, according to researchers at AT&T Cybersecurity.

Phishing 114
article thumbnail

The Mystery of the $400 Million FTX Heist May Have Been Solved

WIRED Threat Level

An indictment against three Americans suggests that at least some of the culprits behind the theft of an FTX crypto fortune may be in custody.

article thumbnail

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

KnowBe4

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

article thumbnail

Unofficial Final Text of EU AI Act Released

Data Matters

On 22 January 2024, an unofficial version of the (presumed) final EU Artificial Intelligence Act (“ AI Act ”) was released. The AI Act reached political agreement early December 2023 (see our blog post here ) and had undergone technical discussions to finalize the text since. It was reported that the document was shared with EU Member State Representatives on 21 January 2024, ahead of a discussion within the Telecom Working Party, a technical body of the EU Council on 24 January 2024, and that f

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

81% of Underwriters Expect Cyber Insurance Premiums to Increase as Risk is Expected to Soar

KnowBe4

New outlook data from cyber insurance underwriters shows where they think the biggest threats will be in 2024… and what they think organizations.

article thumbnail

NYC first to designate social media as environmental toxin via Axios

IG Guru

Check out the article here. The post NYC first to designate social media as environmental toxin via Axios first appeared on IG GURU.

Risk 79
article thumbnail

Associated Press: "Grave peril of digital conspiracy theories."

KnowBe4

The AP published a great article. This is your executive summary: Conspiracy theories have always been part of American culture, but advanced technology is making them more persuasive and dangerous than ever before. This was evident after the devastating Maui wildfires last August, when doctored videos and images spread rapidly on social media platforms like TikTok and YouTube claiming the fires were deliberately set by the U.S. government using advanced energy weapons.

article thumbnail

How to safeguard your data in a changing privacy landscape

OpenText Information Management

Data privacy is not a static concept. It evolves with the changing needs and expectations of consumers, businesses, and regulators. In 2023, we witnessed some major shifts in the data privacy landscape, such as the introduction of new laws and standards, the emergence of new technologies and threats, and the increased awareness and demand for … The post How to safeguard your data in a changing privacy landscape appeared first on OpenText Blogs.

Privacy 62
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Messenger Deserved Its Demise. Its Staff? Not So Much

John Battelle's Searchblog

Well that didn’t go well. I predicted the death of Jimmy Finkelstein’s The Messenger as soon as I read about its impending launch back in March of last year. At the time I had just soft-landed The Recount and was licking three decades of wounds related to launching, running, selling and shuttering digital media startups. And lo! Here was a guy claiming he was going to solve all of digital media’s woes with…what exactly?

IT 59
article thumbnail

How to choose the right financial technology partner 

OpenText Information Management

Selecting the right financial technology partner is a decision that carries long-lasting implications for banks’ success and future resilience, no matter the size. The dynamic nature of the financial industry and the relentless pace of technological advancement make this more critical. These highlight the need for a strategic approach to choosing a partner that aligns … The post How to choose the right financial technology partner appeared first on OpenText Blogs.

62
article thumbnail

What is the real business value of sustainability?

CGI

Executives are under increasing pressure to meet evolving sustainability and environmental, social and governance (ESG) mandates and stakeholder demands. At the same time, they must balance countless other factors disrupting the market, which are nearly impossible to control and predict. Many leaders seek to understand the real business value of sustainability and how it affects their organization.