Wed.Jul 05, 2023

article thumbnail

Russian Ransomware Group Shuts Down Major Japanese Port

Data Breach Today

Reported LockBit 3.0 Attack Locks Up Systems, Delays Shipping of Toyota Auto Parts Ransomware believed to originate from the Russian LockBit 3.0 group has locked up computer systems for the Port of Nagoya, Japan's largest cargo hub. The attack held up shipments of Toyota auto parts containers starting Tuesday, but port authorities expect to resume operations Thursday morning.

article thumbnail

Microsoft Teams Exploit Tool Auto-Delivers Malware

Dark Reading

The "TeamsPhisher" cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Chinese Counterespionage Law Aimed at US Tech Sector

Data Breach Today

Experts Say China Aims to Retaliate Against US Tech Companies, Dissidents Experts believe China's revised Counter-Espionage Law gives the Chinese Communist Party the power to retaliate against Western financial and technological sanctions and also control rising discontent among Chinese citizens. The law went into effect on Saturday.

144
144
article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

On June 28, 2023, the New York Department of Financial Services (“NYDFS”) published an updated proposed Second Amendment (“Amendment”) to its Cybersecurity Regulation, 23 NYCRR Part 500. On November 9, 2022, NYDFS published a first draft of the proposed Amendment and received comments from stakeholders over a 60-day period. The updated proposed Amendment will be subject to an additional 45-day comment period.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK Academics Join Critics of Proposal to Weaken Encryption

Data Breach Today

Proposed Online Safety Bill Is 'Doomed to Fail,' Academics Say in an Open Letter Over five dozen British academics joined a widening group of technology firms and privacy groups in criticizing a U.K. government bill aimed at protecting children from online harassments by weakening encryption. In an open letter, they said the bill is "doomed to fail.

More Trending

article thumbnail

Tennessee Clinic: April 'BianLian' Attack Affected 559,000

Data Breach Today

Cybercrime Group May Have Stolen Patient and Employee Information A Tennessee medical clinic and surgical center is notifying more than half a million patients and employees that their personal information may have been stolen by cybercriminals in an April cyberattack that disrupted healthcare services for several days.

130
130
article thumbnail

Stitching: The key to end-to-end lineage

Collibra

In the world of data governance and intelligence, understanding data lineage is essential for making informed decisions. This is where stitching comes in as an incredibly important concept in Collibra. Stitching entails matching different segments of lineage to obtain end-to-end lineage, allowing for a comprehensive view of the data’s journey throughout the organization.

article thumbnail

Sweden Fines Firms for Google Analytics Use, Privacy Issues

Data Breach Today

Swedish Authority for Privacy Protection: Companies Must Not Use Google Analytics Swedish data privacy officials issued fines against two of four companies found to have violated rules against the export of European users' data due to their use of Google Analytics, which was found to contravene EU privacy regulations due to the potential risks of U.S. government surveillance.

Analytics 130
article thumbnail

Ransomware accounts for 54% of cyber threats in the health sector

Security Affairs

The European Union Agency for Cybersecurity (ENISA) releases its first cyber threat landscape report for the health sector. The European Union Agency for Cybersecurity (ENISA) releases today its first cyber threat landscape report for the health sector. The report identifies prime threats, threat actors, and trends and covers a period of over 2 years.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Accounting Fraud: Which Tools Should You Invest In?

Data Breach Today

3 Experts Discuss the Vendor Market in Anti-Fraud Technology, DOJ Regulations Accounting statement fraud is hard to catch, typically requiring specialized anti-fraud tools and an understanding of how fraudsters think. In this second installment on accounting fraud, a panel of experts discussed the tools available and why you need fraud expertise to build an effective system.

Marketing 130
article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

RedEnergy is a sophisticated stealer-as-a-ransomware that was employed in attacks targeting energy utilities, oil, gas, telecom, and machinery sectors. Zscaler ThreatLabz researchers discovered a new Stealer-as-a-Ransomware named RedEnergy used in attacks against energy utilities, oil, gas, telecom, and machinery sectors. The malware allows operators to steal information from various browsers, it also supports ransomware capabilities.

article thumbnail

Kevin Mandia on Attacks Against Ukraine and Why They Matter

Data Breach Today

Mandiant CEO Shares How Russian Wiper Malware Is Evading Ukrainian EDR, Antivirus Russia has relied on blunt-force cyberattacks in Ukraine to inflict maximum damage rather than turning to new techniques. In many cases, Ukrainian defenders are flying blind because Russian wiper malware is designed to evade most security controls, said Mandiant CEO Kevin Mandia.

