Fri.Jul 07, 2023

article thumbnail

Latest MOVEit Bug Is Another Critical SQL Injection Flaw

Data Breach Today

Progress Software Reveals 1 New 'Critical' and 2 'High-Severity' Bugs For the third time since the discovery of the MOVEit Transfer application zero-day vulnerability, Progress Software has revealed a new critical SQL injection vulnerability that allows remote attackers to bypass authentication and execute arbitrary code.

article thumbnail

Bangladesh government website leaked data of millions of citizens

Security Affairs

A researcher recently discovered that a Bangladesh government website leaks the personal data of citizens. The researcher Viktor Markopoulos discovered a Bangladeshi government website that was leaking the personal information of millions of Bangladesh citizens. According to TechCrunch, which first reported the news, the leaked data included full names, phone numbers, email addresses, and national ID numbers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Midyear Health Data Breach Analysis: The Top Culprits

Data Breach Today

Latest Hacking, Vendor Incident Trends Emerging From the Federal Tally Hacking incidents, including those involving ransomware attacks or vendors, that affect tens of millions of individuals, continue to account for the majority of health data breaches reported to federal regulators so far this year. What are the other emerging breach trends?

article thumbnail

Spyware Gamed 1.5M Users of Google Play Store

Dark Reading

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find.

103
103
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ISMG Editors: Virtual War Between US and China Persists

Data Breach Today

Also: ISMG's Healthcare Summit, Forrester's Network Analysis and Visibility Report In the latest weekly update, four editors at ISMG discuss highlights from recent ISMG events, the winners and losers in Forrester's first-ever network analysis and visibility rankings, and the ongoing tech trade war between the U.S. and China and its impact on the global supply chain.

IT 144

More Trending

article thumbnail

35M Indonesians' Passport Data for Sale on Dark Web for $10K

Data Breach Today

Researcher Suspects Hack, Data Leak Done by Notorious Indonesian Hacktivist Bjorka The personal information of nearly 35 million Indonesian passport holders is up for sale on the dark web for $10,000 by notorious hacktivist Bjorka, who routinely criticizes the Indonesian government, publishing damaging information about lawmakers on social media. The government is investigating.

Sales 144
article thumbnail

The AI Dividend

Schneier on Security

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent Fund, funded by the state’s oil revenues and paid to every Alaskan each year. We’re now in a different sort of resource rush, with companies peddling bits instead of oil: generative AI.

IT 95
article thumbnail

New French Bill Would Permit Law Enforcement Surveillance

Data Breach Today

Enhanced Police Powers Added to Bill Focused on Securing Digital Space The French government is pursuing a new law that will grant the country's law enforcement agencies sweeping power to snoop on suspected cybercriminals and other online miscreants by remotely accessing their phones and computers. The measure is now headed to the French National Assembly.

article thumbnail

Meta's Rush to Topple Twitter Sets Up Looming Privacy Debate

Dark Reading

GDPR is halting Meta's new Threads app from entering EU markets, portending a broader struggle over the right ways to collect user data on social apps.

GDPR 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Outsmarting the Hackers: Next-Level Strategies for Battling Third-Party Cyber Risks

Data Breach Today

Granting third parties access to sensitive data introduces inherent risks that organizations must address effectively. So how does an organization best manage that third-party risk while balancing an organization's inherent need for usability?

Risk 130
article thumbnail

Global Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses

Dark Reading

Hack The Box launches Capture The Flag competition, including offensive and defensive challenges, to unite teams as cyberattacks increase in 2023 to unprecedented levels.

article thumbnail

Microsoft Teams Cyber Attack Exploit Tool Relies on Social Engineering to Deliver Malware

KnowBe4

If your organization uses Microsoft Teams, then you definitely want to hear about a new way bad actors are exploiting this newly discovered cyber attack tool.

94
article thumbnail

Apply for JNUC 2023 Diversity Sponsorship

Jamf

Jamf is offering 2023 Jamf Nation User Conference (JNUC) sponsorships to 10 people from underrepresented groups within the technology sector.

