Fri.Sep 01, 2023

article thumbnail

Tech Companies on Precipice of UK Online Safety Bill

Data Breach Today

Bill 'Poses a serious threat' to end-to-end encryption, Apple Says U.S. tech companies are stepping up warnings to British lawmakers over a government proposal they say will fatally weaken security and privacy protections for users. The House of Lords is set to return the bill to the House of Commons after a third reading scheduled to begin Wednesday.

article thumbnail

Why is.US Being Used to Phish So Many of Us?

Krebs on Security

Domain names ending in “ US ” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because.US is overseen by the U.S. government, which is frequently the target of phishing domains ending in.US. Also,US domains are only supposed to be available to U.S. citizens and to those who can demonstrate that they have a physical presence in the United States.US is the “country code top-level doma

Phishing 219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Identity Security Special

Data Breach Today

Identity Security Expert Jeremy Grant on AI and Digital Identity Risks In the latest weekly update, Jeremy Grant of Venable joins three ISMG editors to discuss why the U.S. government is taking a back seat on digital identity issues, the risks of artificial intelligence, and takeaways from the U.S. Cyber Safety Review Board's recent report on cybercrime group Lapsus$.

article thumbnail

MSSQL Databases Under Fire From FreeWorld Ransomware

Dark Reading

The sophisticated attacks, tracked as DB#JAMMER, run shell commands to impair defenses and deploy tools to establish persistence on the host.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Experts Urge Immediate Juniper Firewall and Switch Patching

Data Breach Today

Attackers Actively Attempting to Chain Vulnerabilities for Remote Code Execution Security experts are warning organizations with Juniper Networks SRX firewalls and EX switches to update them immediately to patch multiple vulnerabilities attackers have been targeting to remotely execute code, and which may allow them to pivot to internal networks.

Security 283

More Trending

article thumbnail

'Earth Estries' APT Hackers Are Cyberespionage Pros

Data Breach Today

Trend Micro Calls the Group Well-Resourced and Sophisticated A cyberespionage campaign by a well-funded but lesser-known hacking group is using previously unknown backdoors to hack government agencies and tech companies. The group, dubbed Earth Estries by Trend Micro, appears well practiced in cA cyberespionage campaign by a well-funded but lesser-known hacking group is using previously unknown backdoors to hack government agencies and tech companies.

article thumbnail

Researchers released a free decryptor for the Key Group ransomware

Security Affairs

Researchers released a free decryptor for the Key Group ransomware that allows victims to recover their data without paying a ransom. Threat intelligence firm EclecticIQ released a free decryption tool for the Key Group ransomware (aka keygroup777) that allows victims to recover their data without paying a ransom. The Key Group ransomware gang has been active since at least January 2023.

article thumbnail

Threat Modeling Essentials for Generative AI in Healthcare

Data Breach Today

It's critical for healthcare sector entities considering - or already using - generative AI applications to create an extensive threat modeling infrastructure and understand all attack vectors, said Mervyn Chapman, principal consultant at consulting and managed services firm Ahead.

IT 270
article thumbnail

NYC Subway Disables Trip-History Feature Over Tap-and-Go Privacy Concerns

Dark Reading

The move by New York's Metropolitan Transit Authority (MTA) follows a report that showed how easy it is for someone to pull up another individual's seven-day ride history through the One Metro New York (OMNY) website.

Privacy 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK Cyber Agency Warns of Prompt Injection Attacks in AI

Data Breach Today

Hackers Can Deploy Prompt Injection Attacks to Gain Access to Confidential Data Threat actors are manipulating the technology behind large language model chatbots to access confidential information, generate offensive content and "trigger unintended consequences," warns the U.K. National Cyber Security Center. Prompt injection attacks are "extremely difficult" to mitigate.

Access 190
article thumbnail

Talos wars of customizations of the open-source info stealer SapphireStealer

Security Affairs

Cisco reported that multiple threat actors are customizing the SapphireStealer information stealer after the leak of its source code. Cisco Talos researchers reported that multiple threat actors have created their own version of the SapphireStealer after that the source code of the stealer was released on GitHub. SapphireStealer is an open-source information stealer written in.NET, which is available in multiple public malware repositories since its public release in December 2022.

article thumbnail

LIVE Webinar | What Not To Do: Avoiding GRC Red Flags for a Successful Business Case

Data Breach Today

forecasted spending of $47.

