Fri.Oct 20, 2023

article thumbnail

Okta Support Unit Breached Via Credential Stolen by Hackers

Data Breach Today

BeyondTrust Says It Took Okta Nearly 3 Weeks to Confirm Breach It First Spotted A breach of Okta's support case management system using a stolen credential allowed attackers to access sensitive files uploaded by the identity security giant's customers. San Francisco-based Okta said the threat actor could view filed uploaded by certain customers as part of recent support cases.

Access 330
article thumbnail

News alert: AI-powered web scrapers from Oxylabs are breaking new ground in fraud detection

The Last Watchdog

Vilnius, Lithuania, Oct. 20, 2023 — The UN Office on Drugs and Crime estimates that 5% of global GDP (£1.6 trillion) is laundered yearly , with increasing volumes of online data and the digitization of the economy making fraudsters more creative and difficult to catch. “Enterprises in the finance, banking, and telecommunications sectors are the most susceptible to online fraud, but it can happen to any company,” said Vaidotas Sedys , Head of Risk Management at Oxylabs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK's AI Leadership Goal 'Unrealistic,' Experts Warn

Data Breach Today

Experts Cite Lack of Computing Power, Privacy Regulations and Immigration The British government's ambitions to turn the United Kingdom into a global leader in artificial intelligence are "unrealistic," warn researchers from the University of Cambridge. Experts say legal hurdles and lack of economic incentive pose major challenges.

article thumbnail

Tens of thousands Cisco IOS XE devices were hacked by exploiting CVE-2023-20198

Security Affairs

More than 40,000 Cisco IOS XE devices have been compromised in attacks exploiting recently disclosed critical vulnerability CVE-2023-20198. Researchers from LeakIX used the indicators of compromise (IOCs) released by Cisco Talos and found around 30k Cisco IOS XE devices (routers, switches, VPNs) that were infected by exploiting the CVE-2023-20198. Most of the infected devices were in the United States, the Philippines, Chile, and Mexico.

Access 122
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hackers Hit Secure File Transfer Software Again and Again

Data Breach Today

Researchers Race to Eliminate Flaws Before Attackers Can Launch Zero-Day Attacks The Clop ransomware operation's recent mass zero-day exploit of Progress Software's MOVEit secure managed file transfer software followed the criminals launching similar attacks against users of Accellion FTA, SolarWinds Serv-U and Fortra GoAnywhere.

Security 286

More Trending

article thumbnail

Vietnamese Hackers Hit Digital Marketers With Info Stealers

Data Breach Today

Under Fire: US, UK and India; Attackers Often Wield DarkGate Info-Stealing Malware Vietnamese cybercrime groups are targeting the U.K., U.S. and Indian digital marketing sectors with multiple strains of information-stealing malware, including the widely used DarkGate info stealer. Phishing campaigns have used fake emails purporting to contain job opportunities and salary details.

Marketing 275
article thumbnail

9 Innovative Ways to Boost Security Hygiene for Cyber Awareness Month

Dark Reading

If we really want to move the dial on security habits, it's time to think beyond phishing tests. Our panel of CISOs and other security heavy-hitters offer expert tips that go beyond the obvious.

Security 116
article thumbnail

QR Code Phishing on the Rise: The Alarming Findings From the Hoxhunt Challenge

KnowBe4

As the digital landscape continues to evolve, so do the tactics of cybercriminals. The Hoxhunt Challenge , a comprehensive study conducted across 38 organizations spanning nine industries and 125 countries, has uncovered a disconcerting trend in the world of QR code phishing attacks.

Phishing 111
article thumbnail

Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover

Dark Reading

SolarWinds' access controls contain five high and three critical-severity security vulnerabilities that need to be patched yesterday.

Access 131
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Alleged developer of the Ragnar Locker ransomware was arrested

Security Affairs

A joint international law enforcement investigation led to the arrest of a malware developer who was involved in the Ragnar Locker ransomware operation. Yesterday we became aware of a joint law enforcement operation that led to the seizure of the Ragnar Locker ransomware’s infrastructure. The police on Thursday seized the Tor negotiation and data leak sites, group’s infrastructure was located the Netherlands, Germany and Sweden.

article thumbnail

Cisco Finds New Zero Day Bug, Pledges Patches in Days

Dark Reading

A patch for the max severity zero-day bug tracked as CVE-2023-20198 is coming soon, but the bug has already led to the compromise of tens of thousands of Cisco devices. And now, there's a new unpatched threat.

