Thu.Jun 15, 2023

article thumbnail

Chinese Hackers Exploit Barracuda ESG Zero-Day

Data Breach Today

Targets Include Southeast Asian Foreign Ministry, Foreign Trade Offices in Taiwan Chinese hackers in a state-run operation compromised hundreds of organizations through a zero-day vulnerability in a popular email security appliance, warns cyber threat intelligence firm Mandiant. Hackers used a zero-day vulnerability in Barracuda Networks Email Security Gateway appliances.

Security 270
article thumbnail

CISA Order Highlights Persistent Risk at Network Edge

Krebs on Security

The U.S. government agency in charge of improving the nation’s cybersecurity posture is ordering all federal agencies to take new measures to restrict access to Internet-exposed networking equipment. The directive comes amid a surge in attacks targeting previously unknown vulnerabilities in widely used security and networking appliances. Under a new order from the Cybersecurity and Infrastructure Security Agency (CISA), federal agencies will have 14 days to respond to any reports from CISA

Risk 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Real Estate Firm Hack Affects 319,500 Patients, Employees

Data Breach Today

Owner of Addiction Treatment Centers, Medical Offices and Hotels Hit by Ransomware A commercial real estate company that operates more than a dozen addiction recovery centers and other medical facilities in several states is notifying 319,500 employees and patients of a recent ransomware incident that compromised their personal and health information.

article thumbnail

How Shady Chinese Encryption Chips Got Into the Navy, NATO, and NASA

WIRED Threat Level

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Russian National Charged With Carrying Out 4 LockBit Attacks

Data Breach Today

20-Year-Old Faces 20 Years in Prison, $250,000 Fine for Global Ransomware Attacks Federal officials charged a Russian national with carrying out at least four LockBit attacks against businesses in the United States, Asia, Europe and Africa. The Justice Department said Ruslan Magomedovich Astamirov, 20, of Chechnya, deployed ransomware between August 2020 and March 2023.

More Trending

article thumbnail

Breach Roundup: More MOVEit Victims, Including US Government

Data Breach Today

Also: LockBit Was Tops in 2022 and North Koreans Ape Web Portal This week, the list of MOVEit victims grew and now includes the U.S. government. Also, CISA and its global peers crowned LockBit the world's top ransomware threat, North Korean hackers copied a popular South Korean web portal, and an impersonation campaign used SEO techniques to target top brands.

article thumbnail

Ofcom Becomes the Latest Victim of MOVEit Supply Chain Attack

IT Governance

The UK’s broadcasting regulator, Ofcom, has revealed that it’s among the organisations whose data has been stolen in the massive MOVEit cyber attack. In a statement , Ofcom said that a “limited amount” of confidential information was stolen by criminal hackers, although its own systems were not compromised. The data relates to certain companies whose practices Ofcom regulates, as well as 412 of its employees.

article thumbnail

Cryptohack Roundup: $100 Million Atomic Wallet Heist

Data Breach Today

Also: Floating Point Group, Sturdy Finance, Hashflow Hacked Every week, ISMG rounds up cybersecurity incidents in the world of digital assets. This week, Atomic Wallet, FPG, Sturdy Finance and Hashflow suffered hacks involving millions of dollars, hackers phished followers of popular Twitter accounts and an Australian bank wanted to limit crypto use.

Phishing 144
article thumbnail

News Alert: Dropblock mobile app gives developers, businesses secure data storage and sharing

The Last Watchdog

London, UK, June 15, 2023 – Dropblock for mobile launches today, a free, Web3 storage application offering individuals, developers, and business users a unique and completely secure mobile storage and data sharing solution. Simply download Dropblock today from the App Store or from the Google Play Store to get 5GB of secure blockchain storage for free.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Navigating the Complexities of Cyber Insurance

Data Breach Today

"Insurance is a tool," said Libby Benet, the global chief underwriting officer for AXA XL. "When you buy an insurance policy, you are buying a network of professional crisis managers." In this episode of "Cybersecurity Insights," Benet discussed present and future cybersecurity insurance issues.

Insurance 144
article thumbnail

News Alert: W3C advances technology to streamline payment authentication

The Last Watchdog

Cambridge, Mass., June 15, 2023. The World Wide Web Consortium today announced a standardization milestone for a new browser capability that helps to streamline user authentication and enhance payment security during Web checkout. Secure Payment Confirmation (SPC) enables merchants, banks, payment service providers, card networks, and others to lower the friction of strong customer authentication (SCA), and produce cryptographic evidence of user consent, both important aspects of regulatory re

article thumbnail

APP Scams Rise as Adoption of Real-Time Payments Grows

Data Breach Today

ACI Worldwide's Jackie Barwell on Fast Payment Transactions, Scams, Mule Accounts As countries across the globe adopted real-time payments at breakneck speed over the past year, experts said authorized push payments fraud sharply increased. APP scams nearly doubled year-over-year compared to other types of fraud. ACI Worldwide's Jackie Barwell shared fraud trends in a new report.

