Wed.Aug 23, 2023

article thumbnail

Jury Finds 2 Teenagers Perpetrated Lapsus$ Group Hacks

Data Breach Today

Rockstar, Uber, Okta, Microsoft and Other Big-Name Players Fell to Group's Attacks A British jury found that two teenagers had been members of the Lapsus$ hacking group that attacked Uber, Okta, Rockstar and other organizations. Lapsus$ earned notoriety for stealing data via low-complexity attacks and holding it to ransom, taunting victims and leaking stolen data.

IT 245
article thumbnail

How we used generative AI to run a generative AI hackathon

Collibra

As the data intelligence company, we’ve long anticipated broad adoption of AI, and Collibrians with data science and machine learning expertise have been working diligently on ways to apply AI/ML. Disruptive technologies such as ChatGPT , Bard , and other generative AI technologies suddenly made AI accessible to everyone, regardless of their level of data science expertise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MOVEit Health Data Breach Tally Keeps Growing

Data Breach Today

More Hacks Compromising Protected Health Info Being Reported to Regulators The tally of entities notifying federal regulators about mega health data breaches involving Clop cybercrime group hacks on Progress Software's MOVEit file transfer application keeps growing, and millions of additional individuals have been affected.

article thumbnail

DoJ charged Tornado Cash founders with laundering more than $1 billion

Security Affairs

The U.S. DoJ charged two men with operating the Tornado Cash service and laundering more than $1 Billion in criminal proceeds. The U.S. Justice Department charged two Tornado Cash founders ROMAN STORM and ROMAN SEMENOV have been charged with one count of conspiracy to commit money laundering and one count of conspiracy to violate the International Economic Emergency Powers Act.

IT 90
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Threat Actor Targets Hong Kong With Korplug Backdoor

Data Breach Today

Previously Unknown APT Uses Supply Chain Hack to Reach Victims A previously unknown threat group orchestrated a supply chain attack using a Chinese encryption app to target victims mostly located in Hong Kong. Korplug, the backdoor incorporated into the encryption app, "is known to be used by multiple APT groups," Symantec says.

More Trending

article thumbnail

US FBI Urges Action on Barracuda ESG Hacking

Data Breach Today

Chinese Hackers Adapt to Countermeaures The U.S. FBI urged the removal of email security appliances made by Barracuda Networks in a Wednesday flash alert, injecting fresh urgency in a push to stymie what's been called the broadest Chinese cyber spying campaign in years. Mandiant linked the hack to Beijing with "high confidence.

Security 240
article thumbnail

Carderbee APT targets Hong Kong orgs via supply chain attacks

Security Affairs

A previously unknown APT group, tracked as Carderbee, was behind a supply chain attack against Hong Kong organizations. Symantec Threat Hunter Team reported that a previously unknown APT group, tracked as Carderbee, used a malware-laced version of the legitimate Cobra DocGuard software to carry out a supply chain attack aimed at organizations in Hong Kong.

article thumbnail

Speed Demons: Ransomware Attackers' Dwell Time Shrinks

Data Breach Today

Seeking Every Advantage, Most Ransomware Groups Attack Outside of Business Hours Ransomware-wielding hackers are moving faster than ever to pull the trigger on malicious encryption - but they could be bumping up against the limits of how fast they can go, say security researchers at Sophos. Better endpoint detection may be spurring ransomware hackers into acting faster.

article thumbnail

Spear Phishing Prevention: 10 Ways to Protect Your Organization

eSecurity Planet

Spear phishing is a more targeted and effective phishing technique that attempts to exploit specific individuals or groups within an organization. While phishing uses a broader range of tactics, such as mass emailing to random recipients, spear phishing is often well-researched and tailored to high-value targets. A typical spear phishing attack follows a familiar pattern of emails with attachments.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Social Engineering Is the Number One Cybersecurity Problem by Far

KnowBe4

The number one way that hackers and malware compromise people, devices, and networks is social engineering. No one argues that anymore, but it was not always known or discussed that way. Even though social engineering has been the number one way hackers and malware exploit people and devices since the beginning of network computers, it was not generally known or discussed as such until just five or 10 years ago.

article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

Imagine that we’ve all—all of us, all of society—landed on some alien planet, and we have to form a government: clean slate. We don’t have any legacy systems from the US or any other country. We don’t have any special or unique interests to perturb our thinking. How would we govern ourselves? It’s unlikely that we would use the systems we have today.

article thumbnail

Deceptive Links, Brand Impersonation, and Identity Deception Top the List of Phishing Attack Tactics

KnowBe4

As phishing attacks continue to dominate as an initial attack vector, new data shows that attackers maintain the use of tried-and-true techniques as the means to successful attacks.

article thumbnail

FBI Warns of Cryptocurrency Heists by North Korea's Lazarus Group

Dark Reading

The most recent stolen bitcoin comes just after three major operations occurred in June, with millions stolen in each heist.

