Wed.May 24, 2023

article thumbnail

Capita Issued Erroneous Breach Details, Officials Report

Data Breach Today

Local Authority Finds Sensitive Data Was Exposed Despite Assurances to the Contrary Breach notifications from British outsourcing giant Capita mount amid signs the multibillion-pound company doesn't have a firm grip on how much data it exposed. For a company that trumpets its ability to "achieve better outcomes," Capita's inability to grasp the impact of its breaches is ironic.

IT 283
article thumbnail

GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace

The Last Watchdog

Hackers can hurt your business or organization in many ways. First and foremost, cyberattacks can lead to data breaches in which sensitive information is stolen. If a cyber-criminal uses you as a way to get at your customers, suppliers, or employees, these vital business relationships can turn sour. Related: Tapping hidden pools of security talent Sometimes hackers can encrypt your systems, holding them hostage and asking you to pay money to regain access to them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

State-Aligned Actors Targeting SMBs Globally

Data Breach Today

Vulnerable Small to Midsized Organizations Are Now Favored Victims of APT Actors State-aligned hackers are increasingly targeting small and medium-sized businesses worldwide, as SMBs are more likely to be under-protected against cybersecurity threats such as phishing campaigns, according to a new report by cybersecurity firm Proofpoint.

Phishing 254
article thumbnail

Enhance Your Legal Department's Performance with Strategic Planning and Technology

Hanzo Learning Center

In-House Legal Departments, like any other business function, must be efficient and effective to deliver the best possible results. They must balance their workload, comply with regulatory requirements, and provide legal counsel to their organization in a cost-effective and streamlined manner. That’s where a Legal Operations professional can help, particularly by prioritizing strategic planning, technology, and information governance to ensure the department runs efficiently and provides the bes

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Chinese State Hacker 'Volt Typhoon' Targets Guam and US

Data Breach Today

Targets Are Critical Infrastructure - Likely for Cyberespionage, Long-Term Access A Chinese state hacker has targeted critical infrastructure in Guam and the United States with the likely intent of cyberespionage and maintaining long-term access. Microsoft dubbed the threat actor "Volt Typhoon" on Wednesday in a coordinated disclosure with the U.S. government and close allies.

More Trending

article thumbnail

US Sanctions North Korean Entities for Sending Regime Funds

Data Breach Today

1 Worker Also Sanctioned for Transferring IT Earnings to North Korean Government The U.S. government sanctioned four entities and one individual involved in helping to funnel payments from malicious activities to support the Democratic People's Republic of Korea government's illicit activities such as unlawful weapons of mass destruction and ballistic missile programs.

article thumbnail

Barracuda Email Security Gateway (ESG) hacked via zero-day bug

Security Affairs

Barracuda warned customers that some of its Email Security Gateway (ESG) appliances were breached exploiting a zero-day vulnerability. Network security solutions provider Barracuda warned customers that some of its Email Security Gateway (ESG) appliances were recently breached by threat actors exploiting a now-patched zero-day vulnerability. The vulnerability, tracked as CVE-2023-2868, resides in the module for email attachment screening, the issue was discovered on May 19 and the company fixed

article thumbnail

CyberArk CEO Touts New Browser That Secures Privileged Users

Data Breach Today

CyberArk's new Secure Browser prevents adversaries from harvesting the credentials of privileged users who are accessing sensitive web applications. CEO Matt Cohen said this solution will help thwart attackers who are hijacking sessions on consumer-grade browsers through the use of cookies.

Security 130
article thumbnail

AhRat Android RAT was concealed in iRecorder app in Google Play

Security Affairs

ESET found a new remote access trojan (RAT), dubbed AhRat, on the Google Play Store that was concealed in an Android screen recording app. ESET researchers have discovered an Android app on Google Play that was hiding a new remote access trojan (RAT) dubbed AhRat. The app, named iRecorder – Screen Recorder, has more than 50,000 installs. The app was initially uploaded to the Google Play store without malicious features on September 19 th , 2021.

Access 94
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

GoldenJackal APT Targeting South Asian Government Agencies

Data Breach Today

Threat Actor Shares Limited Code Similarity With Turla A suspected cyberespionage group that has been active since 2020 has targeted government and diplomatic entities in the Middle East and South Asia using a malware tool set capable of controlling victims' machines and exfiltrating system data and credentials.

article thumbnail

Financial Fraud Phishing Attacks Increase 72% In One Year; Financial Industry Takes the Brunt

KnowBe4

With attackers knowing financial fraud-based phishing attacks are best suited for the one industry where the money is, this massive spike in attacks should both surprise you and not surprise you at all.

article thumbnail

North Korean APT Group Kimsuky Shifting Attack Tactics

Data Breach Today

Kimsuky Focuses on Exfiltration In Latest Campaign North Korean hackers are using custom-built malware for information exfiltration campaigns against human rights organizations. The variation of the RandomQuery malware used in this campaign has the "single objective of file enumeration and information exfiltration," says SentinelOne.