Security 130
article thumbnail

CVE-2022-29303 flaw in SolarView product can be exploited in attacks against the energy sector

Security Affairs

A vulnerability in SolarView product can be exploited in attacks targeting organizations in the energy sector. Researchers from the cybersecurity firm VulnCheck reported that the vulnerability CVE-2022-29303 in the solar power monitoring Contec SolarView product can be exploited in attacks targeting organizations in the energy sector. CVE-2022-29303 is an unauthenticated and remote command injection vulnerability impacting the Contec SolarView Series.

IoT 95
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crypto Cybercrime Cost Dips to $920M in 2023

Data Breach Today

Losses Plunge 54% YoY; Number of Security Incidents Stays About the Same Hackers kept pace with the rapid evolution of blockchain systems, stealing about $920 million in the first half of 2023. Cybercriminals attacked smart contracts, phished victims and stole from crypto exchanges in dozens of security incidents through June 30.

article thumbnail

The Port of Nagoya, the largest Japanese port, suffered a ransomware attack

Security Affairs

The Port of Nagoya, the largest port in Japan, suffered a ransomware attack that severely impacted its operations. The Port of Nagoya , in the Ise Bay, is the largest and busiest trading port in Japan, accounting for about 10% of the total trade value of Japan. Notably, this port is the largest exporter of cars in Japan and where the Toyota Motor Corporation exports most of its cars.

article thumbnail

US Spies Are Buying Americans' Private Data. Congress Has a Chance to Stop It

WIRED Threat Level

The National Defense Authorization Act may include new language forbidding government entities from buying Americans' search histories, location data, and more.

IT 98
article thumbnail

Swedish data protection authority rules against the use of Google Analytics

Security Affairs

Swedish data protection watchdog warns companies against using Google Analytics due to the risk of surveillance operated by the US government. The Swedish data protection watchdog warned businesses against using Google Analytics due to the risk of surveillance carried out by the US government. The Swedish Authority for Privacy Protection (IMY) conducted audits against CDON, Coop, Dagens Industri, and Tele2 and determined how they use Google Analytics for web statistics.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Startup Spotlight: Gomboc.ai Balances Cloud Infrastructure Security

Dark Reading

The startup, one of four finalists in Black Hat USA's 2023 startup competition, uses deterministic AI to optimize cloud security.

Cloud 105
article thumbnail

Class-Action Lawsuit for Scraping Data without Permission

Schneier on Security

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either registering as a data broker or obtaining consent. On the one hand, I want this to be a protected fair use of public data. On the other hand, I want us all to be compensated for our uniquely human ability to generate language.

Paper 89
article thumbnail

NoName(057)16’s DDoSia Project’s gets an upgrade

Security Affairs

The DDoSia attack tool received an upgrade, it supports a new security mechanism to conceal the list of targets. Researchers at the cybersecurity firm Sekoia analyzed an updated variant of the DDoSia attack tool that was developed and used by the pro-Russia collective NoName(057)16. The tool was employed in attacks against Ukraine and NATO countries, including the Eastern Flank (Lithuania, Poland, Czech Republic and Latvia).

article thumbnail

3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems

Dark Reading

Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.

101
101
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

KnowBe4 Named a Leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the ninth consecutive quarter!

article thumbnail

What Is a Pentest Framework? Top 7 Frameworks Explained

eSecurity Planet

A pentest framework, or penetration testing framework, is a standardized set of guidelines and suggested tools for structuring and conducting effective pentests across different networks and security environments. While it’s certainly possible to construct your own pentest framework that meets the specific security and compliance requirements of your organization, a number of existing methodologies and frameworks can be built upon to make the job easier for you.

article thumbnail

KnowBe4 Named a Leader in the Summer 2023 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

Mitigating Risk With Threat Intelligence

Dark Reading

Dark Reading's latest publication looks at a missing, but necessary, ingredient to effective third-party risk management.

Risk 99
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

EV Charger Hacking Poses a ‘Catastrophic’ Risk

WIRED Threat Level

Vulnerabilities in electric vehicle charging stations and a lack of broad standards threaten drivers—and the power grid.

Risk 93
article thumbnail

Cl0p's MOVEit Campaign Represents a New Era in Cyberattacks

Dark Reading

The ransomware group shows an evolution of its tactics with MOVEit zero-day — potentially ushering in a new normal when it comes to extortion supply chain cyberattacks, experts say.

article thumbnail

Thales payShield receives the French Cartes Bancaires HSM certification

Thales Cloud Protection & Licensing

Thales payShield receives the French Cartes Bancaires HSM certification madhav Thu, 07/06/2023 - 04:35 Securing online payments is more important than ever. The meteoric rise of e-commerce and digital transactions has made online payments an essential part of doing business but, as a result, has subjected organizations to increased risk. If companies want to continue reaping the rewards of online payments, they must give online payment security the necessary attention, and complying with industr

Cloud 62