Mon.Nov 06, 2023

article thumbnail

State-Sponsored Attackers Targeting Armenians, Apple Warns

Data Breach Today

'Lockdown Mode' Can Defeat Commercial Spyware Members of Armenian civil society say they have received warnings from Apple regarding commercial spyware. John Scott-Railton, a senior researcher at The Citizen Lab, tweeted that "Apple threat notifications are 'clear & invaluable' signs something serious is going on.

285
285
article thumbnail

Who’s Behind the SWAT USA Reshipping Service?

Krebs on Security

Last week, KrebsOnSecurity broke the news that one of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. In today’s Part II, we’ll examine clues about the real-life identity of “ Fearlless ,” the nickname chosen by the proprietor of the SWAT USA Drops service.

Passwords 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Palo Alto Networks to Buy Enterprise Browser Startup Talon

Data Breach Today

Talon Acquisition Will Allow Users to Securely Access Business Apps From Any Device Palo Alto Networks announced its second acquisition in a week, scooping up the 2022 winner of RSA Conference's prestigious Innovation Sandbox contest. The proposed buy of Talon Cyber Security will enable users to securely access business applications from any device, including non-corporate devices.

Access 282
article thumbnail

GUEST ESSAY: How to mitigate the latest, greatest phishing variant — spoofed QR codes

The Last Watchdog

QR code phishing attacks started landing in inboxes around the world about six months ago. Related: ‘BEC’ bilking on the rise These attacks prompt the target to scan a QR code and trick them into downloading malware or sharing sensitive information. In June, we started seeing these types of attacks amongst our customer base. Since June, there has been a fourfold increase in the search volume around keywords associated with these types of attacks.

Phishing 167
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Pentagon AI Strategy Pursues Agile and Responsible Adoption

Data Breach Today

Defense Department's Artificial Intelligence Strategy Prioritizes Deployment Speed The Department of Defense has published guidance calling for the rapid and responsible deployment of artificial intelligence systems across its entire enterprise while emphasizing continuous experimentation, iterative feedback loops between experts and users and enhanced data and analytics programs.

More Trending

article thumbnail

How CISOs Can Mitigate Personal Liability Concerns

Data Breach Today

CISO Quentyn Taylor on Preparing for More Scrutiny in Wake of SolarWinds Charges SEC regulators have filed charges against software company SolarWinds and its CISO Tim Brown - accusing them of misleading investors about the firm's cybersecurity practices in light of a high-profile hack. Canon security leader Quentyn Taylor examined implications for other CISOs.

article thumbnail

QNAP fixed two critical vulnerabilities in QTS OS and apps

Security Affairs

Taiwanese vendor QNAP warns of two critical command injection flaws in the QTS operating system and applications on its NAS devices. Taiwanese vendor QNAP Systems addressed two critical command injection vulnerabilities, tracked as CVE-2023-23368 and CVE-2023-23369 , that impact the QTS operating system and applications on its network-attached storage (NAS) devices.

IT 121
article thumbnail

FTC Alleges Data Broker Sells Vast Amounts of Sensitive Data

Data Breach Today

Agency Details Accusations Against Idaho Firm in Unsealed Amended Complaint The Federal Trade Commission in an amended lawsuit complaint unsealed Friday details how Idaho-based data broker Kochava allegedly violated federal law by collecting and disclosing to third parties "enormous" amounts of geolocation and other sensitive information about consumers.

272
272
article thumbnail

Meet Your New Cybersecurity Auditor: Your Insurer

Dark Reading

As cyber insurance gets more expensive and competitive, security decision-makers have actionable opportunities to strengthen their cyber defenses.

Insurance 126
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Liechtenstein's Data Regulator Releases AI Chatbot Guidance

Data Breach Today

Guidance Cites GDPR Transparency and Consent Clauses The data protection regulator of European country Liechtenstein rolled out new data processing guidance for large language model-powered chatbots such as ChatGPT. The primary legal basis for compliance will be the consent and transparency clauses of the GDPR, the agency said.

GDPR 272
article thumbnail

4 ways to empower small and medium businesses with generative AI

IBM Big Data Hub

In a tightening economy, small and medium businesses (SMBs) are challenged to grow while protecting thinning margins. Compared to large businesses, SMBs have fewer resources to help them weather an economic downturn or diversify into new value streams. As such, enterprises that serve SMBs must provide solutions that lessen administrative burdens and deliver tangible value.

article thumbnail

ISC2 Cyber Workforce Study Says AI, Cloud Skills Are Needed

Data Breach Today

ISC2 CEO Clar Rosso on the Latest Cybersecurity Training and Development Trends Tech firms are making huge investments in generative AI tools, but nearly half of cybersecurity professionals say they have little or no or knowledge of AI, according to ISC2's Cyber Workforce Study 2023, which surveyed 14,865 international security practitioners and decision-makers.