130
130
article thumbnail

The US government sanctioned four entities and one individual for supporting cyber operations conducted by North Korea

Security Affairs

The US Department of the Treasury sanctioned four entities and one individual for their role in cyber operations conducted by North Korea. The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against four entities and one individual for their role in malicious cyber operations conducted to support the government of North Korea. “The DPRK conducts malicious cyber activities and deploys information technology (IT) workers who fraudulently obtain emp

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CommonSpirit Ups Cost Estimate on its 2022 Ransomware Breach

Data Breach Today

Company Executive Hopes Insurance Will Help Cover Most Costs Hospital chain CommonSpirit has upped its estimate on the financial toll incurred by a ransomware incident last fall that disrupted IT systems and patient services at some of its facilities for weeks. But company officials reportedly expect many of the costs to be covered by the company's insurance.

article thumbnail

'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs

Dark Reading

According to Microsoft and researchers, the state-sponsored threat actor could very well be setting up a contingency plan for disruptive attacks on the US in the wake of an armed conflict in the South China Sea.

89
article thumbnail

US Sanctions N. Korean Entities for Sending Funds to Regime

Data Breach Today

One Worker Also Sanctioned for Transferring IT Earnings to North Korean Government The U.S. government sanctioned four entities and one individual involved in helping to funnel payments from malicious activities to support the Democratic People's Republic of Korea government's illicit activities such as unlawful weapons of mass destruction and ballistic missile programs.

article thumbnail

More Than Half of all Email-Based Cyberattacks Bypass Legacy Security Filters

KnowBe4

New data shows that changes in cybercriminals’ phishing techniques are improving their game, making it easier to make their way into a potential victim user’s inbox.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 Questions to Ask When Evaluating a New Cybersecurity Technology

Dark Reading

Any new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.

article thumbnail

BatLoader Malware is Now Distributed in Drive-By Attacks

KnowBe4

Malign persuasion can take many forms. We tend to hear the most about phishing (malicious emails) or smishing (malicious texts). Other threats are also worth some attention, like the risk of drive-by attacks.

article thumbnail

New Apple RSR Flaw Blocks MDM Functionality on macOS Devices

eSecurity Planet

Addigy, which provides management solutions for Apple devices, today warned that Apple’s new Rapid Security Response (RSR) updates aren’t being delivered to as many as 25 percent of macOS devices in managed environments, and that the failure to do so is also impacting mobile device management (MDM) stacks on those devices. RSR updates are new – the first batch was delivered at the beginning of this month.

MDM 85
article thumbnail

HHS Office for Civil Rights Settles HIPAA Investigation with Arkansas Business Associate MedEvolve Following Unlawful Disclosure of Protected Health Information on an Unsecured Server for $350,000

IG Guru

May 16, 2023 Today, the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) announced a settlement of potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Rules with MedEvolve, Inc.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws

Schneier on Security

It’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the total number of states with a privacy law up to eight. No private right of action in any of those, which means it’s up to the states to enforce the laws.

Privacy 83
article thumbnail

Redefining the consumer experience: Diageo partners with SAP and IBM on global digital transformation

IBM Big Data Hub

In an era of evolving consumer preferences and economic uncertainties, the beverage industry stands as a vibrant reflection of changing trends and shifting priorities. Despite the challenges posed by inflation and the cost-of-living crisis, a dichotomy has emerged in consumer behavior, where individuals untouched by the crisis continue to indulge in their favorite beverages, while those directly affected pivot towards more affordable luxuries, such as a bottle of something special.

article thumbnail

From uncertainty to clarity: How Collibra helps UK businesses with data management after Brexit

Collibra

On January 31, 2020, the United Kingdom left the European Union in what is known as Brexit. Suddenly, decades of understanding and agreements on issues such as cross-border trade, customs, and the workforce were upended overnight. Brexit also created a challenge for the UK to maintain its position as a major player in the global economy. In the midst of these changes, and the rush to respond, a focus on data management presents a crucial opportunity to establish a leading approach.

GDPR 80
article thumbnail

Google's.zip,mov Domains Give Social Engineers a Shiny New Tool

Dark Reading

Security professionals warn that Google's new top-level domains,zip and.mov, pose social engineering risks while providing little reason for their existence.

Risk 116
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Security Hole at the Heart of ChatGPT and Bing

WIRED Threat Level

Indirect prompt-injection attacks can leave people vulnerable to scams and data theft when they use the AI chatbots.

article thumbnail

What is DKIM Email Security Technology? DKIM Explained

eSecurity Planet

The DomainKeys Identified Mail (DKIM) email authentication standard enables email servers to check incoming emails to verify the sender and detect email message alterations. This standard solves the problem of determining if emails have been intercepted and modified in transit and helps to detect SPAM and spoofed emails. By implementing DKIM, an organization improves the reputation of its own emails and enables receiving email servers to improve their own email security.

article thumbnail

OAuth Flaw in Expo Platform Affects Hundreds of Third-Party Sites, Apps

Dark Reading

A cybersecurity vulnerability found in an implementation of the social login functionality opens the door to account takeovers and more.