98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Email-Based Cyber Attacks in Europe Increase 7-Fold in Just One Year

KnowBe4

An abnormally massive focus on business email compromise attacks in Europe has fueled an equally large growth in overall email attacks there, with the U.S. also seeing significant attack growth.

article thumbnail

MOVEit Transfer Faces Another Critical Data-Theft Bug

Dark Reading

Users need to patch the latest SQL injection vulnerability as soon as possible. Meanwhile, Cl0p's data extortion rampage gallops on.

98
article thumbnail

Amazon Prime Day Alert: Beware of Fake Logins, Gift Card Scams

KnowBe4

A new threat alert from ConsumerAffairs and TrendMicro proves more than just shoppers will take advantage of Amazon’s upcoming Prime Day.

article thumbnail

How To Tell If You’ve Been DDoSed: 5 Signs of a DDoS Attack

eSecurity Planet

Mention the acronym DDoS to a web admin and they’ll likely break out in a cold sweat. DDoS, or Distributed Denial of Service attacks, are some of the most malicious and difficult-to-stop network attacks that can be launched against a website or any other DDoS-susceptible service, such as a SaaS platform. These attacks occur when multiple compromised systems send a flood of requests to targeted servers to overwhelm and crash it.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Camaro Dragon APT Group Continues to Employ USB Devices as Initial Attack Vector

KnowBe4

Apparently expanding efforts outside of Southeast Asian countries, this threat group’s known malware has shown up in a European healthcare facility, raising concerns for USB-based attacks.

article thumbnail

NIST updates crucial guidelines for protecting sensitive information via Federal News Network

IG Guru

Check out the post here. The post NIST updates crucial guidelines for protecting sensitive information via Federal News Network first appeared on IG GURU.

article thumbnail

U.K. Twitter Impersonation Hacker Sentenced to Prison in the U.S.

KnowBe4

The British national responsible for hacking into and impersonating high-profile individuals as part of a crypto theft scheme has been sentenced to five years in prison.

article thumbnail

Can Generative AI Be Trusted to Fix Your Code?

Dark Reading

Not yet — but it can help make incremental progress in reducing vulnerability backlogs.

IT 115
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Number of Phishing Attack Cases in Singapore Jump by 185%

KnowBe4

The latest data provided by the Singapore Cyber Emergency Response Team (SingCERT) shows the number of attacks trending in the wrong direction, with some indicators that the good guys still may be winning.

article thumbnail

Weekly Update 355

Troy Hunt

Alrighty, "The Social Media" Without adding too much here as I think it's adequately covered in the video, since last week we've had another change at Twitter that has gotten some people cranky (rate limits) and another social media platform to jump onto (Threads). I do wonder how impactful the 1k tweet view limit per day is for most people (I have no idea how many I usually see, I just know I've never hit the limit yet), and as I say in the video, I find it increasingly h

article thumbnail

Free Unsolicited Smartwatch in the Mail and I’m in the Military? What Could Possibly Go Wrong???

KnowBe4

From the “shaking our heads” files comes the story of how threat actors compromised military personnel mobile devices, credentials, accounts and more.

article thumbnail

12 Types of Vulnerability Scans & When to Run Each

eSecurity Planet

Vulnerability scanning is critically important for identifying security flaws in hardware and software, but vulnerability scanning types are as varied as the IT environments they’re designed to protect. In this article, we’ll delve into various types of vulnerability scans, explore their benefits, outline the ideal scenarios for running each type, and list the best vulnerability scanning tool to use for each type of scan.

Cloud 75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Truebot Malware Variants Abound, According to CISA Advisory

Dark Reading

US and Canadian government agencies find that new variants of the malware are increasingly being utilized.

article thumbnail

Hong Kong New PCPD Guidance on Handling Data Breaches

Data Matters

On June 30, 2023, Hong Kong’s data protection authority (the Office of the Privacy Commissioner for Personal Data, or PCPD) issued an updated version of its Guidance on Data Breach Handling and Data Breach Notifications (the Guidance, accessible here ), which aims to guide companies on how they respond to data breaches. In particular, the Guidance contains a new recommendation for companies to adopt written data breach response plans.

article thumbnail

How to Safely Architect AI in Your Cybersecurity Programs

Dark Reading

Guardrails need to be set in place to ensure confidentiality of sensitive information, while still leveraging AI as a force multiplier for productivity.