Cloud 270
article thumbnail

Crashing iPhones with a Flipper Zero

Schneier on Security

The Flipper Zero is an incredibly versatile hacking device. Now it can be used to crash iPhones in its vicinity by sending them a never-ending stream of pop-ups. These types of hacks have been possible for decades, but they require special equipment and a fair amount of expertise. The capabilities generally required expensive SDRs­—short for software-defined radios­—that, unlike traditional hardware-defined radios, use firmware and processors to digitally re-create radio signal tran

IT 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Novel Google Cloud RAT Uses Calendar Events for C2

Dark Reading

Cybercriminals are abusing legitimate functions within cloud services, and providers can't totally stop them, especially when it comes to innovative approaches like this.

Cloud 102
article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

Welcome to this week’s round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks True Potential leaks clients’ personal data to adviser Date of breach: October 2023 (exact date unknown) Breached organisation: True Potential, a wealth management platform Incident details: True Potential

article thumbnail

Virtual Kidnapping: AI Tools Are Enabling IRL Extortion Scams

Dark Reading

With AI and publicly available data, cybercriminals have the resources they need to fake a real-life kidnapping and make you believe it.

IT 114
article thumbnail

Expert Insight: Andrew Snow

IT Governance

Insights into the new UK–US ‘data bridge’ from our data protection and cyber trainer Andrew Snow is a GDPR DPO (General Data Protection Regulation data protection officer) with extensive public- and private-sector experience in regulatory compliance, privacy compliance framework development, and other areas relating to data protection. He is also an enthusiastic data privacy and cyber security trainer , consistently receiving high praise from course attendees.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks

Dark Reading

Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise "GootBot" attack, each implant with its own C2.

Access 100
article thumbnail

Healthcare Sector Experiencing Increases in Ransomware, Ransoms and Downtime

KnowBe4

An analysis of ransomware attacks on healthcare organizations from 2016 through October of 2023 shows the healthcare sector is likely to continue to suffer as a viable ransomware target.

article thumbnail

Middle East's 5G Acceleration May Pose Serious Security Issues

Dark Reading

Telcos across the Middle East are rapidly rolling out 5G networks. Will this accelerated adoption lead to higher security vulnerabilities?

Security 103
article thumbnail

Weekly Vulnerability Recap – November 6, 2023 – Windows Drivers and Exchange Flaws

eSecurity Planet

The past week has been a busy one for cybersecurity vulnerabilities, with 34 vulnerable Windows drivers and four Microsoft Exchange flaws heading a long list of security concerns. Other major flaws appeared in the NGINX Ingress Controller for Kubernetes, Atlassian Confluence Data Center and Server, and Apache ActiveMQ — and the latter two have already been targeted in ransomware attacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Kinsing Cyberattackers Debut 'Looney Tunables' Cloud Exploits

Dark Reading

Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.

Cloud 102
article thumbnail

IT Admins Continue to Use Weak Passwords

KnowBe4

In an analysis of web pages identified as admin portals, some incredibly weak passwords were identified – and some of them are going to really surprise you.

article thumbnail

Steps to Follow to Comply With the SEC Cybersecurity Disclosure Rule

Dark Reading

Mandiant/Google Cloud’s Jill C. Tyson offers up timelines, checklists, and other guidance around enterprise-wide readiness to ensure compliance with the new rule.

article thumbnail

Monsido Meets Digital Sovereignty Requirements with Cloud Key Management

Thales Cloud Protection & Licensing

Monsido Meets Digital Sovereignty Requirements with Cloud Key Management madhav Tue, 11/07/2023 - 05:34 The World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned by very few US-based companies, which raises concerns about data ownership and control. Many countries and regions have implemented strict data protection laws, such as the European Union's General Data Protection Regulation (GDPR), requiring organizations to adhere to specific data pro

Cloud 71
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Name That Edge Toon: Out for the Count

Dark Reading

Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

article thumbnail

OpenText Managed Security Services soar in Top 250

OpenText Information Management

By 2025, according to Gartner Market Guide for Managed Detection and Response Services (February 2023), we foresee a significant shift: 60% of organizations will actively embrace remote threat disruption and containment capabilities offered directly by Managed Detection and Response (MDR) providers. But what does this mean for modern businesses? In this new era of cybersecurity, … The post OpenText Managed Security Services soar in Top 250 appeared first on OpenText Blogs.

article thumbnail

US Sanctions Ryuk Ransomware’s Russian Money Launderer

Dark Reading

Woman is accused of assisting Russian oligarchs and ransomware affiliates with schemes to evade sanctions.