Mon.Apr 17, 2023

article thumbnail

LockBit Ransomware Tests Taking a Bite Out of Apple Users

Data Breach Today

Don't Panic: Apparent macOS Beta Testing Is Highly Buggy, Poses No Immediate Threat Apple users: Don't fear newly discovered samples of LockBit ransomware designed to target newer macOS devices. Researchers say the still-in-development code, tied to no known in-the-wild attacks, contains numerous errors, leaving it unable to execute.

article thumbnail

GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk

The Last Watchdog

No organization is immune to cybersecurity threats. Even the most well-protected companies can be susceptible to attacks if they are not careful about a proactive approach towards cyber security. Related: Why timely training is a must-have That’s why businesses of all sizes need to understand the biggest cybersecurity weaknesses and take steps to mitigate them.

Risk 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How New Federal Cyber Resources Can Help Healthcare Entities

Data Breach Today

New resources released Monday from a high-profile federal advisory group provide insights into the state of healthcare sector preparedness and best practices for dealing with evolving cyberthreats, according to Erik Decker, CISO of Intermountain Healthcare and co-chair of the task force.

130
130
article thumbnail

Threat advisory: Mobile spyware continues to evolve

Jamf

Jamf Threat Labs examines two sophisticated spyware attacks and provides recommendations for organizations to defend users from increasingly complex threats.

144
144
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

US Charges Chinese Officials With Running Troll Farm

Data Breach Today

Also: Conspiracy to Transmit Interstate Threats and Commit Interstate Harassment U.S. law enforcement says a troll farm operated by the Chinese Ministry of Public Security used fake Facebook and Twitter accounts to disseminate propaganda and harass dissidents located in the United States. The troll farm was part of a Chinese effort known as the 912 Special Project Working Group.

Security 130

More Trending

article thumbnail

CISA: Why Healthcare Is No Longer Off-Limits for Attackers

Data Breach Today

Healthcare entities of all types and sizes could be the next targets of major cybersecurity attacks, said Nitin Natarajan, deputy director of the Cybersecurity and Infrastructure Security Agency. Healthcare firms need to be vigilant against ransomware, DDoS and medical device breaches, he said.

article thumbnail

Vice Society gang is using a custom PowerShell tool for data exfiltration

Security Affairs

Vice Society ransomware operators have been spotted using a PowerShell tool to exfiltrate data from compromised networks. Palo Alto Unit 42 team identified observed the Vice Society ransomware gang exfiltrating data from a victim network using a custom-built Microsoft PowerShell (PS) script. Threat actors are using the PowerShell tool to evade software and/or human-based security detection mechanisms.

article thumbnail

Conquering the Unique IAM Challenges in Healthcare

Data Breach Today

Security VP Dave Summitt of Florida-Based Cancer Center Discusses Top IAM Issues Healthcare sector entities have a special mix of identity and access management challenges, but other factors, including the shortage of skilled cybersecurity expertise, create even more obstacles, says Dave Summitt, vice president, cybersecurity, at Florida Cancer Specialists & Research Institute.

article thumbnail

New QBot campaign delivered hijacking business correspondence

Security Affairs

Kaspersky researchers warn of a new QBot campaign leveraging hijacked business emails to deliver malware. In early April, Kaspersky experts observed a surge in attacks that QBot malware attacks (aka Qakbot , QuackBot, and Pinkslipbot ). QBot has been active since 2008, it is used by threat actors for collecting browsing data and banking credentials, and other financial information from the victims.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Top 5 Data Security RSAC 2023 Sessions to Attend

Dark Reading

A little preconference reconnoitering of upcoming seminars, keynotes, and track sessions makes plotting your days easier. Here's one attendee's list.

Security 105
article thumbnail

Experts warn of an emerging Python-based credential harvester named Legion

Security Affairs

Legion is an emerging Python-based credential harvester and hacking tool that allows operators to break into various online services. Cado Labs researchers recently discovered a new Python-based credential harvester and hacking tool, named Legion, which was sold via Telegram. At this time, the sample analyzed by Cado Labs has a low detection rate of 0 on VirusTotal.

