Wed.Oct 18, 2023

article thumbnail

Tenable, Vulcan Cyber Lead Vulnerability Management Rankings

Data Breach Today

Qualys, Rapid7 Depart Forrester's Leaderboard as Data Ingestion Takes Center Stage Tenable held steady atop Forrester's vulnerability risk management rankings while Vulcan Cyber broke into the leaders category and Rapid7 and Qualys tumbled from the leaderboard. The way vendors deliver vulnerability management has shifted away from ingesting vulnerability assessment results.

Risk 336
article thumbnail

The Fake Browser Update Scam Gets a Makeover

Krebs on Security

One of the oldest malware tricks in the book — hacked websites claiming visitors need to update their Web browser before they can view any content — has roared back to life in the past few months. New research shows the attackers behind one such scheme have developed an ingenious way of keeping their malware from being taken down by security experts or law enforcement: By hosting the malicious files on a decentralized, anonymous cryptocurrency blockchain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korean Hackers Exploiting Critical Flaw in DevOps Tool

Data Breach Today

Pyongyang Hackers Exploiting Critical TeamCity Server Bug North Korean nation-state threat actors are exploiting a critical remote code execution vulnerability affecting multiple versions of a DevSecOps tool - a high-risk development, especially in light of Pyongyang hackers' recent track record of supply chain hacks.

Risk 317
article thumbnail

Multiple APT groups exploited WinRAR flaw CVE-2023-38831

Security Affairs

Google TAG reported that both Russia and China-linked threat actors are weaponizing the a high-severity vulnerability in WinRAR. Google’s Threat Analysis Group (TAG) reported that in recent weeks multiple nation-state actors were spotted exploiting the vulnerability CVE-2023-38831 in WinRAR. The researchers reported that several cybercrime groups began exploiting the flaw in early 2023, when the bug was still a zero-day.

Archiving 125
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Nation-State Hackers Exploiting WinRAR, Google Warns

Data Breach Today

While RARLabs Patched Flaw, 'Many Users' Don't Appear to Have Updated the Software Nation-state hackers are targeting a vulnerability in WinRAR, a popular Windows utility for archiving files, warns Google’s Threat Analysis Group, which said it has seen "government-backed hacking groups" who hail from multiple countries, including China and Russia, targeting the bug.

Archiving 297

More Trending

article thumbnail

Payment Fraud: What It Is and How to Fight It

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Unplugged," Alex Zeltcer of nSure.ai discusses how fraudsters access your payment information, how industrialized payment fraud attacks operate, and how nSure.ai uses discriminative AI to identify these attacks and cut their scale.

IT 288
article thumbnail

A flaw in Synology DiskStation Manager allows admin account takeover

Security Affairs

A vulnerability in Synology DiskStation Manager ( DSM ) could be exploited to decipher an administrator’s password. Researchers from Claroty’s Team82 discovered a vulnerability, tracked as CVE-2023-2729 (CVSS score 5.9), in Synology DiskStation Manager (DSM). Team82 discovered the use of a weak random number generator in Synology’s DiskStation Manager (DSM) Linux-based operating system running on the NAS products.

Passwords 121
article thumbnail

Arctic Wolf CEO on Why His Company Is Buying a SOAR Vendor

Data Breach Today

CEO Nick Schneider Says Revelstoke Buy Will Bring More Automation, AI Capabilities Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.

284
284
article thumbnail

Critical Citrix Bug Exploited as a Zero-Day, 'Patching Is Not Enough'

Dark Reading

The latest threat to Citrix NetScaler, CVE-2023-4966, was exploited as a zero-day bug for months before a patch was issued. Researchers expect exploitation efforts to surge.

122
122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ukrainian Hacktivists Claim Trigona Ransomware Takedown

Data Breach Today

Data From Trigona's Servers Exfiltrated and Wiped Out, Reads a Note on Leak Site Pro-Ukrainian hackers claimed responsibility for wiping the servers of the Trigona ransomware gang, a recently formed group that may have links to the Russian cybercriminal underground. "'Terrible Russian hackers,' yeah, yeah," wrote a self-described spokesman for the Ukrainian Cyber Alliance.

article thumbnail

Californian IT company DNA Micro leaks private mobile phone data

Security Affairs

Hundreds of thousands of clients who opted-in for a screen warranty were exposed when DNA Micro leaked data from its systems. The Cybernews research team found that DNA Micro, a California-based IT company, exposed the sensitive data of more than 820,000 customers due to a misconfiguration in its systems. The victims most affected by the data leak were those using the services of DNA Micro’s subsidiary company InstaProtek, which provides a screen warranty service.

IT 118
article thumbnail

US House Panel: AI Regulation Begins With Privacy

Data Breach Today

House Committee Told to Relaunch Data Privacy Effort Launched Last Year The U.S. needs to pass federal legislation to establish a national framework of standards and a rules of the road for AI, but first passing federal data privacy legislation is an essential foundational part of that, some witnesses told members of Congress.

