Fri.Jul 28, 2023

article thumbnail

Lazarus Group Targets Microsoft IIS Servers

Data Breach Today

North Korean Group Uses Watering Hole Techniques to Access, Distribute Malware The highly active, North Korea-linked Lazarus Group is targeting unpatched Microsoft Internet Information Services servers to escalate privileges and distribute malware. Researchers spotted the group using watering hole techniques to fool victims in South Korea.

Access 243
article thumbnail

Voice recognition

Imperial Violet

Last week’s blog post was rather long, and had a greater than normal number of typos. (Thanks to people who pointed them out. I think I’ve fixed all the ones that were reported.) This was because I saw in reviews that iOS 17’s voice recognition was supposed to be much improved, and I figured that I’d give it a try. I’ve always found iOS’s recognition to be superior to Google Docs and I have an old iPad Pro that’s good for betas. iOS’s performance remains good and, yes, I think it’s better than i

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

700,000 Sensitive Teacher, Student Records Exposed on Web

Data Breach Today

Researcher Says Hackers Could Have Seen Salary Info, Child Abuse Reports and More A security researcher recently found a database exposed to the internet containing sensitive information on independent school students and faculty including financial data, salary, professional details, health information and child abuse reports. The security lapse affected nearly 700,000 records.

Security 242
article thumbnail

CoinsPaid blames North Korea-linked APT Lazarus for theft of $37M worth of cryptocurrency

Security Affairs

Crypto-payments service provider CoinsPaid suffered a cyber attack that resulted in the theft of $37,200,000 worth of cryptocurrency. CoinsPaid, a crypto-payment service provider, fell victim to a cyber attack, leading to the theft of $37,200,000 worth of cryptocurrency. The company attributes the cyber heist to the North Korea-linked APT Lazarus , which is also responsible for the attacks against Axie Infinity (USD 625M), Horizon Bridge (USD 100M), Atomic Wallet (USD 100M) and Alphapo (USD 23M)

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

US and Australia Warn Developers Over IDOR Vulnerabilities

Data Breach Today

Flaws That Give Back-End Access to an Object Can Cause Large Breaches, Agencies Say U.S. and Australian cybersecurity agencies are warning developers to guard against access flaws, saying that failure to institute authentication checks can lead to large data breaches. Broken access controls are on OWASP's 2021 list of the top 10 most critical security risks.

More Trending

article thumbnail

FBI: Hackers Use AI for Sextortion, Explosives, Bad Websites

Data Breach Today

China Seeks to Level AI Playing Field by Stealing IP From US, FBI Official Says Adversaries use artificial intelligence to obtain explosives, advance sextortion schemes and propagate malware through malicious websites that appear legitimate. Intelligence officials grapple with emboldened criminals who use AI for nefarious purposes and nation-state actors such as China.

article thumbnail

Monitor Insider Threats but Build Trust First

Security Affairs

The issue of how to prevent insider threats without infringing on employee privacy is one that has been a hot topic of debate in recent years. Because insider threats are uniquely challenging to detect and identify, different methods are needed than traditional detection based on signatures or other known threat triggers. Tools that are designed to detect insider threats are more effective, but also bring up questions related to the level of monitoring necessary and employees’ right to a certain

Privacy 95
article thumbnail

ISMG Editors: MOVEit Breach Fallout, Cybercrime Innovation

Data Breach Today

Also: Hospitals Warned of Web-Tracking Tools, U.S. DOJ Reorganizes Units In the latest weekly update, ISMG editors discuss the surging number of MOVEit breach victims and the state of ransomware innovation, why the federal government warned healthcare firms about the use of web trackers, and how the DOJ is expanding its "whole of government" approach to fight ransomware.

article thumbnail

Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector

Dark Reading

The more artificial intelligence builds out our digital personas, the easier it will become for bad actors to target us with more convincing attacks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Every Application Journey Needs a Cybersecurity Platform

Data Breach Today

Taking a Cybersecurity Mesh Platform Approach to Securing Applications Application journeys are fluid in practice because applications can live anywhere. Complex deployments with too many tools to configure and manage and overwhelmed IT teams lead to mistakes, so organizations should take a cybersecurity mesh platform approach to securing their application journeys.

article thumbnail

SEC Implements New Rule Requiring Firms to Disclose Cybersecurity Breaches in 4 Days

KnowBe4

What happened? The SEC (Securities and Exchange Commission) has introduced new rules that require public companies to be more transparent about their cybersecurity risks and any breaches they experience.

article thumbnail

Indirect Instruction Injection in Multi-Modal LLMs

Schneier on Security

Interesting research: “ (Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs “: Abstract: We demonstrate how images and sounds can be used for indirect prompt and instruction injection in multi-modal LLMs. An attacker generates an adversarial perturbation corresponding to the prompt and blends it into an image or audio recording.

article thumbnail

IT Ops and Security Teams Need Automation, Not Couples Therapy

Dark Reading

When their roles intersect, IT ops and security teams often find themselves at odds. Here are some ways to foster collaboration.