86
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware Attacks Rise 69% and 1500 Organizations Feel the Hurt

KnowBe4

A new report from Rapid7 has found that the number of ransomware attacks increased by 69% in the first half of 2023. Rapid7 incident response data found that at least 1500 organizations were attacked by ransomware during this period.

article thumbnail

How to Talk to Your Kids About Social Media and Mental Health

WIRED Threat Level

Here’s what the science really says about teens and screens—and how to start the conversation with young people of any age.

article thumbnail

Data Breaches Involving Social Engineering Attacks Take Longer to Identify and Contain

KnowBe4

Continuing coverage of IBM’s recently-released Cost of a Data Breach report, we focus on the impact attacks involving social engineering have on data breach costs.

article thumbnail

Threat Actor Exploits Zero-Day in WinRAR to Target Crypto Accounts

Dark Reading

Attacks targeting the now-patched bug have been going on since at least April 2023, security vendor says.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Scammers Impersonate the Australian Tax Office

KnowBe4

The Australian Taxation Office (ATO) has warned of an increase in SMS and email phishing attacks targeting taxpayers, News.com.au reports. The scams attempt to steal credentials or personal information in order to commit identity theft.

article thumbnail

eSentire Labs Open Sources Project to Monitor LLMs

Dark Reading

The eSentire LLM Gateway provides monitoring and governance of ChatGPT and other Large Language Models being used in the organization.

article thumbnail

Phishing Tops the List as the Most Costly Initial Attack Vector in Data Breaches

KnowBe4

After you come to grips with the massive average cost of a data breach to an enterprise organization measured in the millions, it’s time to look at the factors that increase – and lower – that cost.

article thumbnail

Ransomware Reaches New Heights

Dark Reading

It's not going anywhere: Easy-to-exploit bugs like MOVEit, leaks of stolen data, and rapid-fire escalation are keeping ransomware attacks as painful as ever.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Phishing Campaigns Targeting Microsoft Login Credentials Jump an Unprecedented 6100%

KnowBe4

Monitoring of traffic to phishing pages hosted on the free hosting service Cloudflare R2 show an unheard of spike of 6100%, many going undetected by many security solutions due to the evasive techniques used.

article thumbnail

5 Early Warning Indicators That Are Key to Protecting National Secrets

Dark Reading

The Defense Department must modernize user activity monitoring by prioritizing data that can be used early to proactively mitigate insider risk.

Risk 71
article thumbnail

LinkedIn Deception: How a Chinese Spy Tricked Thousands of UK Officials

KnowBe4

In last few years, cyber espionage has taken a new form. A recent investigation by The Times has unveiled a Chinese intelligence officer's extensive use of LinkedIn to target UK officials. Operating under the alias "Robin Zhang," this spy has been luring thousands of officials, scientists, and academics to hand over state secrets and sensitive technology information.

66
article thumbnail

Name That Toon: Swift as an Arrow

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

77
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to Search for Numbers and Special Characters in Axcelerate 

OpenText Information Management

When I was a litigation paralegal, it was always a hassle trying to search records within an eDiscovery database for terms that included numbers and symbols – an issue that came up quite frequently. Searching for currency values, product numbers, serial numbers, patent numbers, and so on, are common. How does your eDiscovery software handle … The post How to Search for Numbers and Special Characters in Axcelerate appeared first on OpenText Blogs.

article thumbnail

Attackers Dangle AI-Based Facebook Ad Lures to Hijack Business Accounts

Dark Reading

The offending ads and pages leveraged interest in AI to spread a malicious credential-stealing browser extension.

71
article thumbnail

What the old adage “time is money” means to legal review teams 

OpenText Information Management

There are a number of ways to understand the “cost” of something, and most definitions of the term begin with money as the chief factor. For example: Cost is “the amount is money needed to buy, do, or make something.” But business leaders know that money is only one factor in calculating the total cost … The post What the old adage “time is money” means to legal review teams appeared first on OpenText Blogs.