Wed.Aug 09, 2023

article thumbnail

Lawsuits Mounting Against Florida Hospital in Wake of Breach

Data Breach Today

So Far, 3 Proposed Class Actions Allege Negligence in Case Affecting 1.3M People Tampa General Hospital is facing at least three proposed federal class action lawsuits filed in recent days following the nonprofit Florida healthcare provider's disclosure late last month of a data theft incident that affected 1.3 million patients and employees.

246
246
article thumbnail

News alert: Fireblocks uncovers vulnerabilities impacting dozens of major wallet providers

The Last Watchdog

New York, N.Y., Aug.9, 2023 – Today, the Fireblocks Cryptography Research Team announced the findings of multiple zero-day vulnerabilities in some of the most used cryptographic multi-party computation (MPC) protocols, including GG-18, GG-20, and implementations of Lindell 17. If left unremediated, the exposures would allow attackers and malicious insiders to drain funds from the wallets of millions of retail and institutional customers in seconds, with no knowledge to the user or vendor.

Retail 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rapid7 Lays Off 18% of Employees Amid Shift to MDR Services

Data Breach Today

Loss of 470 Workers Is Cybersecurity Industry's Second-Largest Workforce Reduction Rapid7 will lay off close to 1 in 5 of its employees in cuts that amount to the second-largest round of layoffs of any pure-play cybersecurity company since worries about an economic downturn began percolating in spring 2022. The vendor will reduce its 2,623-person staff by 18%.

article thumbnail

Windows Defender-Pretender Attack Dismantles Flagship Microsoft EDR

Dark Reading

A newly patched flaw in Windows Defender allows attackers to hijack the signature-update process to sneak in malware, delete benign files, and inflict mayhem on target systems.

98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Law Enforcement Takes Down Phishing As A Service Site

Data Breach Today

Authorities In Multiple Countries Arrest Operators of 16Shop An international law enforcement operation took down a phishing-as-a-service website that security researchers say was responsible for more than 150,000 phishing domains. The site, 16shop, sold phishing kits that targeted more than 70,000 people in 43 countries.

Phishing 244

More Trending

article thumbnail

Northern Ireland Police at Risk After Serious Data Breach

Data Breach Today

Current PSNI Employees' Surnames and Locations Revealed Via Public Spreadsheet Police officers in Northern Ireland are sounding alarms over their personal safety after a data breach revealed the surnames and locations where they serve for nearly 10,000 police officers and staff. Experts warn this could lead to "their death or injury" at the hands of criminals or terrorists.

article thumbnail

Balada Injector still at large – new domains discovered

Security Affairs

The Balada Injector is still at large and still evading security software by utilizing new domain names and using new obfuscation. During a routine web monitoring operation, we discovered an address that led us down a rabbit hole of WordPress-orientated “hack waves” caused by the Balada Injector malware. This evidence suggests that the malware is still at large and still evading security software by utilizing new domain names and slight changes between the waves of obfuscated attacks.

Access 96
article thumbnail

Finland and Norway Ban Yango's Data Transfer to Russia

Data Breach Today

Move Comes as Russia Allows a Law Permitting Access to Taxi User Data Data protection agencies in Finland and Norway on Tuesday imposed a temporary data transfer ban on Russian ride-hailing app Yango over concerns that Moscow could access sensitive data of Europeans. The ban comes before a Russian law granting the FSB access to taxi users' data takes effect Sept. 1.

Access 241
article thumbnail

EvilProxy used in massive cloud account takeover scheme

Security Affairs

Cloud account takeover scheme utilizing EvilProxy hit over 100 top-level executives of global organizations EvilProxy was observed sending 120,000 phishing emails to over a hundred organizations to steal Microsoft 365 accounts. Proofpoint noticed a worrisome surge of successful cloud account compromises in the past five months. Most of the attacks targeted high-ranking executives.

Cloud 95
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Defending Against Real-Time Financial Fraud

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alisdair Faulkner of security and fraud prevention startup Darwinium discussed how the FedNow Service will add a layer of complexity to defending against real-time financial fraud scams used in faster payments transactions.

article thumbnail

New PCI Password Requirements Could Be the Impetus for Credential Harvesting Scams

KnowBe4

As the retirement countdown for the current version of PCI is now less than six months, a new standard for password length, complexity, and change frequency may create some risk.

article thumbnail

Ukraine Fends Off Sandworm Battlefield Espionage Ploy

Data Breach Today

Russian Military Hackers Planned Mobile Device Malware Campaign Ukrainian cyber defenders said they had thwarted an attempt by Russian military intelligence to deploy widespread malware programmed to spy on battlefield management apps. Russian hackers' preparation for the malware campaign was "long-term and thorough," Ukraine's SBU said.

Military 223
article thumbnail

Hackers Rig Casino Card-Shuffling Machines for ‘Full Control’ Cheating

WIRED Threat Level

Security researchers accessed an internal camera inside the Deckmate 2 shuffler to learn the exact deck order—and the hand of every player at a poker table.

