Fri.Jun 30, 2023

article thumbnail

Taiwan Semiconductor Denies LockBit's $70M Hack Claim

Data Breach Today

Third-Party Supplier Hacked; TSMC Says Leak Only Affected Initial Setup Files The world's top chip manufacturer has dismissed the LockBit 3.0 ransomware gang's hack claim and $70 million ransom. TSMC said the data leak took place at a third-party supplier and contains only certain initial configuration files. It said customer information and operations were not affected.

article thumbnail

Chip Giant TSMC Blames $70M LockBit Breach on IT Hardware Supplier

Dark Reading

The group has given one of Apple's biggest semiconductor suppliers until Aug. 6 to pay $70 million or risk having its data and "points of entry" to its network publicly leaked.

IT 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS Tells Congress 100,000+ People Affected by MOVEit Hacks

Data Breach Today

Department Says Attackers Gained Access to HHS Data Through 3rd-Party Vendors The U.S. Department of Health and Human Services has notified Congress that the information of at least 100,000 individuals has been compromised in hacking incidents at HHS contractors involving exploitation of a flaw in managed file transfer software MOVEit from Progress Software.

Access 242
article thumbnail

FIRESIDE CHAT: Outrageous phone bills stun businesses targeted for ‘SMS toll fraud’

The Last Watchdog

SMS toll fraud is spiking. I learned all about the nuances of deploying – and defending – these insidious attacks in a recent visit with Arkose Labs CEO, Kevin Gosschalk , who explained how the perpetrators victimize businesses that use text messages to validate phone users signing up for a new account. Related: Countering Putin’s weaponizing of ransomware The fraudsters set themselves up as “affiliates” of phone companies in Indonesia, Thailand and Vietnam and then use bots to apply for o

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Proofpoint, Cloudflare Dominate Email Defense Forrester Wave

Data Breach Today

Barracuda, Mimecast, Trend Micro Fall From Leaderboard as Cloud Takes Center Stage Cloudflare and Check Point joined Proofpoint and Microsoft atop Forrester's email security rankings, while Trend Micro, Barracuda Networks and Mimecast tumbled from the leaders category. A number of security vendors have gotten into email protection in recent years by acquiring CAPES startups.

Cloud 144

More Trending

article thumbnail

Details of 1st Government Hack Are Disclosed, 20 Years Later

Data Breach Today

The 2003 Cyberattack Has Been Linked to a State-Sponsored Cyberespionage Campaign The United Kingdom's national cybersecurity agency on Friday marked the 20th anniversary of its response to the first-ever cyberattack against the government by disclosing how government agencies responded. The incident paved way for the launch of the National Cyber Security Center in 2016.

article thumbnail

CISA BOD 23-01: What Agencies Need to Know About Compliance

Dark Reading

The new network visibility mandate provides a good foundation for identifying risks and building better security programs at federal agencies.

article thumbnail

ISMG Editors: Fallout for CISOs in SEC-SolarWinds Probe

Data Breach Today

Also: Number of MOVEit Breach Victims Rises; Highlights From InfoSecurity Europe In the latest weekly update, ISMG editors discuss the potential fallout from an SEC investigation of SolarWinds and its CFO and CISO, why the number of individuals affected by Clop's campaign against MOVEit is on the rise, and highlights from InfoSecurity Europe.

IT 144
article thumbnail

Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers

eSecurity Planet

Nearly half of EDR tools and organizations are vulnerable to Clop ransomware gang tactics, according to tests by a cybersecurity company. Cymulate ran 3,107 assessments across 340 organizations recently to see if security controls were adequate against the Clop (sometimes called “Cl0p” with a zero) ransomware group’s exploitation of a MOVEit software vulnerability ( CVE-2023-34362 ).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

EU Is Set to Finalize Digital Wallet, Proposes Digital Euro

Data Breach Today

Supporters Seek to Take Transactions and Digital Identities Online The European Commission is set to finalize its digital wallet initiative after the proposal achieved political consensus on the core elements concerning its implementation. The latest digital monetary initiative comes as Europe rolls out plans for a digital euro.

IT 144
article thumbnail

Global Data Flows and Transfer Mechanisms – CIPL Publishes New FAQs About CBPR and PRP

Hunton Privacy

On June 26, 2023, the Centre for Information Policy Leadership (CIPL) published the third edition of its Frequently Asked Questions on Cross-Border Privacy Rules, Privacy Recognition for Processors, and Global CBPR and PRP (FAQs). The updates reflect the recent work of the Global CBPR Forum to develop global privacy and data transfer certifications for controllers and processors –Global Cross-Border Privacy Rules (Global CBPR) and a Global Privacy Recognition for Processors (Global PRP) respecti

Privacy 91
article thumbnail

Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools

Dark Reading

The APT35 group (aka Charming Kitten), have added backdoor capabilities to their spear-phishing payloads — and targeted an Israeli reporter with it.

article thumbnail

[FREE Resource Kit] July Is Ransomware Awareness Month

KnowBe4

Ransomware is only continuing to evolve and and get much, much worse. We've created this free Ransomware Awareness Month resource kit to help you protect.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Russian Hacktivist Platform 'DDoSia' Grows Exponentially

Dark Reading

As cybercrime amidst the Russia-Ukraine war continues to escalate, the DDoSia project, launched by a known hacktivist group, has exploded in its number of members and quality of tools used for attacks.

