Thu.Aug 17, 2023

article thumbnail

Inside the Rise of 'Dark' AI Tools - Scary, But Effective?

Data Breach Today

WormGPT, DarkGPT and Their Ilk Underdelivered - or Were Scams, Researchers Report Various "dark" generative artificial intelligence tools purportedly help criminals more quickly amass victims. Guess what? They've all gone bust, if they weren't simply outright scams - in part because legitimate tools can be "jailbroken" to achieve similar results. What are they really achieving?

article thumbnail

Karma Catches Up to Global Phishing Service 16Shop

Krebs on Security

You’ve probably never heard of “ 16Shop ,” but there’s a good chance someone using it has tried to phish you. A 16Shop phishing page spoofing Apple and targeting Japanese users. Image: Akamai.com. The international police organization INTERPOL said last week it had shuttered the notorious 16Shop, a popular phishing-as-a-service platform launched in 2017 that made it simple for even complete novices to conduct complex and convincing phishing scams.

Phishing 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake Out: Disinformation Campaigns Get Generative AI Boost

Data Breach Today

Nation-States Running Information Operations Embrace AI-Generated Images and Video Hackers wielding generative artificial intelligence tools have yet to pose a serious cybersecurity risk, say researchers at Google's threat intelligence group Mandiant, as they sound the alarm instead about a rise in information operations featuring AI-generated fake images and video.

article thumbnail

Fake Airplane Mode: A mobile tampering technique to maintain connectivity

Jamf

Jamf Threat Labs developed a post-exploit persistence technique on iOS 16 that falsely shows a functional Airplane Mode. In reality, after successful device exploit the attacker plants an artifical Airplane Mode that edits the UI to display Airplane Mode icons and cuts internet connection to all apps except the attacker application. This enables the attacker to maintain access to the device even when the user believes it is offline.

Access 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptohack Roundup: Argentina Investigates WorldCoin

Data Breach Today

Also: Milk Sad Vulnerability, FBI Forfeiture, X Crypto Scams This week's roundup of digital assets-related cybersecurity incidents includes Argentina's investigation into WorldCoin; hackers' exploitation of Libbitcoin; Zunami and RocketSwap; Curve Finance's compensation plans for hack victims; the FBI's $1.7 million forfeiture; and X's crypto scam problem.

More Trending

article thumbnail

Why HHS Regulators Are Heavily Scrutinizing Web Tracker Use

Data Breach Today

Susan Rhodes of HHS OCR Discusses HIPAA Enforcement Agency's Top Priorities The federal agency that enforces HIPAA is heavily focused on investigations of potential violations involving online tracking tools in healthcare websites that impermissibly transmit sensitive patient information to third parties, said Susan Rhodes of the Department of Health and Human Services.

244
244
article thumbnail

Experts devise an exploit for Apple iOS 16 that relies on fake Airplane Mode

Security Affairs

Researchers detailed a new exploit for Apple iOS 16 that can allow attackers to gain access to a device even when the victim believes it is in Airplane Mode. Jamf Threat Labs researchers developed a post-exploit persistence technique on iOS 16 that trick victims into believing that the device is in functional Airplane Mode. In reality, the researchers plant an artificial Airplane Mode that modifies the UI to display Airplane Mode icons and cuts internet connection to all apps except the rogue at

Access 97
article thumbnail

Play Ransomware Using MSPs and N-Days to Attack

Data Breach Today

Fortinet SSL VPN Vulnerability Is Among Top Most Common Vulnerabilities The Play ransomware group is targeting security managed service providers to gain initial access and using up to a half-decade-old vulnerabilities in security appliances, warn security researchers with Adlumin. The gang is also using intermittent encryption in a bid to avoid setting off defenses.

article thumbnail

APT29 is targeting Ministries of Foreign Affairs of NATO-aligned countries

Security Affairs

Russia-linked APT29 used the Zulip Chat App in attacks aimed at ministries of foreign affairs of NATO-aligned countries EclecticIQ researchers uncovered an ongoing spear-phishing campaign conducted by Russia-linked threat actors targeting Ministries of Foreign Affairs of NATO-aligned countries. The experts detected two PDF files masqueraded as coming from the German embassy and that contained two diplomatic invitation lures.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Palo Alto, Versa, Fortinet, Cato Command SASE Forrester Wave

Data Breach Today

Providers Build, Buy Their Way Into Native SD-WAN, SSE Capabilities Over Past Year Palo Alto Networks edged out Versa Networks, Cato Networks and firewall rival Fortinet for the top spot in Forrester's first-ever secure access service edge rankings. Leading providers have over the past 18 months built or bought both the networking and security pieces of SASE, Forrester found.

Access 240
article thumbnail

Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattack

Security Affairs

Cleaning products manufacturer Clorox Company announced that it has taken some systems offline in response to a cyberattack. The Clorox Company is a multinational consumer goods company that specializes in the production and marketing of various household and professional cleaning, health, and personal care products. The cleaning product giant announced it was the victim of a cybersecurity incident this week that forced it to take some systems offline.

article thumbnail

Breach Roundup: Raccoon Stealer Makes a Comeback

Data Breach Today

Also: QR Codes Used in Phishing Campaign; Belarus ISPs Used for Spying This week, Raccoon Stealer returned, hackers used QR codes, Belarus ISPs were used to spy on diplomats, Geico reported a MOVEit breach, an Israeli hospital dealt with ransomware extortion, Clorox took systems offline after an attack, and researchers found flaws in AudioCodes phones and Zoom's ZTP.