IT 84
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Your KnowBe4 Fresh Content Updates from July 2023

KnowBe4

Check out the 28 new pieces of training content added in July, alongside the always fresh content update highlights, events and new features.

article thumbnail

Senator Blasts Microsoft for Negligence in 365 Email Breach

Dark Reading

In a letter to the DoJ, FTC, and CISA, Oregon's Wyden also called for Microsoft to be held accountable in the sprawling SolarWinds breach.

74
article thumbnail

Weekly Update 358

Troy Hunt

IoT, breaches and largely business as usual so I'll skip that in the intro to this post and jump straight to the end: the impending HIBP domain search changes. As I say in the vid, I really value people's feedback on this so if nothing else, please skip through to 48:15, listen to that section and let me know what you think. By the time I do next week's vid my hope is that all the coding work is done and I'm a couple of days out from shipping it, so now is your time to provid

article thumbnail

Hack Crew Responsible for Stolen Data, NATO Investigates Claims

Dark Reading

NATO asserts that their cyber experts continue to look into the claims and that its classified networks remain secure.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 ways to avoid and reduce data debt via InfoWorld

IG Guru

Check out the article here. The post 6 ways to avoid and reduce data debt via InfoWorld first appeared on IG GURU.

article thumbnail

Stark#Mule Malware Campaign Targets Koreans, Uses US Army Documents

Dark Reading

Techniques are similar to those in previous North Korean attacks and could be linked to well-known cyber-espionage organizations.

72
article thumbnail

How Open Liberty and IBM Semeru Runtime proved to be the perfect pillars for Primeur

IBM Big Data Hub

As an independent software vendor (ISV), we at Primeur embed the Open Liberty Java runtime in our flagship data integration platform, DATA ONE. It is essential that the embedded Java runtime is both invisible to our customers yet observable to our engineers who support them. Open Liberty , IBM’s open-source Java runtime on which IBM WebSphere Liberty is built, was the perfect solution for us.

article thumbnail

CherryBlos Malware Uses OCR to Pluck Android Users' Cryptocurrency

Dark Reading

The malware, along with a sister strain dubbed "FakeTrade," was found lurking in Google Play.

79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Capgemini Unveils Cutting-Edge Generative AI Portfolio to Transform Business Landscape

Information Matters

Renowned Consulting and Technology Firm Takes Strides in AI Innovation with Launch of Next-Generation Offerings In a bold move aimed at revolutionizing the intersection of artificial intelligence and business strategy, Read more The post Capgemini Unveils Cutting-Edge Generative AI Portfolio to Transform Business Landscape appeared first on Information Matters - Where AI Meets Knowledge Management.

article thumbnail

What is lateral movement?

Jamf

Lateral movement is a prominent tactic used in advanced threats. In this blog, learn how bad actors use lateral movement to navigate the maze of your network and how to prevent this from happening.

52
article thumbnail

Document digitization is ‘transformational’ for supply chain sustainability 

OpenText Information Management

Sustainability has climbed to the top of the agenda for supply chain executives. Today, the supply chain is responsible for as much as 90% of an organization’s greenhouse gas emissions and 70% of its operating costs. More than this, competitive advantage and brand reputation can be severely impacted by poor performance in this area. New … The post Document digitization is ‘transformational’ for supply chain sustainability appeared first on OpenText Blogs.

IT 52
article thumbnail

The digital classroom

Jamf

Dive into the world of digital classrooms with our in-depth blog post. Ideal for educators looking to enhance their digital teaching strategies.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Choose the Best Biometrics Authentication for Your Use Case

Dark Reading

Voice, face, and vein recognition each have its pros and cons. Here's what CISOs need to know.

article thumbnail

On-device content filtering boosts web filters for schools.

Jamf

As more and more schools adopt an iPad program for students, many seek ways to increase security and safety for students. Enter on-device content filtering, which adds another layer of protection to web filtering for schools.

article thumbnail

Db2 for z/OS: What I Would Say to Application Developers (Part 2)

Robert's Db2

In the part 1 of this 2-part entry (posted last month), I emphasized what I consider to be job one for a developer coding a Db2 for z/OS-targeted query (write a SQL statement that will retrieve the data your program requires, and don't worry too much about the statement's performance - that's mostly taken care of by Db2), while also noting ways in which a developer can effectively work in partnership with a DBA to enhance the performance of a Db2-based application.