Thu.Aug 10, 2023

article thumbnail

Check Point to Buy SSE, ZTNA Startup Perimeter 81 for $490M

Data Breach Today

Perimeter 81 Cuts Valuation By 51%, Becomes Second Cyber Firm to Lose Unicorn Horns Perimeter 81 will be sold to Check Point for $490 million but had to slash its valuation by more than half to seal the deal. Check Point said its proposed buy of New York-based Perimeter 81 will fuel the adoption of secure access across remote users, sites, cloud, data centers and the internet.

Cloud 242
article thumbnail

SEC Proposes Sweeping New Rules on Use of Data Analytics by Broker-Dealers and Investment Advisers

Data Matters

On July 26, 2023, the U.S. Securities and Exchange Commission (SEC or Commission) proposed new rules for broker-dealers (Proposed Rule 15(1)-2) and investment advisers (Proposed Rule 211(h)(2)-4) on the use of predictive data analytics (PDA) and PDA-like technologies in any interactions with investors. 1 However, as discussed below, the scope of a “covered technology” subject to the rules is much broader than what most observers would consider to constitute predictive data analytics.

Analytics 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers Use EvilProxy to target C-suite Excecutives

Data Breach Today

Phishing Kit Primarily Used in Attacks Against Employees of Fortune 500 Companies Threat actors are taking control of cloud-based Microsoft 365 accounts of C-suite executives using a multi-factor authentication phishing tool. Proofpoint researchers say attackers use automation to identify in real-time whether a phished user is a high-level profile company official.

Phishing 241
article thumbnail

CISA adds actively exploited flaw in.NET, Visual Studio to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added zero-day vulnerability CVE-2023-38180 affecting.NET and Visual Studio to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added an actively exploited zero-day vulnerability CVE-2023-38180 (CVSS score 7.5) affecting.NET and Visual Studio to its Known Exploited Vulnerabilities Catalog.

IT 95
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Secondary Market Medical Device Security Risks

Data Breach Today

Legacy infusion pumps commonly available for purchase on the secondary market often contain wireless authentication and other sensitive data that the original medical organization owners failed to purge, warned researcher Deral Heiland, citing a recent study conducted by security firm Rapid7.

Marketing 240

More Trending

article thumbnail

Law Enforcement Takes Down Phishing-as-a-Service Site

Data Breach Today

Authorities in Multiple Countries Arrest Operators of 16shop An international law enforcement operation took down a phishing-as-a-service website that security researchers say was responsible for more than 150,000 phishing domains. The site, 16shop, sold phishing kits that targeted more than 70,000 people in 43 countries.

Phishing 240
article thumbnail

Statc Stealer, a new sophisticated info-stealing malware

Security Affairs

Experts warn that a new info-stealer named Statc Stealer is infecting Windows devices to steal a broad range of sensitive information. Zscaler ThreatLabz researchers discovered a new information stealer malware, called Statc Stealer, that can steal a broad range of info from Windows devices. The malware can steal sensitive information from various web browsers, including login data, cookies, web data, and preferences.

article thumbnail

Northern Ireland Police Disclose Another Serious Data Breach

Data Breach Today

Privacy Watchdog Probing Accidental Leak of Personal Information for Entire Force One day after personal information for all 10,000 police officers and staff in Northern Ireland was accidentally exposed online, putting their safety at risk, the nation's police service said it's probing a laptop theft last month that may have exposed 200 employees' details.

article thumbnail

CISA discovered a new backdoor, named Whirlpool, used in Barracuda ESG attacks

Security Affairs

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) observed a new backdoor, named Whirlpool, in attacks on Barracuda ESG appliances. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has discovered a new backdoor, named Whirlpool , that was employed in attacks targeting Barracuda ESG devices. At the end of May, the network security solutions provider Barracuda warned customers that some of its Email Security Gateway (ESG) appliances were recently by threat actors

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chinese RedHotel Spy Group Linked to Hacks in 17 Countries

Data Breach Today

Motives, Operations Closely Linked to China's Ministry of State Security A Chinese state-sponsored spy group called RedHotel has emerged as a dominant espionage agent against government entities of at least 17 countries worldwide. Researchers said the motives and operations of the group closely link it to China's Ministry of State Security.

article thumbnail

Teens Hacked Boston Subway’s CharlieCard to Get Infinite Free Rides—and This Time Nobody Got Sued

WIRED Threat Level

In 2008, Boston’s transit authority sued to stop MIT hackers from presenting at the Defcon hacker conference on how to get free subway rides. Today, four teens picked up where they left off.

article thumbnail

Cryptohack Roundup: Zero-Day Bugs in 15 Crypto Wallets

Data Breach Today

Also: Curve Finance Recovers 73% of Stolen $73 Million In this week's roundup of digital assets-related cybersecurity incidents, Fireblocks found bugs in 15 crypto wallets, Curve Finance recouped most stolen funds, ethereum saw a high flow of illicit funds, the NFT faded more, the U.K. posted crypto crimes jobs and South Korea arrested Bitsonic's CEO.