Phishing 238
article thumbnail

Accenture + Collibra: 2023 data mesh reading list

Collibra

Created in 2019, the concept of the data mesh is one of the most-discussed topics in data management. As more and more zettabytes of data are created every year, organizations everywhere are seeking better ways to accelerate turning data into better decisions, better products, and ultimately better organizations. Over the last year, together with Accenture, we’ve created a number of helpful data mesh assets, and we wanted to pull them together to help you quickly get to what you need.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malware Is Turning Windows Machines Into Proxies

Data Breach Today

Proxy App Is Covertly Installed Via Alluring Offers or Compromised Software Researchers say a proxy service is routing internet traffic through unsuspecting users' systems that it turns into residential exit nodes, luring them into downloading the proxy application through offers of cracked software and games. Antivirus engines don't detect the application.

IT 233
article thumbnail

Alarming lack of cybersecurity practices on world’s most popular websites

Security Affairs

The world’s most popular websites lack basic cybersecurity hygiene, an investigation by Cybernews shows. Do you happen to love exploring DIY ideas on Pinterest? Scrolling through IMDB to pick the next movie to watch? Or simply scrolling through Facebook to see what your friends and enemies have been up to? The Cybernews research team has deep-dived into an issue that’s quite often overlooked by developers – HTTP security headers.

article thumbnail

LinkedIn Suffers 'Significant' Wave of Account Hacks

Dark Reading

Users report losing access to their accounts, with some being pressured into paying a ransom to get back in or else face permanent account deletion.

Access 98
article thumbnail

HHS Launches 'Digiheals' Project to Better Protect US Hospitals From Ransomware

WIRED Threat Level

An innovation agency within the US Department of Health and Human Services will fund research into better defenses for the US health care system’s digital infrastructure.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Central Bank Digital Currency (CBDC) and blockchain enable the future of payments

IBM Big Data Hub

The financial world has been revolutionized by blockchain technology, which has enabled peer-to-peer transactions without the need for intermediaries. The introduction of Central Bank Digital Currency (CBDC) has added a new dimension to blockchain technology that transforms the future of payments for businesses and individuals. Some time ago, banks and governments started shifting their attention towards using digital assets in their operations and economies.

article thumbnail

Detecting “Violations of Social Norms” in Text with AI

Schneier on Security

Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is the sort of thing that AIs will get better at. (Like all of these systems, anything but a very low false positive rate makes the detection useless in practice.) News article.

article thumbnail

The Essential Components of a Data Protection Strategy

Record Nations

Data protection ensures that you take the appropriate precautions to keep data safe while maintaining availability for its users. As cybercrime evolves and data breaches increase, data protection can be a challenge. Having a solid data protection strategy in place will help your business standardize data security and prevent unauthorized access to private information.

article thumbnail

Interpres: Getting the Most Out of Threat Intelligence Resources

Dark Reading

In this Dark Reading News Desk segment, Interpres Security's Nick Lantuh discusses how security practitioners can get the most out of various threat intelligence offerings.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

UK ICO Scrutinizes Use of Generative AI

Data Matters

Following the EU’s increased focus on generative AI with the inclusion of foundation and generative AI in the latest text of the EU AI Act (see our post here ), the UK now also follows suit, with the UK’s Information Commissioner’s Office (“ ICO ”) communicating on 15 June 2023 its intention to “review key businesses’ use of generative AI.” The ICO warned businesses not to be “blind to AI risks” especially in a “rush to see opportunity” with generative AI.

article thumbnail

Bitsight Leverages SPM to Bolster External Attack Surface Security

Dark Reading

In this Dark Reading News Desk segment, BitSight's Gregory Keshian discusses external attack surface management and security performance management.

article thumbnail

La ARMA Nostra Certification Reimbursement Award Deadline Extended

IG Guru

Press Release August 15, 2023 – La ARMA Nostra Certification Reimbursement Award Deadline Extended The ARMA International Educational Foundation (AIEF) has extended the deadline to apply for the La ARMA Nostra’s Reimbursement Award to Friday, September 1, 2023. This program provides reimbursement for information management practitioners working toward, or having recently completed, certifications related to […] The post La ARMA Nostra Certification Reimbursement Award Deadline Extended fir

article thumbnail

Fastly Launches Certainly CA

Dark Reading

The company’s moves to expand its TLS and domain name services strengthens the security and trust of its global web infrastructure.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Unlock true Kubernetes cost savings without losing precious sleep over performance risks

IBM Big Data Hub

The race to innovate has likely left you (and many, many others) with unexpectedly high cloud bills and/or underutilized resources. In fact, according to Flexera’s 2023 State of the Cloud report , for the first time in a decade, “managing cloud spend” (82%) surpassed “security” (79%) to become the number one challenge facing organizations across the board.

Risk 62
article thumbnail

Researchers Trick an iPhone Into Faking Airplane Mode

Dark Reading

How mobile attackers could gaslight iPhone users, allowing the perfect cover for post-exploitation malicious activity.

80
article thumbnail

Singapore Releases Proposed Advisory Guidelines on Use of Personal Data in AI Recommendation and Decision Systems

Data Protection Report

On 18 July 2023, Singapore’s Personal Data Protection Commission ( PDPC ) issued its Proposed Advisory Guidelines on Use of Personal Data In AI Recommendation and Decision Systems (the Proposed AI Advisory Guidelines ) for public consultation. The Proposed AI Advisory Guidelines address the following: How organisations may avail themselves of existing exceptions under the Personal Data Protection Act 2012 ( PDPA ) when seeking to use personal data in the development of machine-learning AI models