IT 86
article thumbnail

The US Is Spying on the UN Secretary General

Schneier on Security

The Washington Post is reporting that the US is spying on the UN Secretary General. The reports on Guterres appear to contain the secretary general’s personal conversations with aides regarding diplomatic encounters. They indicate that the United States relied on spying powers granted under the Foreign Intelligence Surveillance Act (FISA) to gather the intercepts.

IT 84
article thumbnail

Mockingjay Attack Evades EDR Tools with Code Injection Technique

eSecurity Planet

Security researchers have identified a new sophisticated hacking technique, dubbed “Mockingjay,” that can bypass enterprise detection and response (EDR) tools by injecting malicious code into trusted memory space. This stealthy approach allows attackers to operate undetected within an organization’s network for extended periods. The attack technique — identified by researchers at Security Joes — is a challenge to EDR vendors and security teams alike. “To effectively counteract such a

article thumbnail

3 Ways to Build a More Skilled Cybersecurity Workforce

Dark Reading

With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

External vs Internal Vulnerability Scans: Difference Explained

eSecurity Planet

A vulnerability scan examines both internal and external IT systems to find weaknesses that hackers may take advantage of. By carrying out these scans, you can boost your cybersecurity defenses and keep your company safe from cyber attacks by identifying and addressing vulnerabilities before they are exploited. External and internal vulnerability scans are like your organization’s superpower duo when it comes to protecting against system weaknesses.

Risk 78
article thumbnail

Apple School Manager and Classroom Management

Jamf

Learn how Jamf and Apple's educational tools simplify classroom management of Apple devices and technology.

article thumbnail

Mobile Cyberattacks Soar, Especially Against Android Users

Dark Reading

The number of malware samples is up as attackers aim to compromise users where they work and play: Their smartphones.

125
125
article thumbnail

Improving supply chain resiliency in the industrial sector

IBM Big Data Hub

The industrial sector is facing a perfect storm when it comes to their supply chains: an outdated reliance on manual processes, raw materials demand that will likely outpace supply, as well as potential resource constraints. This is not only impacting the sector’s ability to meet consumer expectations by delivering the products customers need when they need them.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Your KnowBe4 Fresh Content Updates from June 2023

KnowBe4

Check out the 34 new pieces of training content added in June, alongside the always fresh content update highlights, events and new features.

article thumbnail

Nokod Raises $8M Seed Round From Seasoned Cybersecurity Investors to Enhance Low-Code/No-Code App Security

Dark Reading

Nokod Security is building a platform that enables organizations to secure in-house low-code/no-code custom applications by scanning for security and compliance issues and applying remediation policies

article thumbnail

Apple, Google, and MOVEit Just Patched Serious Security Flaws

WIRED Threat Level

Plus: Microsoft fixes 78 vulnerabilities, VMWare plugs a flaw already used in attacks, and more critical updates from June.

article thumbnail

Building a sustainable automotive supply chain

IBM Big Data Hub

The average age of the US light vehicle fleet is now more than 12 years old , which means that they are going to need parts for maintenance​ sooner rather than later. Pair that with a semiconductor shortage amidst global car sales that are forecasted to top 69 million , and you can understand that disruptions in the automotive supply chain would be detrimental to the industry.​ Many companies are beginning to recognize that rebuilding supply networks is imperative to remain viable in

B2B 64
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Potential Postponement of Enforcement of Final CPRA Regulations

Hunton Privacy

On June 29, 2023, the Superior Court of California for the County of Sacramento issued a Tentative Ruling providing for a postponement of enforcement of final CPRA regulations for 12 months after the regulations were finalized (i.e., March 29, 2024). Tentative Rulings are posted by a court the day before a writ or motion is noticed for a hearing and state how the court intends to rule on the motion based on the papers filed by the parties.

Paper 58
article thumbnail

Supply chain visibility in the energy and utilities industry

IBM Big Data Hub

For the energy and utilities industry (E&U), time is not on their side. Equipment-heavy and reliant on an aging infrastructure, E&U clients suffer from costly supply chain disruptions as wear, tear and time take their toll. But with the right tools, tactics and collaboration, it doesn’t have to be this way. The key? Visibility. Simply knowing what maintenance repair parts, you have in-stock, at what levels, and in which locations, can mitigate a big portion of the possibility of un

article thumbnail

Council and European Parliament Reach Political Agreement on the Data Act

Hunton Privacy

On June 27, 2023, the Council and the European Parliament reached a Political Agreement (“Political Agreement”) on the Proposal for a Regulation on harmonized rules on fair access to and use of data (the “Data Act”). The Data Act aims to “ ensure fairness in the digital environment, stimulate a competitive data market, open opportunities for data-driven innovation and make data more accessible for all ” and was initially proposed by the European Commission on February 23, 2022.