Tue.Aug 29, 2023

article thumbnail

Ransomware Attack Specialist Tied to Citrix NetScaler Hacks

Data Breach Today

Multiple Highly Automated Campaigns Have Dropped Persistent Web Shells, Experts Say Citrix NetScaler defenders are being warned to not just patch a critical flaw but also review logs from before mid-July for signs of compromise, since attackers - including "a known threat actor specializing in ransomware attacks" - have been dropping web shells that survive patching and rebooting.

article thumbnail

U.S. Hacks QakBot, Quietly Removes Botnet Infections

Krebs on Security

The U.S. government today announced a coordinated crackdown against QakBot , a complex malware family used by multiple cybercrime groups to lay the groundwork for ransomware infections. The international law enforcement operation involved seizing control over the botnet’s online infrastructure, and quietly removing the Qakbot malware from tens of thousands of infected Microsoft Windows computers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attack Cleanup Costs: $11M So Far for Rackspace

Data Breach Today

Fallout From Crypto-Locking Malware Attacks and Data Exfiltration Remains Costly Ransomware and data-exfiltration attacks are continuing to stick victims with serious bills to cover cleanup, legal and other resulting costs - to the tune of $10.8 million and counting for cloud computing giant Rackspace, for one, which was hit by the Play ransomware group last year.

Cleanup 265
article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

The threat of bad actors hacking into airplane systems mid-flight has become a major concern for airlines and operators worldwide. Related: Pushing the fly-by-wire envelope This is especially true because systems are more interconnected and use more complex commercial software than ever before, meaning a vulnerability in one system could lead to a malicious actor gaining access to more important systems.

Risk 239
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Operation 'Duck Hunt' Dismantles QakBot

Data Breach Today

U.S. authorities Tuesday said they permanently dismantled the notorious QakBot botnet in an international operation that seized 52 servers and nearly $9 million worth of cryptocurrency. Law enforcement identified more than 700,000 computers infected with the QakBot malware.

260
260

More Trending

article thumbnail

Chinese Hackers Anticipated Barracuda ESG Patch

Data Breach Today

Threat Actor Deployed an Additional Backdoor to Select Targets Chinese espionage hackers behind an eight-month campaign to hack Barracuda email security appliances intensified their focus on high-priority targets around the time the company moved to fix the zero-day flaw behind the campaign. A custom backdoor suggests China was prepared for remediation efforts.

Security 260
article thumbnail

CPPA Issues Draft CPRA Regulations on Risk Assessment and Cybersecurity Audit

Hunton Privacy

On August 29, 2023, the California Privacy Protection Agency (“CPPA”) Board issued draft regulations on Risk Assessment and Cybersecurity Audit (the “Draft Regulations”). The CPPA Board will discuss the Draft Regulations during a public meeting on September 8, 2023. In issuing the Draft Regulations, the CPPA Board makes clear that it has not yet started the formal rulemaking process for cybersecurity audits, risk assessments or automated decision-making technology, and that these Draft Regulatio

Risk 114
article thumbnail

Midwest Hospital Group Experiencing Systemwide IT Outage

Data Breach Today

Incident Comes as Several Other Regional Providers Recover From Recent Attacks Two organizations that operate clinics and hospitals in the Midwest are the latest medical care providers struggling with an enterprisewide IT outage affecting clinical and administrative applications. The incident appears similar to recent attacks on several other regional entities.

IT 259
article thumbnail

UNC4841 threat actors hacked US government email servers exploiting Barracuda ESG flaw

Security Affairs

China-linked threat actors breached government organizations worldwide with attacks exploiting Barracuda ESG zero-day. In June, Mandiant researchers linked the threat actor UNC4841 to the attacks that exploited the recently patched Barracuda ESG zero-day vulnerability to China. “Through the investigation, Mandiant identified a suspected China-nexus actor, currently tracked as UNC4841, targeting a subset of Barracuda ESG appliances to utilize as a vector for espionage, spanning a multitude of reg

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

4th Annual Legal Industry Collaboration Data Survey

Hanzo Learning Center

Our focus is to gain knowledge about any challenges that corporate legal teams encounter in relation to these new data types and their relationship with ediscovery and information governance. The adoption of collaboration tools such as Slack and Microsoft Teams in enterprises has experienced remarkable growth in recent years. These platforms offer a wide range of features that are specifically designed to enhance communication, collaboration, and productivity within organizations.

article thumbnail

FIN8-linked actor targets Citrix NetScaler systems

Security Affairs

A financially motivated actor linked to the FIN8 group exploits the CVE-2023-3519 RCE in attacks on Citrix NetScaler systems in massive attacks. Sophos X-Ops is tracking an ongoing campaign, which is targeting Citrix NetScaler systems, conducted by threat actors linked to the FIN8 group. The hackers are exploiting the remote code execution, tracked as CVE-2023-3519 , in a large-scale campaign.

article thumbnail

Sprawling Qakbot Malware Takedown Spans 700,000 Infected Machines

Dark Reading

"Operation Duck Hunt" is not likely to eliminate the initial access botnet forever, but the proactive removal of the malware from victim machines by law enforcement is one of the largest and most significant efforts of its kind.

