Fri.Dec 22, 2023

article thumbnail

Millions of Patients Affected in Double-Extortion Attack

Data Breach Today

Hackers Crippled Systems, Stole Patient Data From ESO Solutions Hackers carried out a double-extortion ransomware attack on medical software company ESO Solutions, exposing personal details and healthcare information of 2.7 million U.S. patients and encrypting some of the company's systems. Double-extortion attacks also exfiltrate data.

article thumbnail

Akira ransomware gang claims the theft of sensitive data from Nissan Australia

Security Affairs

The Akira ransomware group announced it had breached the network of Nissan Australia, the Australian branch of the car maker giant. The Akira ransomware gang claimed to have breached Nissan Australia and to have stolen around 100GB of files from the carmaker giant. The company refused to pay the ransom and the ransomware gang threatened to leak the alleged stolen documents, including project data, clients’ and partners’ info, and NDAs. “We’ve obtained 100 GB of data of N

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stolen Booking.com Credentials Fuel Social Engineering Scams

Data Breach Today

Attackers Masquerade as Hotels to Steal Clients' Payment Card Data, Experts Warn Scammers are stealing hotels' log-in credentials for online travel site Booking.com and targeting their customers, experts warn. In many cases, attackers use Booking's own messaging system to contact customers and request their payment card data, they say.

293
293
article thumbnail

The Third-Party Threat for Financial Organisations

IT Governance

DORA’s supply chain security requirements IT Governance’s research for November 2023 found that 48% of the month’s incidents originated from the supply chain (i.e. were third-party attacks). For Europe , this number rises to 61%. Admittedly, it only takes a comparatively small number of supply chain attacks to skew the number of incidents. It’s in their nature for one attack to compromise potentially hundreds or even thousands of organisations.

Risk 114
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Teen Uber Hacker Sent to Indefinite Hospital Detention

Data Breach Today

Arion Kurtaj Was a Member of Lapsus$ Group That Also Hacked Nvidia and Revolut British prosecutors have sentenced a teenager behind high-profile hacks while he was part of the now-inactive Lapsus$ hacking group. Arion Kurtaj, from Oxford, will remain in medical care after doctors declared he was unfit to stand for trial owing to severe autism.

293
293

More Trending

article thumbnail

Report Warns of 'Catastrophic' Medical Device Security Risks

Data Breach Today

Majority of Connected Medical Devices Contain Critical Vulnerabilities, FBI Says A new GAO report says federal agencies fail to provide health are providers and patients with enough resources and information to address critical vulnerabilities in a majority of medical devices in the U.S. that can result in "potential catastrophic impact to hospital operations and patient care.

Risk 285
article thumbnail

Member of Lapsus$ gang sentenced to an indefinite hospital order

Security Affairs

A member of the Lapsus$ cyber extortion group, Arion Kurtaj, has been sentenced to an indefinite hospital order. The UK Southwark Crown Court has sentenced Arion Kurtaj , a prominent member of the international cyber extortion gang Lapsus$ , to an indefinite hospital order. Over the years, the Lapsus$ gang compromised many high-profile companies such as NVIDIA , Samsung , Ubisoft , Mercado Libre, Vodafone , Microsoft , Okta , and Globant.

Access 110
article thumbnail

Iranian Hackers Peach Sandstorm Are Delivering New Backdoor

Data Breach Today

FalseFont Backdoor Enables Attackers to Remotely Connect to a Compromised System Microsoft said Iranian state hackers are using a newly developed backdoor to target organizations in the American defense industrial base. The Iranian state threat actor that Microsoft tracks as Peach Sandstorm employed a custom backdoor named FalseFont.

281
281
article thumbnail

Data Exfiltration Using Indirect Prompt Injection

Schneier on Security

Interesting attack on a LLM: In Writer, users can enter a ChatGPT-like session to edit or create their documents. In this chat session, the LLM can retrieve information from sources on the web to assist users in creation of their documents. We show that attackers can prepare websites that, when a user adds them as a source, manipulate the LLM into sending private information to the attacker or perform other malicious activities.

106
106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SC Mag: "Attacks on critical infrastructure are harbingers of war: Are we prepared?"

KnowBe4

I just found a great post by Morgan Wright, chief security advisor of SentinelOne. Here is a quick summary and a link to the full article is at the bottom. The recent attacks on water authorities like Aliquippa and St. Johns River have cast a spotlight on the vulnerability of critical infrastructure.

article thumbnail

Congress Sure Made a Lot of Noise About Kids’ Privacy in 2023—and Not Much Else

WIRED Threat Level

Members of the US Congress touted improvements to children’s privacy protections as an urgent priority. So why didn’t they do anything about it?

Privacy 87
article thumbnail

FTC Issues Notice of Proposed Rulemaking to Update COPPA Rule

Hunton Privacy

On December 20, 2023, the FTC issued a Notice of Proposed Rulemaking (“Notice”), which would bring long-anticipated changes to the children’s online data privacy regime at the federal level in the U.S. The Notice sets forth several important proposals aimed at strengthening the Children’s Online Privacy Protection Act Rule (“COPPA Rule”). The COPPA Rule has not been updated since 2012.

Privacy 72
article thumbnail

Facebook Marketplace Is Being Ruined by Zelle Scammers

WIRED Threat Level

I tried to sell a futon on Facebook Marketplace and nearly all I got were scammers.

Security 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Eat Sleep Drink Dream – Flipping Work and Life For A Year

John Battelle's Searchblog

I will not forsake you. But I might not call as often as I used to. I don’t often write about personal things here, but the two most-read posts of this past year were Mastering The Rudiments , about my journey with learning the drums, and Unretirement , a personal reflection on my career. I wrote both of those back in May – a shoulder month between seasons.

IT 52
article thumbnail

Ben Rothke’s Review of A Hacker’s Mind

Schneier on Security

Ben Rothke chose A Hacker’s Mind as “the best information security book of 2023.

article thumbnail

ICRM Reminders

IG Guru

CMP Guidance The post ICRM Reminders first appeared on IG GURU.

article thumbnail

Friday Squid Blogging: Squid Parts into Fertilizer

Schneier on Security

It’s squid parts from college dissections , so it’s not a volume operation. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.