Thu.Oct 19, 2023

article thumbnail

Finnish Hacker Charged with Multiple Counts of Extortion

Data Breach Today

Aleksanteri Kivimäki Charged for the 2020 Leak of Mental Health Clinic Database The hacker who allegedly leaked mental health records online after breaking into a Helsinki-based psychotherapy chain's patient database has been charged with multiple counts of extortion and data leak in Finnish court. Finnish national Aleksanteri Tomminpoika Kivimäki, 26, has denied guilt.

311
311
article thumbnail

News alert: NetWitness launches 12.3 update to deliver visibility across the entire enterprise

The Last Watchdog

Bedford, Mass., Oct. 17, 2023 — NetWitness , a globally trusted provider of cybersecurity software and services, has today announced the 12.3 release of its award-winning NetWitness Intelligent Threat Detection and Response Platform. The latest update offers enterprises more visibility into cyber threats than ever before with passive discovery, categorization, and ranking of all network assets, which allows companies to best prioritize potential risks.

Analytics 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran Traps Middle East Nation in 8-Month Espionage Campaign

Data Breach Today

APT34 Used Microsoft Exchange Server to Send Email Commands to Backdoor Malware Iranian state-sponsored hackers conducted an eight-month espionage campaign against a Middle Eastern government, compromising dozens of computers. The Crambus group exploited publicly available tools and three novel pieces of malware to access systems, maintain persistence and steal data.

article thumbnail

UK Court Blocks UK ICO Fine and Enforcement Against Clearview AI

Hunton Privacy

On October 17, 2023, The First-tier Tribunal of the UK General Regulatory Chamber allowed an appeal by Clearview AI Inc (“Clearview”) against an enforcement notice and fine issued by the UK’s Information Commissioner’s Office (“ICO”). On May 18, 2022, the ICO issued an enforcement notice requiring that Clearview delete the personal data of UK individuals collected through the use of its facial recognition technology and held in its database (the “Notice”), as well as a fine of £7.5 million, alle

GDPR 123
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Breach Roundup: Citrix Patch Not Sufficient

Data Breach Today

Also: Navy IT Manager Sentenced to 5 Years in Prison for Accessing Database This week, Citrix's update was insufficient, a Navy IT manager was sentenced to prison for accessing a database, a Moldovan man pleaded not guilty to running a credentials marketplace, new details emerged on health data breaches, and a television advertising giant suffered a ransomware attack.

More Trending

article thumbnail

North Korea Taps IT Contract Workers to Fund Weapons Program

Data Breach Today

Thousands of IT Workers Defrauded US Firms to Earn Hundreds of Millions of Dollars Thousands of North Korean IT workers hid their identities to earn hundreds of millions of dollars in IT contract work from overseas companies to help finance the country's weapons development program, U.S. and South Korean agencies said. Officials said to watch for workers who are camera-shy.

IT 293
article thumbnail

THE 11TH EDITION OF THE ENISA THREAT LANDSCAPE REPORT IS OUT!

Security Affairs

I’m proud to announce the release of the 11th edition of the ENISA Threat Landscape (ETL) on the state of the cybersecurity threat landscape. The Europen Agency for cybersecurity ENISA releases its ENISA Threat Landscape 2023 (ETL) report , which is the annual analysis of the state of the cybersecurity threat landscape. This is the 11th edition of the annual report and analyzes events that took place between July 2022 and July 2023.

article thumbnail

Cryptohack Roundup: Crypto's Role in Terrorist Financing

Data Breach Today

Also: Sam Bankman-Fried's Adderall Dosage; Stars Arena; a New California Law This week, Chainalysis busted crypto terrorist financing myths, the Sam Bankman-Fried trial continued, Stars Arena got back 90% of its stolen funds, an EU authority warned about DeFi risks, the U.S. FDIC said it would focus more on crypto, and California's governor approved crypto regulations.

Risk 289
article thumbnail

North Korea-linked APT groups actively exploit JetBrains TeamCity flaw

Security Affairs

North Korea-linked threat actors are actively exploiting a critical vulnerability CVE-2023-42793 in JetBrains TeamCity. Microsoft warns that North Korea-linked threat actors are actively exploiting a critical security vulnerability, tracked as CVE-2023-42793 (CVSS score: 9.8), in JetBrains TeamCity. CVE-2023-42793 is an authentication bypass issue affecting the on-premises version of TeamCity.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Is the Ragnar Locker Ransomware Group Headed for Oblivion?

Data Breach Today

International Law Enforcement Operation Seizes Infrastructure, Disrupts Operation The data leak and negotiation sites for the Ragnar Locker ransomware group went offline Thursday after an international law enforcement operation, backed by the FBI and police in Europe, seized its infrastructure. Whether the disruption spells the end for Ragnar Locker remains unclear.

article thumbnail

Law enforcement operation seized Ragnar Locker group’s infrastructure

Security Affairs

An international law enforcement operation shuts down the infrastructure of the Ragnar Locker ransomware operation. Law enforcement from the US, Europe, Germany, France, Italy, Japan, Spain, Netherlands, Czech Republic, and Latvia conducted a joint operation that led to the seizure of the Ragnar Locker ransomware’s infrastructure. The police on Thursday seized the Tor negotiation and data leak sites.

article thumbnail

Mata Malware Targeted East European Energy, Defense Sectors

Data Breach Today

Kaspersky Observed New Generations of the Malware With Advanced Capabilities Hackers used an updated malware framework dubbed Mata by Kaspersky to target more than a dozen oil, gas and defense sector companies in Eastern Europe, including air-gapped systems. Kaspersky previously associated Mata with North Korea but doesn't attribute this campaign to the Pyongyang regime.