144
144
article thumbnail

IT Governance Podcast 16.6.23: MOVEit, LinkedIn, Spotify and Google Bard

IT Governance

This week, we discuss a data breach affecting users of Progress Software’s MOVEit file transfer app, GDPR fines for LinkedIn and Spotify, and the delay of Google Bard’s EU launch because of privacy concerns. Also available on Spotify , Amazon Music , Apple Podcasts and SoundCloud. The post IT Governance Podcast 16.6.23: MOVEit, LinkedIn, Spotify and Google Bard appeared first on IT Governance UK Blog.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

LockBit Affiliate Arrested, as Extortion Totals Reach $91M Since 2020

Dark Reading

A third perp has been fingered, but CISA warns that LockBit variants continue to be a major threat on a global scale.

134
134
article thumbnail

Data mesh 101: Self-service data infrastructure

Collibra

As businesses scale data and analytics capabilities, the importance of a self-service data infrastructure becomes increasingly critical. This is especially true as data mesh operational models see increasing adoption by forward-thinking, data-driven organizations. What is data mesh? “Data mesh is a decentralized sociotechnical approach — concerned with organizational design and technical architecture — to share, access and manage analytical data in complex and large-scale environments – within

article thumbnail

'Shampoo' ChromeLoader Variant Difficult to Wash Out

Dark Reading

A new version of the infamous browser extension is spreading through files on websites offering pirated wares, and leverages unique persistence mechanisms.

103
103
article thumbnail

Cybersecurity agencies published a joint LockBit ransomware advisory

Security Affairs

The LockBit ransomware group successfully extorted roughly $91 million from approximately 1,700 U.S. organizations since 2020. According to a joint advisory published by cybersecurity agencies, the LockBit ransomware group has successfully extorted roughly $91 million in about 1,700 attacks against U.S. organizations since 2020. The advisory was published by Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Ana

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK Attacker Responsible for a Literal “Man-in-the-Middle” Ransomware Attack is Finally Brought to Justice

KnowBe4

The recent conviction of a U.K. man for cyber crimes committed in 2018 brings to light a cyber attack where this attacker manually performed the “in-the-middle” part of an attack.

article thumbnail

Russia-linked APT Gamaredon update TTPs in recent attacks against Ukraine

Security Affairs

Russia-linked APT group Gamaredon is using a new toolset in attacks aimed at critical organizations in Ukraine. The Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive Bear, UAC-0010, and Trident Ursa) continues to carry out attacks against entities in Ukraine, including security services, military, and government organizations. Symantec researchers reported that in some cases, the cyberespionage group remained undetected in the target networks for three months.

article thumbnail

How Do I Protect My API Keys From Appearing in GitHub Search Results?

Dark Reading

A few lines of code can help you prevent accidental exposure, manage sensitive information, and maintain different configurations for various environments.

94
article thumbnail

Barracuda ESG zero-day exploited by China-linked APT

Security Affairs

Experts linked the UNC4841 threat actor behind the attacks exploiting the recently patched Barracuda ESG zero-day to China. Mandiant researchers linked the threat actor UNC4841 behind the attacks that exploited the recently patched Barracuda ESG zero-day vulnerability to China. “Through the investigation, Mandiant identified a suspected China-nexus actor, currently tracked as UNC4841, targeting a subset of Barracuda ESG appliances to utilize as a vector for espionage, spanning a multitude

Access 88
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

2023 Call for Code offers developers more opportunities to gain skills, build solutions and win prizes

IBM Big Data Hub

IBM launched Call for Code in 2018 with creator David Clark Cause and charitable partner United Nations Human Rights to effect change and create a better future using IBM technology. Over the past five years, it has inspired thousands of developers and problem-solvers worldwide to build solutions that address sustainability to help fight climate change.

Cloud 86
article thumbnail

5 Stages of the Vulnerability Management Lifecycle

eSecurity Planet

Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities. It is a critical part of an organization’s cybersecurity program. There are many different vulnerability management frameworks, but the vulnerability management lifecycle of most organizations today typically includes five phases. We’ll examine those and then look at vulnerability management lifecycle best practices.

article thumbnail

Borderless Data vs. Data Sovereignty: Can They Co-Exist?

Dark Reading

Organizations that remain compliant with data-sovereignty regulations while enabling cross-border data sharing gain significant competitive advantage because they can make quick, agile, and informed decisions.

81
article thumbnail

New Survey Shows 40% of People Searching for a Job Encountered a Scam

KnowBe4

A survey by PasswordManager.com has found that one in three job seekers has fallen for, and responded to, fake job scams over the past two years.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Critical Barracuda ESG Zero-Day Linked to Novel Chinese APT

Dark Reading

A PRC-aligned actor used a trio of custom malware to take advantage of inherent weaknesses in edge appliances.

104
104
article thumbnail

Breakdown of an Impersonation Attack: Using IPFS and Personalization to Improve Attack Success

KnowBe4

Details from a simple impersonation phishing attack show how well thought out these attacks really are in order to heighten their ability to fool victims and harvest credentials.

article thumbnail

Angola Marks Technology Advancements With Cybersecurity Academy Plans

Dark Reading

The academy is meant to ensure a safe and strong telecommunication service and information technologies for Angola's citizens, the president said.