Mon.Jun 19, 2023

article thumbnail

Feds Warn Health Sector of TimisoaraHackerTeam Threats

Data Breach Today

HHS Says 'Obscure' Group Has Resurfaced, Hitting a Cancer Center Federal authorities are warning healthcare and public health sector entities of an apparent resurgence of TimisoaraHackerTeam after an attack in recent weeks by the obscure ransomware group on a U.S. cancer center. HHS says the group was discovered by security researchers in 2018.

article thumbnail

GUEST ESSAY: The need to assess context, intent when granting privileged access in today’s world

The Last Watchdog

The number one cybersecurity threat vector is unauthorized access via unused, expired or otherwise compromised access credentials. Related: The rising role of PAM for small businesses In the interconnected work environment, where users need immediate access to many platforms on and off-premises to do their jobs, keeping track of user activity and proper on and off-boarding is becoming more and more difficult.

Access 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Expensive Proxies Underpin 'Anonymous Sudan' DDoS Attacks

Data Breach Today

Paid IT Infrastructure Undermines Hacktivism Claim of Pro-Russia Group Pro-Russian and self-declared "hacktivist" group Anonymous Sudan appears to use expensive online infrastructure to perpetuate distributed denial of attacks, undermining its claim to be volunteers operating from an impoverished East African country.

IT 257
article thumbnail

Experts found components of a complex toolkit employed in macOS attacks

Security Affairs

Researchers uncovered a set of malicious files with backdoor capabilities that they believe is part of a toolkit targeting Apple macOS systems. Bitdefender researchers discovered a set of malicious files with backdoor capabilities that are suspected to be part of a sophisticated toolkit designed to target Apple macOS systems. The investigation is still ongoing, the experts pointed out that the samples are still largely undetected.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK National Crime Agency Head Calls For Hacking Law Updates

Data Breach Today

Graeme Biggar Says Law Stymies Prosecutions of Foreign Hackers A British cyber law that criminalizes hacking is outdated, hindering law enforcement action against cyber crooks, U.K. lawmakers heard during a parliamentary hearing on cybercrime. Graeme Biggar, the director general of the U.K's National Crime Agency, said it should be offense to steal data.

IT 250

More Trending

article thumbnail

Sonatype, Snyk, Synopsys Top SW Comp Analysis Forrester Wave

Data Breach Today

Mend.io Falls From Leaderboard as Open-Source Dependencies Get Their Day in the Sun A surging Sonatype and Snyk joined stalwart Synopsys atop Forrester's software composition analysis rankings, while Mend.io tumbled from the leaders category. SCA historically didn't get as much attention as application security testing but that’s changing, said Forrester's Janet Worthington.

Security 184
article thumbnail

EU member states are urged to restrict without delay 5G equipment from risky suppliers

Security Affairs

The European Commission urges member states to limit “without delay” equipment from Chinese suppliers from their 5G networks, specifically Huawei and ZTE. The European Commission told member states to impose restrictions on high-risk suppliers for 5G networks without delay, with a specific focus on the dependency on high-risk suppliers, specifically Chinese firms Huawei and ZTE.

Risk 97
article thumbnail

BlackCat Claims Hit on Reddit, Threatens Sensitive Data Leak

Data Breach Today

Group Attempts to Insert Itself in Debate Between Reddit Leadership and Volunteers The BlackCat ransomware group has claimed credit for a February phishing attack against Reddit. With no ransom being paid, the extortionists are now seeking to insert themselves into the standoff between Reddit's leadership and volunteer workforce over the introduction of paid access to APIs.

Phishing 167
article thumbnail

Diicot cybercrime gang expands its attack capabilities

Security Affairs

Researchers found evidence that Diicot threat actors are expanding their capabilities with new payloads and the Cayosin Botnet. Cado researchers recently detected an interesting attack pattern linked to an emerging cybercrime group tracked as Diicot (formerly, “Mexals”) and described in analyses published by Akamai and Bitdefender. The experts discovered several payloads, some of which were not publicly known, that are being used as part of a new ongoing campaign.