277
277
article thumbnail

Patch Now: APTs Continue to Pummel WinRAR Bug

Dark Reading

State-sponsored cyber espionage actors from Russia and China continue to target WinRAR users with various info-stealing and backdoor malware, as a patching lag plagues the software's footprint.

112
112
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Plastic Surgeons Warned About New Face of Cyber Extortion

Data Breach Today

FBI Says Patients, Doctors at Risk of Ransom Demands After Theft of Records, Photos The FBI is warning plastic surgery practices and their patients of cybercriminals targeting their sensitive health information and medical photos for extortion schemes. The alert followed recent hacking incidents at several plastic surgery practices involving data theft.

Risk 258
article thumbnail

What is codeless quality?

OpenText Information Management

Codeless quality is about using automation and AI to support faster development and release cycles with less time and effort. By reducing the learning curve for quality testing, companies can maximize testing coverage, allowing those closely involved in business analysts (BA) and product experts who typically have deep understanding of the product and/or service but … The post What is codeless quality?

111
111
article thumbnail

23AndMe Hacker Leaks New Tranche of Stolen Data

Dark Reading

Two weeks after the first data leak from the DNA ancestry service, the threat actor produces an additional 4 million user records they purportedly stole.

116
116
article thumbnail

Weekly Update 370

Troy Hunt

I did it again - I tweeted about Twitter doing something I thought was useful and the hordes did descend on Twitter to tweet about how terrible Twitter is. Right, gotcha, so 1.3M views of that tweet later. As I say in this week's video, there's a whole bunch of crazy arguments in there but the thing that continues to get me the most in every one of these discussions is the argument that Elon is a poo poo head.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AI-Powered Israeli 'Cyber Dome' Defense Operation Comes to Life

Dark Reading

The Israelis are building a cyber defense system that will use ChatGPT-like generative AI platforms to parse threat intelligence.

117
117
article thumbnail

Phishing-as-a-Service: As Simple As Uploading A Logo

KnowBe4

Researchers at Fortra are tracking “Strox,” one of the most popular phishing operations of the past two years. Users of Strox phishing kits can easily create phishing campaigns by simply submitting a logo for the brand they want to impersonate.

article thumbnail

North Korean State Actors Attack Critical Bug in TeamCity Server

Dark Reading

Known threat groups Diamond Sleet and Onyx Sleet focus on cyber espionage, data theft, network sabotage, and other malicious actions, Microsoft says.

103
103
article thumbnail

Empowering farmers across the digital divide in Malawi with OpenHarvest

IBM Big Data Hub

The landlocked country of Malawi, located in southeastern Africa, is home to rich, arable land and a subtropical climate suitable for farming. As a result, over 80% of the population is employed in agriculture, and their livelihood revolves around alternating rainy and dry seasons that dictate how the year’s planting, growing and harvesting will unfold.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Europol Strike Wounds Ragnar Locker Ransomware Group

Dark Reading

Several countries in Europe as well as the United States and Japan were involved in the operation, which is aimed at defanging one of the bigger names in ransomware.

article thumbnail

CISA, NSA, FBI, and MS-ISAC Release Phishing Prevention Guidance

KnowBe4

October 18, 2023, the Cybersecurity Infrastructure and Security Agency (CISA), the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a joint guide, Phishing Guidance: Stopping the Attack Cycle at Phase One. The joint guide outlines phishing techniques malicious actors commonly use and provides guidance for both network defenders and software manufacturers to reduce the impact of phishing techn

article thumbnail

Tips for a Successful SecOps Game Plan

Dark Reading

Dark Reading's special report on SecOps data analytics looks at the elements needed to set up a proper data foundation — because getting the data right when collecting, aggregating, and analyzing it is essential.

article thumbnail

China Proposes New Rules for Data Transfers

Hunton Privacy

On September 28, 2023, the Cyberspace Administration of China (“CAC”) released the “Provisions on Regulating and Facilitating Cross-Border Data Flows” for public comment (the “Proposal”). The deadline for public comment on the Proposal was October 15, 2023. The Proposal: (1) exempts certain processing activities from China’s data transfer restrictions, (2) revises the thresholds triggering a formal data transfer security assessment and (3) enables more flexibility for data transfers from China’s

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Freelance Market Flooded with North Korean IT Actors

Dark Reading

Organizations should be careful that the workers they hire on a freelance and temporary basis are not operatives working to funnel money to North Korea's WMD program, US DOJ says.

article thumbnail

Make Music Count embeds watsonx to make perfect music with math  

IBM Big Data Hub

Over the past ten years, I’ve been on a journey to create an interactive, patented curriculum that combines the power of math with the joy of music. In our program Make Music Count , students from elementary to high school get hands-on experience solving math equations while learning how to play the piano. Since launching, I’ve seen the need, desire and impact: Make Music Count is in over 400 schools with 60,000 registered students and 20,000+ downloads on iOS and Android devices.

article thumbnail

OpenText World 2023—Welcome to the AI Revolution

OpenText Information Management

Welcome to the AI Revolution. AI is not just a technology, it is a new ontology—for creativity, data, trust. No business or individual will be spared this new way of being. At OpenText World 2023, we discussed our massively expanded mission around AI and information management. We showcased the incredible innovations available to our customers … The post OpenText World 2023—Welcome to the AI Revolution appeared first on OpenText Blogs.

IT 67