article thumbnail

Navigating Cybersecurity's Seas: Environmental Regulations, OT & the Maritime Industry's New Challenges

Dark Reading

Stringent efficiency measures in new environmental regulations create an unintended consequence for the shipping industry: increased cybersecurity risks in operational technology systems.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Count of Organizations Affected by MOVEit Attacks Hits 621

Data Breach Today

Breach Notifications Say Over 40 Million Individuals' Personal Information Exposed At least 621organizations have now confirmed that they were affected by the zero-day attack on MOVEit file-sharing servers that began in late May, collectively affecting 40 million individuals, report cybersecurity researchers who've been tracking the impact of Clop's data-theft campaign.

article thumbnail

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet

Schneier on Security

Cryptographic flaws still matter. Here’s a flaw in the random-number generator used to create private keys. The seed has only 32 bits of entropy. Seems like this flaw is being exploited in the wild.

78
article thumbnail

Breach Roundup: SEC Fines 11 Orgs for Record-Keeping Failure

Data Breach Today

Also, North Korean Hackers Breached Russian Missile Maker This week, Wall Street fined firms for using WhatsApp, NK hackers breached a Russian missile maker, Ivanti backtracked, ransomware attacks cost manufacturers $46B, a cyberattack shut down Gemini North Observatory, ad fraud targeted Android users and healthcare workers' personal info was breached.

article thumbnail

NSA: Codebreaker Challenge Helps Drive Cybersecurity Education

Dark Reading

The US National Security Agency aims to attract students to cybersecurity in general and its own open positions in particular: 3,000 new jobs this year.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Researchers Uncover 'Inception' Flaw in AMD CPUs

Data Breach Today

Vulnerability Allows Manipulation of CPU to Leak Data Security researchers uncovered a vulnerability in AMD chips that could allow hackers to trick a computer system into leaking data from its kernel. They named the flaw after the 2010 movie "Inception," since both the hacking technique and the film's plot involve planting false ideas into memory.

Security 230
article thumbnail

Black Hat: "Five cyber phases of Russia's hybrid war"

KnowBe4

The Cyberwire reported: "Victor Zhora, deputy chairman and chief digital transformation officer at Ukraine's State Service of Special Communication and Information Protection (SSSCIP) --effectively Kyiv's cybersecurity lead-- said at Black Hat that Russian cyber ops would continue long after the end of kinetic combat.

article thumbnail

Proof of Concept: Managing Software Supply Chain Woes

Data Breach Today

Also: Lessons Learned From the MOVEit Breaches; Tools for Managing SBOMs In the latest "Proof of Concept," Mike Baker, VP/IT CISO at DXC Technology and a CyberEdBoard member, and Chris Hughes, co-founder and CISO at Aquia, join ISMG editors to explore the state of the software supply chain, MOVEit breaches and the role of SBOMs and transparency in software development.

IT 221
article thumbnail

'MoustachedBouncer' APT Spies on Embassies, Likely via ISPs

Dark Reading

Diplomats who didn't use VPNs may have lost sensitive state information to a Belarusian government-aligned threat actor, which wields the "Disco" and "Nightclub" malware.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

AI's Role in Cybersecurity: Black Hat USA 2023 Reveals How Large Language Models Are Shaping the Future of Phishing Attacks and Defense

KnowBe4

At Black Hat USA 2023, a session led by a team of security researchers, including Fredrik Heiding, Bruce Schneier, Arun Vishwanath, and Jeremy Bernstein, unveiled an intriguing experiment. They tested large language models (LLMs) to see how they performed in both writing convincing phishing emails and detecting them. This is the PDF technical paper.

article thumbnail

EvilProxy Cyberattack Flood Targets Execs via Microsoft 365

Dark Reading

A campaign sent 120,000 phishing emails in three months, circumventing MFA to compromise cloud accounts of high-level executives at global organizations

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. These feeds are often in a standard format like STIX/TAXII so they can be integrated with EDR , SIEM , firewalls , threat intelligence platforms , and other network security tools , offering an additional source of real-time or near-real-time threat information to monitor for indicator

article thumbnail

The Hard Realities of Setting AI Risk Policy

Dark Reading

Time to get real about what it takes to set and enforce cybersecurity and resilience standards for AI risk management in the enterprise.

Risk 84
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Leaked Yandex Code Breaks Open the Creepy Black Box of Online Advertising

WIRED Threat Level

As the international tech giant moves toward Russian ownership, the leak raises concerns about the volume of data it has on its users.

IT 77
article thumbnail

Dell Credentials Bug Opens VMWare Environments to Takeover

Dark Reading

Decoding private keys from even one Dell customer could give attackers control over VMWare environments across all organizations running the same programs.

77
article thumbnail

Canon warns printer users to manually wipe Wi-Fi settings before discarding via ARS Technica

IG Guru

Check out the article here. The post Canon warns printer users to manually wipe Wi-Fi settings before discarding via ARS Technica first appeared on IG GURU.

Risk 67