Mon.Aug 21, 2023

article thumbnail

The Hidden Benefits of Negotiating With Ransomware Attackers

Data Breach Today

GuidePoint Security's Mark Lance on Ways to Delay and Gather Info on Cybercriminals Conventional wisdom recommends to never negotiate with ransomware actors. They can't be trusted. But Mark Lance at GuidePoint Security recently made the case that organizations can gather important information through negotiations, slow down the process and even lower the ransom demand.

article thumbnail

GUEST ESSAY: Lessons to be learned from the waves of BofA phone number spoofing scams

The Last Watchdog

Phone number spoofing involves manipulating caller ID displays to mimic legitimate phone numbers, giving scammers a deceptive veil of authenticity. Related: The rise of ‘SMS toll fraud’ The Bank of America scam serves as a prime example of how criminals exploit this technique. These scammers impersonate Bank of America representatives, using the genuine bank’s phone number (+18004321000) to gain trust and deceive their targets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Overcoming the Inertia of Assessing and Securing APIs

Data Breach Today

Traceable AI CSO Richard Bird on Best Practices for Fighting API-Based Attacks Large enterprises may have hundreds or thousands of APIs. Concerns over API vulnerabilities have been around for years, but most organizations outside of highly regulated industries such as banking have not taken the steps to understand the threats they face, said Richard Bird, CSO at Traceable.

Security 244
article thumbnail

News Alert: airSlate partners with Forthright to launch automated business-efficiency, workflow tool

The Last Watchdog

Boston, Mass, Aug. 22, 2023 – airSlate , a leader in document workflow automation solutions, today announced the launch of QuickStart in collaboration with partner Forthright Technology Providers , a leading provider of user-centric IT solutions and services. The comprehensive package, available at a fixed price, combines airSlate’s automation tools, including customizable workflows and built-in eSignatures, with Forthright’s professional services, enabling organizations to streamline business

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Zero Authority: Future of Security and Business Enablement

Data Breach Today

Jake Seid of Ballistic Ventures on How Zero Authority Revolutionizes Security In the ever-evolving landscape of cybersecurity, zero authority is giving defenders a new perspective on security and business enablement, said Jake Seid, general partner at Ballistic Ventures. "Zero authority is an architectural change that affects every area of security," he said.

Security 244

More Trending

article thumbnail

US CISA Urges Security by Design for AI

Data Breach Today

Part of Agency's Campaign to Align Design, Development With Security From the Start The U.S federal government is advocating for artificial intelligence developers to embrace security as a core requirement, warning that machine learning code is particularly difficult and expensive to fix after deployment. CISA has an ongoing campaign to promote security by design.

article thumbnail

BlackCat ransomware group claims the hack of Seiko network

Security Affairs

The BlackCat/ALPHV ransomware group claims to have hacked the Japanese maker of watches Seiko and added the company to its data leak site. On August 10, 2023, the Japanese maker of watches Seiko disclosed a data breach following a cyber attack. “Seiko Group Corporation (hereinafter referred to as “the Company” or “we”) has confirmed that on July 28th of this year, the Company suffered a possible data breach.

article thumbnail

UK Competition Regulator Clears Broadcom, VMware Merger

Data Breach Today

Broadcom Anticipates It Can Close Deal Before Oct. 30 The British competition regulator cleared Broadcom's $61 billion proposed acquisition of cloud and virtualization giant VMware, a decision the company says removes one of the last major regulatory obstacles to putting Symantec and VMware's security practice under the same roof.

Cloud 241
article thumbnail

Spoofing an Apple device and tricking users into sharing sensitive data

Security Affairs

White hat hackers at the recent hacking conference Def Con demonstrated how to spoof an Apple device and trick users into sharing their sensitive data. At the recent Def Con hacking conference, white hat hackers demonstrated how to spoof an Apple device and trick users into sharing their sensitive data. As reported by Techcrunch, attendees at the conference using iPhones started observing pop-up messages prompting them to connect their Apple ID or share a password with a nearby Apple TV.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Managed File Transfer Products Are a Hacker's Paradise

Data Breach Today

John Dwyer of IBM Security X-Force on Using Predictive Threat Intelligence This year's massive exploitation of managed file transfer products such as Fortra's GoAnywhere and Progress Software's MOVEit proves that MFTs are a hacker's paradise. Research by John Dwyer of IBM Security X-Force shows why and also reveals a path toward protecting MFTs in the future.

Security 241
article thumbnail

Ivanti fixed a new critical Sentry API authentication bypass flaw

Security Affairs

Ivanti warned customers of a new critical Sentry API authentication bypass vulnerability tracked as CVE-2023-38035. The software company Ivanti released urgent security patches to address a critical-severity vulnerability, tracked as CVE-2023-38035 (CVSS score 9.8), in the Ivanti Sentry (formerly MobileIron Sentry) product. The vulnerability could be exploited to access sensitive API data and configurations, run system commands, or write files onto the system.

article thumbnail

What Is Secure Remote Access?

eSecurity Planet

Secure remote access protects remote business communications that are otherwise susceptible to network and remote protocol exploits. Remote access plays an important role for businesses with remote workforces, geographically disparate branch offices, and limited technical resources. Because it creates connections between a client device and a host device, remote access must be secured.

