Tue.Jul 18, 2023

article thumbnail

Spanish Police End a Decade on the Run for Ukrainian Hacker

Data Breach Today

Police Also Apprehend a Smishing Fraudster and Break Up a Phishing Nexus Spanish law enforcement officers scored several recent wins against cybercriminals this month. Police nabbed a Ukrainian hacker on the run for 10 years, arrested a fraudster known to have run a smishing campaign that amassed 1.2 million euros, and broke up a phishing nexus - all in two weeks.

Phishing 246
article thumbnail

LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack

Krebs on Security

[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called Defiant Tech Inc. pleaded guilty to running LeakedSource[.]com , a service that sold access to billions of passwords and other data exposed in countless data breaches.

Passwords 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Alert: Exploit Chain Actively Hits ColdFusion

Data Breach Today

Attackers Drop Web Shell; Flaw Is Not Fixed, But Latest Patch Offers Protection Warning: Hackers are actively exploiting a flaw in Adobe's ColdFusion rapid web application development platform to execute malicious code. While Adobe attempted to patch the flaw, researchers say attackers appear to have found a way to bypass it by chaining together multiple flaws.

Security 246
article thumbnail

Introducing: Ruminant AI (You Heard it Here First)

Weissman's World

It is my pleasure and honor to introduce to you a new buzzword. It’s “Ruminant AI,” which I invented just last week and named after animals like cows and sheep that chew on previously ingested material (the cud). Here’s why: AI engines like ChatGPT ingest information from as many sources as they can be provided… Read More » Introducing: Ruminant AI (You Heard it Here First) The post Introducing: Ruminant AI (You Heard it Here First) appeared first on Holly Group.

IT 156
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Netcraft Snags $100M, Names Former DigiCert Executive as CEO

Data Breach Today

Ryan Woodley Doubles Down on US Growth, Real-Time Attack Identification, Takedown Netcraft landed a DigiCert and Progressive Leasing executive as its CEO to expand the company's footprint in the U.S. and better identify cyberattacks in real time. The firm tapped Ryan Woodley to capitalize on the $100 million raised from Spectrum Equity by bringing more scalability via automation.

IT 243

More Trending

article thumbnail

Understanding Your Adversary

Data Breach Today

What Health System Leaders Need to Know About Cyberattackers and Risk Drivers Resilience, not just compliance, is becoming healthcare's primary goal in managing cyber risk. Moving to a more resilient state requires continuous cyber risk management, which requires knowing how an adversary thinks and attacks to ensure that the appropriate safeguards are in place.

article thumbnail

News Alert: HostingAdvice poll finds one in three Americans hacked upon visiting sketchy websites

The Last Watchdog

Gainesville, Fla., July 18, 2022 – Around 30,000 websites get hacked every day , with the majority of those cyberattacks due to human error. This has projected costs associated with cybercrimes to hit the tens of trillions by 2025, highlighting the vital need for web hosts to implement staunch security. A new study by HostingAdvice, the premier authority on web hosting, found that 32% of Americans say they’ve gotten hacked from visiting a sketchy website and of those, 53% got a computer virus

Phishing 100
article thumbnail

Utility Experts Highlight Chinese Threat to US Electric Grid

Data Breach Today

Compromised Equipment, AI Leave US Electric Grid Susceptible to Chinese Attacks China poses a growing threat to U.S. electric infrastructure and could potentially disrupt the power grid, gas and pipeline systems by exploiting compromised equipment and harnessing emerging artificial intelligence technologies for cyberattacks, experts told Congress on Tuesday.

article thumbnail

G2 Summer 2023 Report

Jamf

The phrase “lightning never strikes the same place twice” is a commonly held belief that holds little grounding in science. In fact, lightning can and does strike the same place multiple times and nowhere is that as evident as Jamf solutions once again scoring top marks in G2’s Summer 2023 report.

98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Bitcoin Is No Longer Cybercriminals' Currency of Choice

Data Breach Today

Use of the Token for Cybercrime Fell From 97% to 19% Within 7 Years Cryptocurrency hackers are shifting their focus from bitcoin to other tokens and newer blockchain services such as cross-chain bridges for illicit activity. Why is the oldest crypto token so unappealing to hackers these days, and what do other options offer? Ari Redbord of TRM Labs explained.

article thumbnail

Embracing responsible AI in the move from automation to creation

CGI

As a data scientist and AI practitioner, I am excited to see so many positive AI use cases happening and being leveraged to bring quick information and insights to experts and business people – the potential of the rapidly evolving AI technology is truly limitless.

98
article thumbnail

China Raises Cybersecurity Barriers to Tech Investments

Data Breach Today

Beijing Solidifies Control Over Cyberspace Despite Weakening Investor Sentiment President Xi Jinping directed state agencies to strengthen the government’s control over the internet and information technology sector, potentially discouraging investment in the country. Among the obstacles is a new Counter-Espionage Law focused on investigating foreign companies.

article thumbnail

FIN8 Group spotted delivering the BlackCat Ransomware

Security Affairs

The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group FIN8 (aka Syssphinx) was spotted using a revamped version of a backdoor tracked as Sardonic to deliver the BlackCat ransomware (aka Noberus ransomware). Sardonic is a sophisticated backdoor that supports a wide range of features that was designed to evade detection.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

E-commerce and EDI: What’s the difference?

