Thu.Jul 20, 2023

article thumbnail

Combat IT Team Burnout by Embracing Automation

Data Breach Today

Expel VP Chris Waynforth on How Security Researchers Can Reduce False Positives Unnecessary cyber alerts are a threat that can overwhelm defenders, leading to burnout and reduced efficiency within the team. Chris Waynforth, vice president and general manager at Expel, said adopting automation solutions to filter and prioritize alerts allows for more effective incident response.

IT 246
article thumbnail

Digital Is Killing Serendipity

John Battelle's Searchblog

The buildings are the same, but the information landscape has changed, dramatically. Today I’m going to write about the college course booklet, an artifact of another time. I hope along the way we might learn something about digital technology, information design, and why we keep getting in our own way when it comes to applying the lessons of the past to the possibilities of the future.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal Reserve's FedNow Goes Live With Fast Payments

Data Breach Today

Program Expected to Modernize Country's Payment Systems FedNow, the Federal Reserve's first instant payment service, officially launched on Thursday. FedNow so far has 35 banks and credit unions and 16 service providers certified to use the service including community banks and large lenders such as JPMorgan Chase and Bank of New York Mellon.

246
246
article thumbnail

ALPHV/BlackCat and Clop gangs claim to have hacked cosmetics giant Estée Lauder

Security Affairs

The American cosmetics giant company Estée Lauder was hacked by two distinct ransomware groups, the ALPHV/BlackCat and Clop gangs. Yesterday the cybersecurity expert @sonoclaudio first alerted me about a strange circumstance, two ransomware actors, ALPHV/BlackCat and Clop, claim to have hacked the cosmetics giant company Estée Lauder and added the company to their Tor leak sites.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

JumpCloud Blames North Korean Hackers on Breach

Data Breach Today

Threat Actor Is Financially Motivated Focusing on Cryptocurrency, Says Mandiant Days after attributing the recent breach in its customer environment, enterprise software company JumpCloud on Thursday confirmed the involvement of a North Korean nation-state actor who appears to be financially motivated to steal cryptocurrency.

IT 240

More Trending

article thumbnail

When Cybercriminals Go Phishing, Emails Get the Most Bites

Data Breach Today

Developing a Multilayered Defense Strategy for the Most Common Attack Techniques Despite the significant advances technology has made over the past few years, email remains one of the best tools for cybercriminals. Training is just one piece of the puzzle. The best defense against today's cybercrime landscape is a multilayered security strategy.

Phishing 238
article thumbnail

NYPD Body Cam Data Shows the Scale of Violence Against Protesters

WIRED Threat Level

A landmark $13 million settlement with the City of New York is the latest in a string of legal wins for protesters who were helped by a video-analysis tool that smashes the “bad apple” myth.

article thumbnail

Remembering World-Famous Computer Hacker Kevin Mitnick

Data Breach Today

Social Engineering Expert Was Featured on FBI's Most Wanted List Before Going Legit Kevin Mitnick, the self-described "world's most famous hacker" - thanks in no small part to his being featured on the FBI's Most Wanted list during a two-year manhunt - has died at the age of 59. After serving time in prison, Mitnick went legit, warning others about the dangers of social engineering.

237
237
article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Kevin Mitnick, who turned legendary hacking exploits and two prison terms into a career as an esteemed cybersecurity leader, died Sunday at age 59 after a 14-month battle with pancreatic cancer, KnowBe4 revealed today. A memorial will be held August 1 in Las Vegas. Once dubbed “the world’s most wanted hacker” after his youthful exploits attacking Digital Equipment Corporation and Pacific Bell, Mitnick completed his decade-long transition to cybersecurity luminary when he joined

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cryptohack Roundup: Regulations, Multichain Update

Data Breach Today

Also: Hackers Launder Fewer Funds From DeFi Hacks in 1st Half of 2023 Between July 14 and 20, senators introduced a bill to address DeFi risk, Nasdaq held back crypto custody plans, DeFi hackers laundered lesser amounts of stolen funds in the first half of this year than in H1 2022, and an Australian bank blocked payments to high-risk crypto exchanges.

Risk 237
article thumbnail

Experts attribute WyrmSpy and DragonEgg spyware to the Chinese APT41 group

Security Affairs

China-linked group APT41 was spotted using two previously undocumented Android spyware called WyrmSpy and DragonEgg China-linked APT group APT41 has been observed using two previously undocumented Android spyware called WyrmSpy and DragonEgg. The APT41 group, aka Winnti , Axiom, Barium , Blackfly, HOODOO) is a China-linked cyberespionage group that has been active since at least 2007.

article thumbnail

Chinese Threat Group APT41 Linked To Android Malware Attacks

Data Breach Today

APT41 Used WyrmSpy and DragonEgg Surveillance Malware to Target Android Users Security researchers say the Chinese state-sponsored espionage group APT41 is using WyrmSpy and DragonEgg surveillance malware to target Android mobile devices. APT41 recently switched tactics to develop malware specific to the Android operating system.