IT 96
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SeroXen Malware Latest to Deploy BatCloak Evasion Tool

Data Breach Today

BatCloak Slips Batch Files Past AV and EDR Detection Malware developers are adopting an easy-to-use obfuscation tool that slips malware past antivirus, warn security researchers. BatCloak requires minimal programming skills to use. Among its recent successes is a recent remote access Trojan dubbed SeroXen.

Access 157
article thumbnail

ASUS addressed critical flaws in some router models

Security Affairs

ASUS addressed critical vulnerabilities in multiple router models, urging customers to immediately install firmware updates. ASUS is warning customers to update some router models to the latest firmware to address critical vulnerabilities. The impacted models are GT6, GT-AXE16000, GT-AX11000 PRO, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and TUF-AX5400.

article thumbnail

Power LED Side-Channel Attack

Schneier on Security

This is a clever new side-channel attack : The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader­or of an attached peripheral device­during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used in Minerva.

article thumbnail

Reshoring: The risks of swinging the pendulum too far

IBM Big Data Hub

From the decades before the turn of the century until the global pandemic, great economic growth spread across the world, driving historic demand in commodities and consumer goods. But this economic growth, coupled with stringent labor laws, drove up labor costs. By sourcing materials and labor from countries with lower labor and manufacturing costs, businesses were able to capitalize on the economic boom, produce more goods and services, and minimize their costs.

Risk 83
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US Investors Sniffing Around Blacklisted NSO Group Assets

Dark Reading

Pressure mounts on the NSO Group's business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse.

87
article thumbnail

It Takes Time, And It Ain’t For Sure.

John Battelle's Searchblog

We’re all waiting for AI. Yesterday Fred posted about voice input over on AVC, and it reminded me how long it takes for consumers to adopt truly new behaviors, regardless of how enthusiastic we might get about a particular technology’s potential. As Fred points out, voice input has been around for a decade or so, and yet just a fraction of us use it for much more than responding to texts or emails on our phones.

IT 75
article thumbnail

Generative AI Has Its Risks, But the Sky Isn't Falling

Dark Reading

The threat organizations face with GenAI is not new, but it could speed how quickly private data reaches a wider audience.

IT 93
article thumbnail

New CA/B Forum Code Signing Requirements in Effect – Is Your Organization Compliant?

Thales Cloud Protection & Licensing

New CA/B Forum Code Signing Requirements in Effect – Is Your Organization Compliant? madhav Tue, 06/20/2023 - 06:29 Numerous breaches and malicious malware attacks have used fraudulent code signing certificates to cause significant damage of the certificate owner’s reputation and business. To prevent this from happening, earlier this month, the CA/B forum’s new Code Signing Baseline Requirements (CSBRs) came into effect, bringing with it changes to how organizations must generate and protect cod

Cloud 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Decoding Identity and Access Management For Organizations and Consumers

Dark Reading

Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies.

Access 92
article thumbnail

The benefits of implementing Vendor Invoice Management with an agile approach

OpenText Information Management

OpenText™ Vendor Invoice Management for SAP® Solutions (VIM) is a leading invoice management and processing solution that fully integrates with SAP. The solution optimizes and automates end-to-end processing from receipt to posting using intelligent data enrichment, pre-configured rules, roles and actions. The product includes solutions for the Purchase to Pay and Order to Cash process … The post The benefits of implementing Vendor Invoice Management with an agile approach appeared first o

article thumbnail

Name That Toon: Time to Spare?

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

78
article thumbnail

On this day in history, June 19, 1865, the end of slavery is proclaimed in Texas via Fox News

IG Guru

Check out the article here.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Consumer Data: The Risk and Reward for Manufacturing Companies

Dark Reading

To adequately address privacy, manufacturers need to think differently about data.

article thumbnail

IG GURU creates Mastodon Account (Decentralized Social Media) after Twitter shuts down API for WordPress sites

IG Guru

Check out our profile at @igguru@mastodon.

69