Access 100
article thumbnail

Hackers infiltrated Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) for months

Security Affairs

Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) has been infiltrated for months. Threat actors have infiltrated Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) for as much as nine months. The intruders China-linked hackers may have gained access to sensitive data, according to three government and private sector sources familiar with the situation, reported the Financial Times.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Identity Theft from 1965 Uncovered through Face Recognition

Schneier on Security

Interesting story : Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used the stolen identity to obtain Social Security benefits under both identities, multiple passports and state identification cards, law enforcement officials said. […] A new investigation was launched in 2020 after facial identification software indicated Gonzalez’s face was on two state identification cards.

article thumbnail

MOVEit Was a SQL Injection Accident Waiting to Happen

Dark Reading

SQL injection and its ilk will stop being "a thing" only after organizations focus on security by construction.

Security 109
article thumbnail

Data privacy and security on BYOD devices

Jamf

Have you ever wondered what data an MDM like Jamf collects when you install a profile on your personal device? Read this blog to find out.

article thumbnail

Rackspace Faces Massive Cleanup Costs After Ransomware Attack

Dark Reading

Eight months after the cyberattack, the cloud hosting services company's remediation costs top $10 million as it tries to repair the damage caused by the Play ransomware gang.

Cleanup 88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Weird, Big-Money World of Cybercrime Writing Contests

WIRED Threat Level

The competitions, which are held on Russian-language cybercrime forums, offer prize money of up to $80,000 for the winners.

article thumbnail

Addressing Cybersecurity's Talent Shortage & Its Impact on CISOs

Dark Reading

CISOs need to educate all arms of the business on security best practices so it becomes part of the business culture, thus expanding who's keeping watch. Automating routine tasks will help scale security.

IT 84
article thumbnail

The UK and the US Build a ‘Data Bridge’ to Facilitate Personal Data Movements

Thales Cloud Protection & Licensing

The UK and the US Build a ‘Data Bridge’ to Facilitate Personal Data Movements andrew.gertz@t… Tue, 08/29/2023 - 13:41 Modern-day business transactions heavily rely on international data transfers. In 2021, 93% of the UK's services exports were data-enabled, resulting in over £79 billion worth of services exported to the US. However, despite this strong relationship, the UK GDPR’s requirements somewhat hinder current arrangements.

article thumbnail

Meta Cripples China's Signature 'Spamouflage' Influence Op

Dark Reading

The social media giant is taking on Dragonbridge, the "largest known cross-platform covert influence operation in the world.

97
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Case Study: LoanLogics Combined Compliance & Security Awareness Training to Improve Security Culture

KnowBe4

In the drive to build a strong security culture, security awareness and compliance training should work hand in hand.

article thumbnail

Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8

Dark Reading

Citrix issued a patch for the critical remote code execution bug in July for its NetScaler devices.

article thumbnail

The Future of AI

OpenText Information Management

It’s a bird. It’s a plane. It’s an Aviator. Join us at OpenText World 2023 to find out. You: What is the future of AI? Yeti: It’s the application of AI to enterprise-grade use cases to help us work smarter. You: But really, what is the Future of AI [with concern]? Yeti: I feel your … The post The Future of AI appeared first on OpenText Blogs.

57
article thumbnail

6 Ways AI Can Revolutionize Digital Forensics

Dark Reading

Artificial intelligence tools can automate the analysis of logs, video, and other important but tedious aspects of investigations.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack via GBHackers

IG Guru

Check out the article here. The post Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack via GBHackers first appeared on IG GURU.

Cloud 87
article thumbnail

Kroll's Crypto Breach Highlights SIM-Swapping Risk

Dark Reading

Information was exposed on hundreds of crypto-related bankruptcy claimants in proceedings involving FTX, Genesis, and BlockFI.

Risk 79
article thumbnail

CyberheistNews Vol 13 #35 New KnowBe4 Callback Phishing Feature Boosts Your Users' Security Awareness

KnowBe4

New KnowBe4 Callback Phishing Feature Boosts Your Users' Security Awareness