Tue.Dec 19, 2023

article thumbnail

BlackCat Ransomware 'Unseizing' a Dark Web Stunt

Data Breach Today

Ransomware Group Declares Nothing Off Limits Outside of CIS Countries The BlackCat ransomware as service operation's putative "unseizing" of its leak site from the FBI is a stunt made possible by way the dark web handles address resolution, security researchers said Monday. The stung was a "tactical error" that could alienate affiliates.

article thumbnail

BlackCat Ransomware Raises Ante After FBI Disruption

Krebs on Security

The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world’s second most prolific ransomware gang, a Russia-based criminal group known as ALPHV and BlackCat. The FBI said it seized the gang’s darknet website, and released a decryption tool that hundreds of victim companies can use to recover systems. Meanwhile, BlackCat responded by briefly “unseizing” its darknet site with a message promising 90 percent commissions for affiliates who con

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Okta to Acquire Spera Security

Data Breach Today

Okta Says Acquisition Will Expand Its Ability to Detect High-Risk Accounts Okta finalized an agreement to acquire Spera Security, saying the purchase will expand its ability to track risky accounts and access misconfigurations. Spera, a Tel Aviv startup, touts itself as a tool for giving security teams "real-time visibility into their entire identity surface.

Security 292
article thumbnail

Navigating Ediscovery and AI in Legal Tech - 2023 Trends

Hanzo Learning Center

In 2023, the legal landscape has been significantly shaped by two key trends: the rapid evolution of Artificial Intelligence (AI) and the advancements in ediscovery. These developments have not only transformed legal processes but also presented new challenges and opportunities for legal professionals. As we delve into this first part of our series, we examine the top blogs that have been at the forefront of these trends.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Report Says CISA is Failing to Identify High-Risk Exploits

Data Breach Today

CISA Failed to Include High-Risk Vulnerabilities in Known Exploit List, Report Says The Cybersecurity and Infrastructure Security Agency maintains an exhaustive list that the U.S. cyber agency describes as "the authoritative source of vulnerabilities that have been exploited in the wild," but a new report says it has failed to identify nearly 100 high-risk vulnerabilities in 2023.

Risk 280

More Trending

article thumbnail

Iowa Medical Center Latest Victim of Transcription Firm Hack

Data Breach Today

Lawsuits Keep Stacking Up Against Perry Johnson and Associates An Iowa medical center is among the latest healthcare entities reporting to federal regulators a breach tied to a data theft hack on medical transcription vendor Perry Johnson and Associates earlier this year. Meanwhile, stacks of federal lawsuits continue to pile up against the Nevada firm.

279
279
article thumbnail

FBI claims to have dismantled AlphV/Blackcat ransomware operation, but the group denies it

Security Affairs

The Federal Bureau of Investigation (FBI) announced the seizure of the Tor leak site of the AlphV/Blackcat ransomware group. The FBI seized the Tor leak site of the AlphV/Blackcat ransomware group and replaced the home page with the announcement of the seizure. BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is long and includes industrial explosives manufacturer SOLAR INDUSTRIES INDIA , the US defense contractor NJVC , gas pipeline Creos Luxembourg S.

article thumbnail

Looking Ahead: Mobile Driver's Licenses for ID Verification

Data Breach Today

Prove's Mary Ann Miller Discusses Innovative Approaches to Identity Verification Fraudsters can now easily create fake driver's licenses to scam banks and merchants. Moving to electronic identification that can be stored on mobile devices has the potential to unlock innovation in the identity verification space, said Mary Ann Miller, vice president of client experience at Prove.

279
279
article thumbnail

New Remote “Job” Scam Tells Victims They'll Get Paid For Liking YouTube Videos

KnowBe4

Researchers at Bitdefender warn that scammers are tricking victims with fake remote job opportunities. In this case, the scammers tell victims that they’ll get paid for liking YouTube videos.

Security 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FBI Seizes BlackCat Infrastructure; Group Has New Domain

Data Breach Today

Agency Developed a Tool to Decrypt the Systems of More Than 500 Victims U.S. authorities seized dark web infrastructure of the BlackCat ransomware-as-a-service group, also known as Alphv, although the Russian-speaking threat actor said it has reestablished operations. The group's data leak site and its Tox instant messaging account went offline Dec. 7.

article thumbnail

BMW dealer at risk of takeover by cybercriminals

Security Affairs

By neglecting to set a password, a BMW dealer in India has jeopardized the entire network of car dealerships in the country and put its clients at risk. The Cybernews research team has discovered that the Bengaluru branch of BMW Kun Exclusive, a BMW dealership in India, has exposed sensitive data to the public. The data leak could have resulted in unauthorized access to sensitive clients’ and business data or even a full takeover of the BMW outlet’s internal systems by threat actors.

Risk 107
article thumbnail

OpenAI Formulates Framework to Mitigate 'Catastrophic Risks'

Data Breach Today

A Preparedness Team Will Warn of Current, Future Dangers in the Firm's AI Models OpenAI on Monday released a framework it says will help assess and protect against the "catastrophic risks" posed by the "increasingly powerful" AI models it develops. "We believe the scientific study of catastrophic risks from AI has fallen far short of where we need to be," the company said.

Risk 274
article thumbnail

Smishing Triad: Cybercriminals Impersonate UAE Federal Authority for Identity and Citizenship on the Peak of Holidays Season

Security Affairs

Smishing Triad: Researchers warn crooks impersonating UAE Federal Authority for Identity and citizenship ahead of the Holiday Season Resecurity, Inc. (USA) has identified a new fraudulent campaign by the Smishing Triad gang in which they are impersonating the United Arab Emirates Federal Authority for Identity and Citizenship. This campaign involves malicious SMS/iMessage texts that pretend to be on behalf of the General Directorate of Residency and Foreigners Affairs, targeting digital identity

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Holiday Scams Include Thousands of Impersonation Phishing Domains per Brand

KnowBe4

Midstride in this year’s holiday shopping, it’s important to realize just how many websites exist that impersonate legitimate online retailers. More importantly, your users need to know how to spot these types of attacks before falling victim.