Access 97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

It's Time for Cybersecurity to Talk About Climate Change

Dark Reading

From e-waste to conference swag to addressing data center energy consumption, cybersecurity stakeholders need a whole-industry approach to being part of the solution and reducing the risk of climate change.

article thumbnail

Scammers Exploit Twitter’s Transition to “X”

KnowBe4

Scammers are taking advantage of Twitter’s rebranding to “X,” according to Stephanie Adlam at Gridinsoft. A phishing campaign is targeting Twitter Blue users by telling them they need to transfer their subscription to X.

article thumbnail

'Downfall' Bug in Billions of Intel CPUs Reveals Major Design Flaw

Dark Reading

A newly revealed flaw affects a good chunk of the world's computers. A patch has been released, but broad, structural change in CPU design will be required to address the root cause.

88
article thumbnail

Patch Tuesday Targets 74 Flaws, Including Microsoft Teams, Office

eSecurity Planet

Microsoft’s Patch Tuesday for August 2023 addresses 74 vulnerabilities, six of them critical. The company also issued two advisories, one of them addressing a Microsoft Office flaw that was disclosed but unpatched in last month’s update. The six critical vulnerabilities discussed in the release note are as follows: CVE-2023-29328 and CVE-2023-29330 , a pair of remote code execution flaws in Microsoft Teams with a CVSS score of 8.8 CVE-2023-35385 , CVE-2023-36910 , and CVE-2023-36911

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Wordfence Becomes the Latest Brand to be Impersonated Putting 800 Million Sites at Risk

KnowBe4

With its wide use and trusted state among Wordpress developers and website admins, a new campaign impersonating the website security brand could put hundreds of millions of websites at risk.

Risk 84
article thumbnail

Disposed-of Gadgets Can Lead to Wi-Fi Network Hacks, Kaspersky Says

Dark Reading

Wi-Fi settings are easily stolen when old gadgets are gotten rid of, which puts end users in the crosshairs for network attacks.

97
article thumbnail

Australians Reporting Alarming Number of Losses to Vishing and Smishing Scams

KnowBe4

We know that scam calls (aka vishing) and scam SMSs (aka smishing) are out of control, and for most unaware Australians, they continue to cause pain and suffering. According to the Australian Competition and Consumer Commission (ACCC) Australians reported at least $3.1 billion in scam losses in 2022, an 80% increase from 2021. What that says to me is that something is missing.

article thumbnail

New LLM Tool Seeks and Remediates Vulnerabilities

Dark Reading

At Black Hat USA 2023, Vicarius launched vuln_GPT, which it says will generate and execute scripts to ameliorate flaws such as the TETRA backdoor.

IT 87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What is a phishing simulation?

IBM Big Data Hub

A phishing simulation is a cybersecurity exercise that tests an organization’s ability to recognize and respond to a phishing attack. A phishing attack is a fraudulent email, text or voice message designed to trick people into downloading malware (such as ransomware ), revealing sensitive information (such as usernames, passwords or credit card details) or sending money to the wrong people.

article thumbnail

Record ¥3 bil stolen via phishing in Japan in 1st half of 2023

KnowBe4

A record 2,322 scams in Japan to steal internet banking IDs and passwords have resulted in unauthorized money transfers totaling a record of around 3 billion yen ($21 million) in the first half of this year, a report by the National Police Agency showed Tuesday.

article thumbnail

Connecting IBM VPC to IBM Power Virtual Servers and IBM Cloud Object Storage

IBM Big Data Hub

In the ever-evolving landscape of cloud computing, businesses are continuously seeking robust, secure and flexible solutions to meet their IT infrastructure demands. In this post, we’ll discuss connecting the robust IBM Power Virtual Servers service to the secure IBM Cloud Virtual Private Cloud environment using IBM Cloud to support diverse workloads.

Cloud 76
article thumbnail

Downfall Intel CPU side-channel attack exposes sensitive data

Security Affairs

Google researcher Daniel Moghimi devised a new side-channel attack technique, named Downfall, against Intel CPU. Google researcher Daniel Moghimi devised a new side-channel attack technique Intel CPU, named Downfall, that relies on a flaw tracked as CVE-2022-40982. An attacker can exploit this vulnerability to access and steal data from other users who share the same systems.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Interpol Shuts Down African Cybercrime Group, Seizes $2 Million

Dark Reading

Operation Jackal involved law enforcement agencies in 21 countries and yielded more than 100 arrests.

98
article thumbnail

How to Remove Your Info From Google With the 'Results About You' Tool

WIRED Threat Level

You can also set up alerts for whenever your home address, phone number, or email address appears in Search.

article thumbnail

Blockchain Signing Bug Cracks Open Crypto Investors' Wallets Worldwide

Dark Reading

Bugs in popular digital signature schemes designed to protect crypto investors allow attackers to steal private keys gain full access to digital wallets.