Mon.Oct 23, 2023

article thumbnail

Spanish Police Dismantle Cybercrime Ring

Data Breach Today

Police Arrested 34 Members of the Group That Defrauded 3 Million Euros Spanish police arrested 34 members of a cybercrime group that used phishing and other tactics to extort nearly 3 million euros from victims. The group is believed to have stolen data of more than 4 million banking customers to target its victims.

Phishing 312
article thumbnail

NJ Man Hired Online to Firebomb, Shoot at Homes Gets 13 Years in Prison

Krebs on Security

A 22-year-old New Jersey man has been sentenced to more than 13 years in prison for participating in a firebombing and a shooting at homes in Pennsylvania last year. Patrick McGovern-Allen was the subject of a Sept. 4, 2022 story here about the emergence of “violence-as-a-service” offerings, where random people from the Internet hire themselves out to perform a variety of local, physical attacks, including firebombing a home, “bricking” windows, slashing tires, or perform

Access 241
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Count of Hacked Cisco IOS XE Devices Unexpectedly Plummets

Data Breach Today

From 60,000 to 1,200: Researchers Warn Attackers May Have Disguised Infections Security researchers are warning that the number of apparently backdoored Cisco IOS XE Devices has suddenly plunged from to 36,541 to about 1,200. While the cause of the decline isn't clear, one concern is that attackers who exploited two zero-day vulnerabilities have been hiding their tracks.

Security 290
article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Cisco’s $28 billion acquisition of Splunk comes at an inflection point of security teams beginning to adopt to working with modern, cloud-native data lakes. Related: Dasera launches new Snowflake platform For years, Splunk has been the workhorse SIEM for many enterprise Security Operation Centers (SOCs). However, security teams have challenges with Splunk’s steeply rising costs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cisco Cloud Protection: Driving Better Outcomes With a Holistic Approach to Security

Data Breach Today

Visibility, consistency, efficiency - are goals every security leader strives to achieve across cloud environments, and remains one of the key digital transformation challenges. Cisco's Sean Baze talks about how to overcome this challenge and discover new efficiencies through a data-driven approach.

Cloud 283

More Trending

article thumbnail

Indian Federal Police Raid Tech Scam Centers

Data Breach Today

Amazon, Microsoft Say Scammers Duped Thousands of Victims India federal law enforcement busted tech scam fraud rings operating in locations across the subcontinent after Microsoft and Amazon shared intelligence with the Central Bureau of Investigation. Scammers allegedly operated call centers impersonating tech giant customer support.

283
283
article thumbnail

PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web

Security Affairs

Hundreds of millions of PII records belonging to Indian residents, including Aadhaar cards, are being offered for sale on the Dark Web. PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web In early October, Resecurity’s HUNTER (HUMINT) unit identified hundreds of millions of personally identifiable information (PII) records belonging to Indian residents, including Aadhaar cards, being offered for sale on the Dark Web.

Sales 132
article thumbnail

Island Raises $100M to Embrace Anomaly Detection, Go Global

Data Breach Today

CEO Mike Fey Wants Island to Expand From North America to Germany, Japan, Benelux An enterprise browser startup led by former Symantec President and COO Mike Fey closed its Series C round to accelerate market penetration and revenue growth. The company said the $100 million investment led by Prysm Capital will make it easier for companies to secure bring your own device.

Marketing 274
article thumbnail

Cisco warns of a second IOS XE zero-day used to infect devices worldwide

Security Affairs

Cisco found a second IOS XE zero-day vulnerability, tracked as CVE-2023-20273, which is actively exploited in attacks in the wild. Cisco last week warned customers of a zero-day vulnerability, tracked as CVE-2023-20198 (CVSS score 10), in its IOS XE Software that is actively exploited in attacks. The IT giant found the vulnerability during the resolution of multiple Technical Assistance Center (TAC) support cases.

Access 124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds Issue HIPAA Guidance on Employee Sanctions, Telehealth

Data Breach Today

HHS OCR Guides Spotlight Sanctions for Insiders; Telehealth Privacy, Security Risks Federal regulators issued new guidance materials for HIPAA-regulated entities, including a document stressing the importance of sanction policies for workforce members who violate HIPAA, plus two new resources for healthcare providers and patients regarding telehealth privacy and security risks.

Privacy 271
article thumbnail

Don’t use AI-based apps, Philippine defense ordered its personnel

Security Affairs

The Philippine defense ordered its personnel to stop using AI-based applications to generate personal portraits. The Philippine defense warned of the risks of using AI-based applications to generate personal portraits and ordered its personnel to stop using them. On October 14, Defense Secretary Gilberto Teodoro Jr. issued the directive to ban the AI-based applications. “Defense Secretary Gilberto Teodoro Jr. issued the order in an Oct. 14 memorandum, as Philippine forces have been working

IT 123
article thumbnail

A Brief History of Phishing, and Other Forms of Social Engineering

KnowBe4

Social engineering attacks have a very long history, though the Internet has made it easier to launch these attacks en masse, according to Sean McNee at DomainTools. McNee points to an advance-fee scam from 1924, in which a crook sent a letter pretending to be trapped in a Spanish debtors prison.