112
112
article thumbnail

Learning from our Past: Celebrating Black History Month with Lancaster University Library

CILIP

Learning from our Past: Celebrating Black History Month with Lancaster University Library Slavery Banner in Lancaster Universit Library (to Sunita Abraham) Lancaster University Library takes the lead in decolonisation to reach staff and students of the university, with a diverse range of engaging, and enriching activites, initiatives, and projects. Lancaster was at one stage the fourth largest slave trading port in Britain.

article thumbnail

More Okta Customers Hacked

Dark Reading

Attackers compromised customer support files containing cookies and session tokens, which could result in malicious impersonation of valid Okta users.

105
105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Is The News Business So Terrible?

John Battelle's Searchblog

“A collage of iconic news industry brands and related imagery like newspapers, radios, televisions, and web pages in a dumpster, on fire, digital art” It’s been nothing but bad news for “the news” lately, and this week piled on two more depressing headlines: Gallup released a poll showing American confidence in the validity of mainstream news media is at an all time low, and The New York Times filed a trend piece noting that Silicon Valley companies, once a font of

article thumbnail

What are Your Exception Expectations?

Dark Reading

Cybersecurity exceptions are a fact of life in most organizations, but there's work that should be done to make sure those exceptions are justified and worth the risk.

article thumbnail

The Time is Now: Why Modernising Transatlantic Cooperation on Cross-Border Law Enforcement Access to Electronic Evidence Should Be a Priority

Hunton Privacy

On October 18, 2023, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published an opinion piece in the leading European policy outlet, Euractiv, titled “ The Time is Now: Why modernising transatlantic cooperation on cross-border law enforcement access to electronic evidence should be a priority.” The piece argues that at a time of an increased threat of cybercrime, digital fraud, disinformation, and other illicit activities online, we need a holistic discussion betw

Access 64
article thumbnail

SIM Card Ownership Slashed in Burkina Faso

Dark Reading

Users could hold up to five SIM cards previously, but now they can only have two; it's a move that the government says is intended to cut down mobile spam levels.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What is a global DAM?

OpenText Information Management

The world of digital asset management (DAM) is rapidly evolving. It’s at the heart of digital transformation for many global organizations. But the concept of a global DAM is surprisingly elusive with its multi-faceted nature presenting both challenges and opportunities. What is a global DAM? There is no one-size-fits-all definition. A global DAM serves multi-national … The post What is a global DAM?

article thumbnail

DoD Gets Closer to Nominating Cyber Policy Chief

Dark Reading

Though there is speculation regarding potential candidates, the Department of Defense will likely not nominate someone in the near term.

97
article thumbnail

China proposes to ease cross border data transfer restrictions

Data Protection Report

On 28 September 2023, the Cybersecurity Administration of China ( CAC ) released the Draft Provisions on Regulating and Promoting Cross Border Data Flow (规范和促进数据跨境流动规定) ( Draft Provisions ) for public consultation. The Draft Provisions, if passed, will ease the requirements around cross border data transfer under the Personal Information Protection Law ( PIPL ).

article thumbnail

Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors

Dark Reading

Vietnamese cybercrime groups are using multiple different MaaS infostealers and RATs to target the digital marketing sector.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How retail deskless workers can benefit from technology solutions

Jamf

Learn how mobile technology can better connect retail store employees to their work, increase productivity, enhance customer interactions and provide real-time information updates.

Retail 52
article thumbnail

From Snooze to Enthuse: Making Security Awareness Training 'Sticky'

Dark Reading

Most companies offer some kind of awareness training these days. But how much of those lessons are employees actually retaining?

article thumbnail

Mac troubleshooting 101

Jamf

Troubleshooting a device is more of an art than a science. Fortunately there are many tools and techniques available to help resolve issues with Macs. Read this blog to learn where to start.

52
article thumbnail

Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid

Dark Reading

To make cybersecurity an organizationwide priority, CISOs must avoid these common input, empathy, and alignment obstacles.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

RIM industry learns of the passing of Teri Mark, CRM

IG Guru

Check out her tribute wall and obituary here. The post RIM industry learns of the passing of Teri Mark, CRM first appeared on IG GURU.

82
article thumbnail

Hackers Stole Access Tokens from Okta’s Support Unit

Krebs on Security

Okta , a company that provides identity tools like multi-factor authentication and single sign-on to thousands of businesses, has suffered a security breach involving a compromise of its customer support unit, KrebsOnSecurity has learned. Okta says the incident affected a “very small number” of customers, however it appears the hackers responsible had access to Okta’s support platform for at least two weeks before the company fully contained the intrusion.

Access 309
article thumbnail

What Is Hybrid Cloud Security? How it Works & Best Practices

eSecurity Planet

Hybrid cloud security is a framework for protecting data and applications in a computing environment that includes both private and public clouds. It combines on-premises and cloud-based resources to satisfy an organization’s diversified computing demands while ensuring strong security. This approach to cloud computing enables enterprises to benefit from the scalability and flexibility provided by public clouds while maintaining sensitive data within their own infrastructure.

Cloud 98