Security 237
article thumbnail

The Number of Data Compromises Jumps 50% in H1 2023, Outpacing Every Year on Record

KnowBe4

New data from the Identity Theft Resource Center (ITRC) covering the first half of this year shows a significant rise in the number of successful cyber attacks focused on stealing corporate data.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Breach Roundup: US Ambassador to China's Email Hacked Too

Data Breach Today

Also: Linux Malware infects 70K Routers, More MOVEit Fallout, Estée Lauder Hit by Breach This week, U.S. Ambassador to China is the latest victim of Chinese hacks, Linux malware infected 70,000 routers, Norway banned Meta ads, the MOVEit breach affected 1.2 million more customers, a Russian medical lab suffered a ransomware attack, and Estée Lauder shut down some systems after a breach.

article thumbnail

Google Categorizes 6 Real-World AI Attacks to Prepare for Now

Dark Reading

The models powering generative AI like ChatGPT are open to several common attack vectors that organizations need to understand and get ready for, according to Google's dedicated AI Red Team.

85
article thumbnail

Lessons Learned From Brazil's PIX for US FedNow Program

Data Breach Today

Carlos Kazuo Missao Shares Case Studies From Brazil's Faster Payments Ecosystem Brazil's instant payment system, PIX, is second only to India's UPI in number of transactions. As the United States prepares for the launch of FedNow, GFT's Carlos Kazuo Missao shares his experience with PIX and some important lessons U.S. banks can learn from Brazil.

187
187
article thumbnail

European Union Healthcare Sees the Number of Cyber Incidents Double in 2023

KnowBe4

A new report focused on the healthcare sector sheds light on the state of cyber attacks in the European Union, including the types of attacks, who’s targeted, motivations, and who’s responsible.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

KillNet DDoS Attacks Further Moscow's Psychological Agenda

Data Breach Today

More Evidence Suggests Self-Promoting 'Hacktivist' Group Is Tool of Russian State While self-proclaimed Russian hacktivist groups such as KillNet, Tesla Botnet and Anonymous Russia claim they're wreaking havoc on anti-Moscow targets, a fresh analysis of their attacks finds that despite rampant self-promotion, their real-world cybersecurity impact is typically negligible.

article thumbnail

Align sustainability with innovation

OpenText Information Management

“We do not inherit the Earth from our ancestors, we borrow it from our children.” — Proverb From a business perspective, innovation is good. It makes new things possible, pushes the limits of our abilities, and fuels our imaginations so we can do more — faster, cheaper and better than before. And technology is, of … The post Align sustainability with innovation appeared first on OpenText Blogs.

IT 75
article thumbnail

Critical Infrastructure Workers Better At Spotting Phishing

Dark Reading

Critical-infrastructure employees are comparatively more engaged in organizational security — and compliance training — than those in other sectors.

article thumbnail

Kevin David Mitnick  (Aug 6, 1963 - July 16, 2023)

KnowBe4

The only constant is change. That is true for physics, for organizations, and for us humans. People join and leave teams, and of course also join and leave life. But it's always a shock when someone falls away too early.

IT 74
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Kevin Mandia Brings the HammerCon

Dark Reading

US Air Force veteran and Mandiant CEO discussed dwell time and state-sponsored attacks at the Military Cyber Professionals Association's HammerCon conference.

article thumbnail

P2PInfect, a Rusty P2P worm targets Redis Servers on Linux and Windows systems

Security Affairs

Cybersecurity researchers discovered a new peer-to-peer (P2P) worm called P2PInfect that targets Redis servers. Palo Alto Networks Unit 42 researchers have discovered a new peer-to-peer (P2P) worm called P2PInfect that targets Redis servers running on both Linux and Windows systems. The capability to target Redis servers running on both Linux and Windows operating systems makes P2PInfect more scalable and potent than other worms.

article thumbnail

Weekly Update 357

Troy Hunt

Sad news to wake up to today. Kevin was a friend and as I say in this week's video, probably the most well-known identity in infosec ever, and for good reason. He made a difference, and I have fun memories with him 😊 Felt really sad waking up and seeing “RIP Kevin” in my timeline. I doubt there is a more well known name in our industry but if he’s unfamiliar to you (or you haven’t read this book), go and grab “Ghost in the Wires” which is an

Access 67
article thumbnail

Should You Be Using a Cybersecurity Careers Framework?

Dark Reading

Frameworks can help improve hiring practices and retention, and help guide education — which makes them an important asset worth exploiting.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Adobe out-of-band update addresses an actively exploited ColdFusion zero-day

Security Affairs

Adobe released an emergency update to address critical vulnerabilities in ColdFusion, including an actively exploited zero-day. Adobe released an out-of-band update to address critical and moderate vulnerabilities in ColdFusion, including a zero-day flaw that is actively exploited in attacks.  The vulnerabilities could lead to arbitrary code execution and security feature bypass.

article thumbnail

Estée Lauder Breached in Twin MOVEit Hacks, by Different Ransom Groups

Dark Reading

The cosmetics conglomerate was apparently breached through the infamous MOVEit flaw by both Cl0p and BlackCat, at roughly the same time.

78
article thumbnail

Microsoft was the Most Impersonated Brand in Q2, 2023

KnowBe4

Microsoft was the most impersonated brand in phishing attacks during Q2, 2023, according to Check Point’s latest Brand Phishing Report.