270
270
article thumbnail

Types of cyberthreats

IBM Big Data Hub

In the simplest sense, a cybersecurity threat, or cyberthreat, is an indication that a hacker or malicious actor is attempting to gain unauthorized access to a network for the purpose of launching a cyberattack. Cyberthreats can range from the obvious, such as an email from a foreign potentate offering a small fortune if you’ll just provide your bank account number, to the deviously stealthy, such as a line of malicious code that sneaks past cyberdefenses and lives on the network for month

Phishing 109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Adversary in the Middle Platform Circumvents MFA Protections “At Scale”

KnowBe4

As Phishing as a Service (PhaaS) kits continue to evolve, news like recent attacks using the Greatness toolkit demonstrate how easy it is for novice attackers to access accounts despite multi-factor authentication (MFA) being enabled.

Phishing 104
article thumbnail

Spyware Vendor Hacked

Schneier on Security

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several security vulnerabilities that allowed them to compromise WebDetetive’s servers and access its user databases. By exploiting other flaws in the spyware maker’s web dashboard—used by abusers to access the stolen phone data of their victims—the hackers said they enumerated and downloaded every dashboard record, including every

Access 103
article thumbnail

Cyberattacks Targeting Government Agencies and Institutions Increases in Q2 by 40%

KnowBe4

New data shows a massive uptick in attacks across all industries, but a particularly worrisome growth in interest in targeting the public sector – and the indicators of who’s responsible may surprise you.

article thumbnail

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

Dark Reading

The Security and Exchange Commission's Proposed Rule for Public Companies (PPRC) is ambiguous.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New “Early Warning” System in the U.K. Tips Off Ransomware Targets

KnowBe4

British Intelligence has come up with a potentially very effective means to disrupt ransomware attacks, but there seems to still be a few kinks in the system.

article thumbnail

US Government Denies Blocking Sales of AI Chips to Middle East

Dark Reading

Nvidia and AMD do face expanded export rules for their A100 and H100 artificial intelligence (AI) chips in the Middle East, but it's not yet clear why.

article thumbnail

Nearly One-Quarter of Financial-Themed Spam Emails are Phishing Attacks

KnowBe4

While spam tends to be dismissed as being more an annoyance, new research shows that there is a very real and ever-present threat in emails that are marked as “spam”.

article thumbnail

Key Group Ransomware Foiled by New Decryptor

Dark Reading

Researchers crack Key Group's ransomware encryption and release free tool for victim organizations to recover their data.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

You Asked and Here It Is! KnowBe4's New Content Manager Feature is Unveiled

KnowBe4

We heard you, and we're thrilled to tell you about the all-new Content Manager feature for KMSAT!

IT 92
article thumbnail

Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers

Dark Reading

The competition encourages automotive research and allows for contestants to take part in person or remotely.

103
103
article thumbnail

What Is Cloud Workload Protection? Ultimate Guide

eSecurity Planet

Cloud workload protection (CWP) is the process of monitoring and securing cloud workloads from threats, vulnerabilities, and unwanted access, and is typically accomplished via Cloud Workload Protection Platforms (CWPP). Cloud workloads are everything needed to run an application in the cloud, such as databases, containerized environments, and the application itself.

Cloud 64
article thumbnail

Will the AI Arms Race Lead to the Pollution of the Internet?

Dark Reading

Content creators want to protect their intellectual property from AI by poisoning data. Could this destroy the machine learning ecosystem?

102
102
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Accounts payable automation: What they didn’t tell you

OpenText Information Management

It is no secret that the advantages of accounts payable (AP) automation are widely acknowledged. In short, the concept is a compelling proposition. It allows organizations to eliminate the laborious and time-intensive tasks linked to the payables process. Just removing these manual responsibilities from the equation is a proposal anyone would jump at.

IT 57
article thumbnail

Navigate your path to scale with Spot by NetApp

Adapture

Unlock Kubernetes Day 2 Success with Spot by NetApp and Adapture Kubernetes has revolutionized cloud computing, but as your environment matures, managing it can become complex and time-consuming. Adapture, in partnership with Spot by NetApp, brings you the solution. Seize Control of Your Kubernetes Day 2 Strategy Answer the crucial questions that prepare DevOps for Day 2 success.

Cloud 52
article thumbnail

Transform workflows with cloud fax

OpenText Information Management

Digital fax remains an integral part of mission-critical communications. Meet the team inventing the future of fax – we recently caught up with Josee Martin, Senior Product Manager, to talk about the future of secure information exchange and document delivery. Why is fax so critical? The main strength is security – it’s why people and … The post Transform workflows with cloud fax appeared first on OpenText Blogs.

Cloud 57