Phishing 101
article thumbnail

OpenAI Is Not Training on Your Dropbox Documents—Today

Schneier on Security

There’s a rumor flying around the Internet that OpenAI is training foundation models on your Dropbox documents. Here’s CNBC. Here’s Boing Boing. Some articles are more nuanced , but there’s still a lot of confusion. It seems not to be true. Dropbox isn’t sharing all of your documents with OpenAI. But here’s the problem: we don’t trust OpenAI.

Privacy 100
article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Infrastructure as a service security is a concept that assures the safety of organizations’ data, applications, and networks in the cloud. Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud. By exploring the top eight issues and preventative measures, as well as shedding light on the security benefits of IaaS, you can better secure your cloud security infrastructure.

article thumbnail

FBI claims to have dismantled AlphV/Blackcat ransomware operation, but the group denies it

Security Affairs

The Federal Bureau of Investigation (FBI) announced the seizure of the Tor leak site of the AlphV/Blackcat ransomware group. The FBI seized the Tor leak site of the AlphV/Blackcat ransomware group and replaced the home page with the announcement of the seizure. BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is long and includes industrial explosives manufacturer SOLAR INDUSTRIES INDIA , the US defense contractor NJVC , gas pipeline Creos Luxembourg S.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A Major Ransomware Takedown Suffers a Strange Setback

WIRED Threat Level

After an 18 month rampage, global law enforcement finally moved against the notorious Alphv or Blackcat ransomware group. Within hours, the operation faced obstacles.

article thumbnail

How cloud-based Macs transformed Dropbox

Jamf

Learn how Dropbox used Jamf-managed Amazon EC2 Mac instances to turn the sudden loss of a critical infrastructure component into an opportunity to step into the future.

Cloud 89
article thumbnail

CJEU Rules That Fear May Constitute Damage Under the GDPR

Hunton Privacy

On December 14, 2023, the Court of Justice of the European Union (“CJEU”) issued its judgment in the case of VB v. Natsionalna agentsia za prihodite (C‑340/21), in which it clarified, among other things, the concept of non-material damage under Article 82 of the EU General Data Protection Regulation (“GDPR”) and the rules governing burden of proof under the GDPR.

GDPR 78
article thumbnail

Re-evaluate UEM ROI for a brighter 2024.

Jamf

Why do specialized solutions outperform one-size-fits approaches? And why does it matter in challenging economic times? Read on to find out.

IT 92
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Accelerate release lifecycle with pathway to deploy: Part 2

IBM Big Data Hub

As enterprises embrace cloud native and everything as code, the journey from code to production has become a critical aspect of delivering value to customers. This process, often referred to as the “pathway to deploy,” encompasses a series of intricate steps and decisions that can significantly impact an organization’s ability to deliver software efficiently, reliably and at scale.

Cloud 80
article thumbnail

Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement

The Security Ledger

Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and - importantly - control the data they collect about our most intimate surroundings. The post Episode 254: Dennis Giese’s Revolutionary Robot Vacuum. Read the whole entry. » Click the icon below to listen.

IoT 75
article thumbnail

The Best Way to Digitize Paper Documents

Record Nations

Today, businesses and individuals alike are seeking efficient ways to transition from traditional paper-based document systems to streamlined digital workflows. One of the most effective methods for achieving this is by harnessing the capabilities of professional scanning services. In this comprehensive guide, we’ll explore the best ways to digitize paper documents through scanning services and.

Paper 74
article thumbnail

“World Quality Report 2023-2024: The future up close” is now available!

OpenText Information Management

World Quality Report is back for its 15th edition! The only global report of its kind analyzes the latest in quality engineering and software testing trends. OpenText has teamed up with Capgemini™ and Sogeti™ to conduct the global survey (see the recent press release). This year, we interviewed 1,750 executives and professionals across 8 sectors from … The post “World Quality Report 2023-2024: The future up close” is now available!

IT 67
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Anomaly detection in machine learning: Finding outliers for optimization of business functions

IBM Big Data Hub

As organizations collect larger data sets with potential insights into business activity, detecting anomalous data, or outliers in these data sets, is essential in discovering inefficiencies, rare events, the root cause of issues, or opportunities for operational improvements. But what is an anomaly and why is detecting it important? Types of anomalies vary by enterprise and business function.

article thumbnail

Gain faster insight and rapid results with OpenText DevOps Aviator

OpenText Information Management

In DevOps, multiple teams are constantly working on projects, iterations, and releases, which makes it necessary to maintain continuous oversight. Poor oversight leaves your business exposed to points of risk that can impact software quality, and you can’t fix a problem if you can’t see it. This also impedes the decision-making processes from the code … The post Gain faster insight and rapid results with OpenText DevOps Aviator appeared first on OpenText Blogs.

Risk 67
article thumbnail

Accelerate release lifecycle with pathway to deploy: Part 1

IBM Big Data Hub

For many enterprises, the journey to cloud reduces technical debt costs and meets CapEx-to-OpEx objectives. This includes rearchitecting to microservices , lift-and-shift , replatforming, refactoring, replacing and more. As practices like DevOps , cloud native , serverless and site reliability engineering (SRE) mature, the focus is shifting toward significant levels of automation, speed, agility and business alignment with IT (which helps enterprise IT transform into engineering organizations).

Cloud 69