CMS 95
article thumbnail

Swatting as a Service

Schneier on Security

Motherboard is reporting on AI-generated voices being used for “swatting”: In fact, Motherboard has found, this synthesized call and another against Hempstead High School were just one small part of a months-long, nationwide campaign of dozens, and potentially hundreds, of threats made by one swatter in particular who has weaponized computer generated voices.

article thumbnail

Israeli surveillance firm QuaDream is shutting down amidst spyware accusations

Security Affairs

The Israeli surveillance firm QuaDream is allegedly shutting down its operations after Citizen Lab and Microsoft uncovered their spyware. Last week Citizen Lab researchers reported that at least five civil society members were victims of spyware and exploits developed by the Israeli surveillance firm QuaDream. The victims include journalists, political opposition figures, and an NGO worker located in North America, Central Asia, Southeast Asia, Europe, and the Middle East.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NC State University Wolfpack One Card: Next-Gen Credential Issuance for Student ID Cards

HID Global

Today’s colleges demand secure solutions such as HID's multifunction Wolfpack One Card for safely connecting students to services and applications campus wide.

article thumbnail

Indian Rail Passenger Ticketing Platform Warns of Online Fraud

KnowBe4

The Indian Railway Catering and Tourism Corporation (IRCTC), described as “a popular platform used by a significant number of Indians for booking train tickets,” has cautioned users about a malicious Android application that’s being used to commit fraud against railway passengers.

89
article thumbnail

ICE Records Reveal How Agents Abuse Access to Secret Data

WIRED Threat Level

Documents obtained by WIRED detail hundreds of investigations by the US agency into alleged database misuse that includes harassment, stalking, and more.

Access 92
article thumbnail

Google Issues Emergency Chrome Update for Zero-Day Bug

Dark Reading

Because the security vulnerability is under active exploit, Google isn't releasing full details of the flaw while users could remain vulnerable.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

OPSWAT MetaAccess: NAC Product Review

eSecurity Planet

OPSWAT continues to build out the capabilities of MetaAccess, their network access control (NAC) solution, and offers an attractive trial of up to 50 licenses for an unlimited duration. MetaAccess focuses on delivery of a virtual appliance that can be deployed with equal capability in local networks or in the cloud for robust, far-reaching capabilities.

Access 81
article thumbnail

Apple's Macs Have Long Escaped Ransomware. That May Be Changing

WIRED Threat Level

The discovery of malicious encryptors for Apple computers could herald new risks for macOS users if the malware continues to evolve.

article thumbnail

How CISOs Can Craft Better Narratives for the Board

Dark Reading

Communicating cyber-risk upward to C-suite and board takes simplification and better understanding of the audience.

article thumbnail

Chinese Cops Ran Troll Farm and Secret NY Police Station, US Says

WIRED Threat Level

Three criminal cases detail China's alleged attempts to extend its security forces' influence online—and around the globe.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Pen Testers Need to Hack AI, but Also Question Its Existence

Dark Reading

Learning how to break the latest AI models is important, but security researchers should also question whether there are enough guardrails to prevent the technology's misuse.

IT 98
article thumbnail

Future Libraries - invitation to tender

CILIP

Future Libraries - invitation to tender CILIP is looking to commission a collaborative research and development project focused on re-imagining England’s public library sector for the future and funded by Arts Council England. The aim is to develop an evidence-based map of how current and future demand for library services is changing and provide a robust basis on which to plan and advocate for future development.

article thumbnail

Aloha PoS Restaurant Software Downed by Ransomware Attack

Dark Reading

Thousands of restaurants impacted by what Aloha PoS parent company NCR says was a ransomware attack on one of its data centers.

article thumbnail

How Biometrics Help “Withdraw” Banking Pain Points

HID Global

Learn how biometrics help withdraw banking pain points with HID while delivering the highest level of identity assurance and lower fraudulent activity.

52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Name That Toon: Lucky Charm

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

84
article thumbnail

Digital Forensics: A Look into Employee Data Theft Investigations via JD Supra

IG Guru

Check out the article here.

article thumbnail

FIN7, Former Conti Gang Members Collaborate on 'Domino' Malware

Dark Reading

Members of the former ransomware group are using a FIN7 backdoor to deliver malware —including Cobalt Strike — to victim systems.