Privacy 280
article thumbnail

D-Link Confirms Breach, Rebuts Hacker's Claims About Scope

Dark Reading

The router specialist says the attacker's claims to have heisted millions and millions of records are significantly overblown. But an incident did happen, stemming from a successful phish.

Phishing 117
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing Attacks Surge By 173% In Q3, 2023; Malware Threats Soar By 110%

KnowBe4

A new report from Vade Secure has found that phishing attacks rose by 173% in the third quarter of 2023, while malware threats have increased by 110%.

Phishing 118
article thumbnail

FBI: Hackers Are Extorting Plastic Surgery Providers, Patients

Dark Reading

The sensitive nature of medical records, combined with providers' focus on patient care, make small doctor's offices ideal targets for cyber extortion.

123
123
article thumbnail

Threat actors have been exploiting CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices since August

Security Affairs

Experts reported that the vulnerability CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been exploited in attacks since late August. On October 10, Citrix published a security bulletin related to a critical vulnerability, tracked as CVE-2023-4966, in Citrix NetScaler ADC/Gateway devices. “ Exploits of CVE-2023-4966 on unmitigated appliances have been observed. ” reported Citrix. “Cloud Software Group strongly urges customers of NetScaler ADC and NetScaler Gateway to i

article thumbnail

The Most Popular IT Admin Password Is Totally Depressing

Dark Reading

Analysis of more than 1.8 million admin portals reveals IT leaders, with the highest privileges, are just as lazy about passwords as everyone else.

Passwords 124
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What is a Whaling phishing attack and how to prevent it

Jamf

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks: What they are?

article thumbnail

Jupyter Notebook Ripe for Cloud Credential Theft, Researchers Warn

Dark Reading

If not correctly locked down, Jupyter Notebook offers a novel initial access vector that hackers can use to compromise enterprise cloud environments, as seen in a recent hacking incident.

Cloud 104
article thumbnail

Clean data and why your organization’s health depends on it

CGI

Data is the lifeblood of any organization. It informs everything from business strategy to day-to-day operations. But, like water, data can become contaminated and unfit for use. As organizations increasingly rely on big data and intelligent automation to become data-driven enterprises, clean data will be critical to success.

article thumbnail

What CISOs Should Exclude From SEC Cybersecurity Filings

Dark Reading

Should CISOs include only known information in the SEC filings for a material security incident, or is there room to include details that may change during the investigation?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

[Cybersecurity Awareness Month] How To Stop the Ransomwolf Attacks: Similarities to the Werewolves Terrors

KnowBe4

Imagine a monstrous entity emerging from the shadows to prey on vulnerable organizations, leaving havoc in its wake. No, we are not talking about ghoulish and scary creatures of the night. We are discussing the modern menace of ransomware attacks—specifically, an infamous threat discovered by KnowBe4: The Ransomwolf. Ironically, there are similar patterns between halting this cyber menace and the mythical tactics against stopping werewolves.

article thumbnail

EPA Turns Off Taps on Water Utility Cyber Regulations

Dark Reading

Facing a potential cascade of legal challenges from industry groups and state attorneys general, the EPA has rescinded its cyber-rules. But where does that leave local water safety?

IT 99
article thumbnail

3 Reasons to attend PrestoCon 2023: Embracing Open Source and Next-Gen Presto

IBM Big Data Hub

On December 5–6, 2023 at the Computer History Museum in Mountain View, CA, hundreds of developers and software engineers will come together at PrestoCon 2023 to support and learn more about Presto, the open-source SQL query engine for data analytics and the Open Data Lakehouse. Learn more about PrestoCon 2023 We’re excited for the future of Presto.

article thumbnail

North Korea's Kimsuky Doubles Down on Remote Desktop Control

Dark Reading

The sophisticated APT employs various tactics to abuse Windows and other built-in protocols with both custom and public malware to take over victim systems.

94
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

AI skills for all: How IBM is helping to close the digital divide

IBM Big Data Hub

AI has inspired millions of people around the world with ideas about what it can make possible. But this technological game changer has also provoked a lot of questions around how it will impact the world of work. Change is happening, and fast. Research from IBM’s Institute for Business Value (IBV) finds that executives estimate about 40% of their workforce will need to reskill over the next three years due to AI and automation.

article thumbnail

Data Security and Collaboration in the Modern Enterprise

Dark Reading

The "CISO Survival Guide" explores the complex and shifting challenges, perceptions, and innovations that will shape how organizations securely expand in the future.

article thumbnail

Watsonx Orders helps restaurant operators maximize revenue with AI-powered order taker for drive-thrus

IBM Big Data Hub

We’re pleased to announce IBM watsonx Orders, an AI-powered voice agent for drive-thrus of quick-service restaurants. Powered by the latest technology from IBM Research, watsonx Orders is designed to help restaurant owners solve persistent labor challenges by handling almost all orders and interactions without the help of human cashiers, while delighting restaurant guests with quick service and accurate orders.

Sales 79