OpenText Information Management

There are lots of different terms used to describe B2B process automation. These terms can be confusing, partly because they are so inter-related. This article will go into detail on these terms to dispel some of the confusion and explain common terms used within B2B process automation, including the differences between Ecommerce and EDI. First, … The post E-commerce and EDI: What’s the difference?

B2B 95
article thumbnail

Virustotal data leak exposed data of some registered customers, including intelligence members

Security Affairs

The online malware scanning service VirusTotal leaked data associated with some registered customers, German newspapers reported. German newspapers Der Spiegel and Der Standard reported that the online malware scanning service VirusTotal leaked data associated with some registered customers. At the end of June, a small file of 313 kilobytes containing a list of 5,600 names was exposed online.

article thumbnail

Evaluating your data catalog’s success

Collibra

If you’ve ever ventured on a road trip without a GPS or a good old-fashioned map, you probably know how essential they are to reaching your destination. Like navigating unfamiliar terrain, managing a chaotic data landscape requires a guide. At Collibra, we know that the best guide is a data catalog. But how do you know if your data catalog is doing its job well?

article thumbnail

FIA World Endurance Championship driver passports leaked

Security Affairs

Le Mans Endurance Management, operating the FIA World Endurance Championship’s website, exposed the data of hundreds of drivers by leaking their IDs and drivers’ licenses, the Cybernews research team has discovered. On June 16th, our researchers came across two misconfigured, meaning publicly exposed, Google Cloud Storage buckets. Both combined, they contained over 1.1 million files.

GDPR 95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fourth Amendment Is Not for Sale Act Goes Back to Congress

WIRED Threat Level

A bill to prevent cops and spies from buying Americans’ data instead of getting a warrant has a fighting chance in the US Congress as lawmakers team up against surveillance overreach.

Sales 85
article thumbnail

Hacking campaign targets sites using WordPress WooCommerce Payments Plugin

Security Affairs

Threat actors are actively exploiting a critical flaw, tracked as CVE-2023-28121, in the WooCommerce Payments WordPress plugin. Threat actors are actively exploiting a recently disclosed critical vulnerability, tracked as CVE-2023-28121 (CVSS score: 9.8), in the WooCommerce Payments WordPress plugin. The flaw is an authentication bypass issue that can be exploited by an unauthenticated attacker to impersonate arbitrary users, including an administrator, potentially leading to the site takeover.

article thumbnail

Linux Ransomware Poses Significant Threat to Critical Infrastructure

Dark Reading

Organizations running Linux distributions need to prepare to defend their systems against ransomware attacks. Steps to ensure resiliency and basics such as access control reduce major disruptions.

article thumbnail

JumpCloud revealed it was hit by a sophisticated attack by a nation-state actor

Security Affairs

Software firm JumpCloud announced it was the victim of a sophisticated cyber attack carried out by a nation-state actor. JumpCloud is a cloud-based directory service platform designed to manage user identities, devices, and applications in a seamless and secure manner. It allows IT administrators to centralize and simplify their identity and access management tasks across various systems and applications.

IT 93
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Disabling Self-Driving Cars with a Traffic Cone

Schneier on Security

You can disable a self-driving car by putting a traffic cone on its hood: The group got the idea for the conings by chance. The person claims a few of them walking together one night saw a cone on the hood of an AV, which appeared disabled. They weren’t sure at the time which came first; perhaps someone had placed the cone on the AV’s hood to signify it was disabled rather than the other way around.

IT 80
article thumbnail

Microsoft Unsure How Chinese Hackers Stole MSA Key to Breach U.S. Agencies

eSecurity Planet

Microsoft has hardened security following a Chinese hack of U.S. government agency email accounts, but some details remain a mystery. Even as the threat has passed, Microsoft officials are still analyzing how a Chinese threat group was able to access U.S. government accounts using a stolen inactive Microsoft account (MSA) consumer signing key. Chinese hacker group Storm-0558 breached an undisclosed number of email accounts belonging to 25 organizations, including U.S. government agencies, over t

article thumbnail

Microsoft Takes Security Copilot AI Assistant to the Next Level

Dark Reading

The company's AI for security operations centers continues to add integrations, as the industry looks to large language models for progress.

article thumbnail

How to improve employee productivity with BYOD

Jamf

Allowing staff to use the personal devices they love for work has a lot of upsides. Primary among them: well-connected employees are more productive employees.

75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Sogu, SnowyDrive Malware Spreads, USB-Based Cyberattacks Surge

Dark Reading

Two separate threat actors are using poisoned USB drives to distribute malware in cyber-espionage campaigns targeting organizations across different sectors and geographies.

73
article thumbnail

Argentina Personal Data Protection Bill Sent to Congress

Hunton Privacy

Pablo A. Palazzi from Allende & Brea in Argentina reports that on June 30, 2023, the Argentine Executive Branch sent the new proposed Personal Data Protection Bill (the “Bill”) to the National Congress for consideration. The Bill was drafted by the Argentine Data Protection Authority ( Agencia de Acceso a la Información Pública , or “AAIP”) and seeks to amend the current Personal Data Protection Act (Law No. 25,326 of 2000).

article thumbnail

Attackers Pummel Millions of Websites via Critical WooCommerce Payments Flaw

Dark Reading

A barrage of targeted attacks against vulnerable installations peaked at 1.3 million against 157,000 sites over the weekend, aimed at unauthenticated code execution.

74