Access 86
article thumbnail

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

Security Affairs

HiatusRAT malware operators resurfaced with a new wave of attacks targeting Taiwan-based organizations and a U.S. military procurement system. In March 2023, Lumen Black Lotus Labs researchers uncovered a sophisticated campaign called “ HiatusRAT ” that infected over 100 edge networking devices globally. Threat actors leveraged edge routers, or “living on the edge” access, to passively collect traffic and set up a covert C2 infrastructure.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Generative AI Is Scraping Your Data. So, Now What?

Dark Reading

AI innovation is moving faster than our laws and regulations, making it hard to decide whether Web or content scraping activity is good or bad, and what (if anything) you should do about it.

IT 85
article thumbnail

Weekly Vulnerability Recap – August 21, 2023 – When ACE Equals Bad

eSecurity Planet

Normally, ‘ace’ implies something great, such as to ace an exam or to draw an ace in Blackjack. Unfortunately, arbitrary code execution (ACE) means that an attacker can use a vulnerability to execute any code they want on a device. In the vulnerabilities covered this week, attackers used an ACE vulnerability to install webshells and similar backdoors on vulnerable systems.

article thumbnail

DEF CON's AI Village Pits Hackers Against LLMs to Find Flaws

Dark Reading

Touted as the largest red teaming exercise against LLMs in history, the AI Village attracted more than 2,000 hackers and throngs of media.

92
article thumbnail

White House Announces AI Cybersecurity Challenge

Schneier on Security

At Black Hat last week, the White House announced an AI Cyber Challenge. Gizmodo reports : The new AI cyber challenge (which is being abbreviated “AIxCC”) will have a number of different phases. Interested would-be competitors can now submit their proposals to the Small Business Innovation Research program for evaluation and, eventually, selected teams will participate in a 2024 “qualifying event.” During that event, the top 20 teams will be invited to a semifinal competi

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Tesla Data Breach Investigation Reveals Inside Job

Dark Reading

The carmaker also reported it's taken legal action against the former employees involved in the data breach, which involved more than 75,000 names.

article thumbnail

5 recommendations to accelerate connected healthcare

CGI

Globally, healthcare systems face serious challenges. Costs and demands are rising, while capacity is declining as workforce burnout and stress take their toll. One way to avoid drastic responses that limit services or shift significant costs to patients is to increase efficiency and capacity through more responsive, connected digital systems, data and infrastructure.

Access 75
article thumbnail

Visibility Is Just Not Enough to Secure Operational Technology Systems

Dark Reading

Visibility is just the first step to secure your operational technology environment against today's threats. You need a proactive, defense-in-depth approach.

article thumbnail

How automation is driving more patient-centric healthcare

CGI

The potential of automation, AI and emerging technologies to transform the patient experience Whether it's a chatbot on a doctor's website or text updates on a medical insurance claim, emerging technologies like automation, artificial intelligence (AI) and machine learning are driving new solutions that are changing how we experience healthcare today.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Fed Warning: US Space Industry Subject To Foreign Spying, Disruptions

Dark Reading

The space industry must improve security as foreign intelligence entities seek to steal trade secrets and disrupt space-based infrastructure, US agencies caution.

article thumbnail

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales

Thales Cloud Protection & Licensing

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales madhav Tue, 08/22/2023 - 05:33 nTropy.io is a Thales Technology Partner with established PKI and IoT expertise providing both advisory and implementation services. This article explores how nTropy successfully designed a solution leveraging Thales Luna HSM to accelerate key injection material for wearable medical devices by 20x.

article thumbnail

[Eye-Opening] Increase of Phishing Attacks in Australia Should Alarm Organizations

KnowBe4

Phishing attacks are on the rise in Australia, the Australian Broadcasting Corporation ( ABC ) reports.

article thumbnail

Ivanti Issues Fix for Critical Vuln In Its Sentry Gateway Technology

Dark Reading

Security vendor will not say if attackers are already actively exploiting the flaw, as some reports have claimed.

IT 81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Most Popular Digital Abortion Clinics, Ranked by Data Privacy

WIRED Threat Level

Telehealth companies that provide abortion pills are surging in popularity. Which are as safe as they claim to be?

article thumbnail

Energy One Investigates Cyberattack

Dark Reading

Energy One is trying to determine the initial point of entry and whether personal information has been compromised.

78
article thumbnail

Jennie Gift appointed to VP of Member Services at i-SIGMA

IG Guru

Check out the podcast where Jennie discusses her appointment here. The post Jennie Gift appointed to VP of Member Services at i-SIGMA first appeared on IG GURU.

83