Phishing 112
article thumbnail

SolarWinds fixed three critical RCE flaws in its Access Rights Manager product

Security Affairs

Researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. Security researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. SolarWinds Access Rights Manager (ARM) is a software solution developed by IT management and monitoring software provider SolarWinds, it was designed to help organizations manage and monitor user access and permissions in their I

Access 123
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Jamf Protect wins mobile security solution of the year

Jamf

Jamf helps organizations remain secure and meet compliance needs; we’re delighted to announce that our efforts to develop the best security solutions have been recognized in the 2023 Computing Security Awards.

Security 111
article thumbnail

City of Philadelphia suffers a data breach

Security Affairs

The City of Philadelphia discloses a data breach that resulted from a cyber attack that took place on May 24 and that compromised City email accounts. The City of Philadelphia announced it is investigating a data breach after attackers that threat actors broke some of City email accounts containing personal and protected health information. The incident was discovered on May 24, but further investigation revealed that threat actors have had access to the compromised email accounts at least since

article thumbnail

2023 Technology privacy and cybersecurity summit | 1 November 2023

Data Protection Report

Norton Rose Fulbright Canada invites you to our annual technology, privacy and cybersecurity virtual summit. Navigating the evolving world of technology is not easy for companies today. From AI to effective company records management, privacy considerations, and cybersecurity breaches, there’s a lot to consider as businesses work to maximize operational effectiveness and minimize risk.

article thumbnail

CISA adds second Cisco IOS XE flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added the vulnerability CVE-2023-20273 in Cisco IOS XE to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability CVE-2023-20273 in Cisco IOS XE to its Known Exploited Vulnerabilities catalog. The vulnerability is an unspecified issue in the web user interface.

IT 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Malicious Apps Spoof Israeli Attack Detectors: Conflict Goes Mobile

Dark Reading

A spoofed version of an Israeli rocket-attack alerting app is targeting Android devices, in a campaign that shows how cyber-espionage attacks are shifting to individual, everyday citizens.

108
108
article thumbnail

Expert Insight: Leon Teale

IT Governance

Secure remote working tips and VPN insights from our senior penetration tester Leon Teale is a senior penetration tester at IT Governance. He has more than ten years’ experience performing penetration tests for clients in various industries all over the world. In addition, Leon has won hackathon events in the UK and internationally, and is accredited for multiple bug bounties.

article thumbnail

Spain police dismantled a cybercriminal group who stole the data of 4 million individuals

Security Affairs

The Spanish police have arrested 34 members of the cybercriminal group that is accused of having stolen data of over four million individuals. The Spanish police have arrested 34 members of a cybercriminal group that is suspected to have stolen data of over four million individuals. The authorities conducted 16 searches in Madrid, Málaga, Huelva, Alicante and Murcia and seized firearms, a katana, a baseball bat, four high-end cars, 80,000 euros in cash, a database with information on four millio

article thumbnail

Child Exploitation and the Crypto Wars

Schneier on Security

Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation (CSAE). She puts the debate into historical context, discusses the problem of CSAE, and explains why breaking encryption isn’t the solution.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

IT Governance Podcast 20.10.23: Casio, Cisco, MOVEit (again) and the ICC

IT Governance

This week, we discuss a data breach affecting Casio users in 149 countries, two zero-day vulnerabilities in Cisco’s IOS XE web user interface, a slew of legal action against Progress Software following the MOVEit Transfer breach, and an update on last month’s cyber attack on the International Criminal Court. Also available on Spotify , Amazon Music , Apple Podcasts and SoundCloud.

article thumbnail

Two artificial intelligence must-haves: An innovation culture and data literacy

CGI

In my work as a data scientist, I have a front seat view of the power of artificial intelligence (AI) in turning vast data into actionable insights—insights that transform how organizations operate and the outcomes they achieve. The potential and promise of AI, and in particular generative AI (GenAI), have captured the world’s attention, but the path to successful implementation can be daunting, as AI technologies and use cases rapidly evolve.

article thumbnail

Hola Espana: 'Grandoreiro' Trojan Targets Global Banking Customers

Dark Reading

Brasileiro cybercrime has been on the rise. Now, one campaign targeting bank customers has reached beyond the Americas, into Europe.

102
102
article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

The Evolving Cybersecurity Threats to Critical National Infrastructure andrew.gertz@t… Mon, 10/23/2023 - 14:07 Cyberattacks on critical vital infrastructure can have disastrous results, forcing governments and regulatory bodies to pay close attention to intensifying the efforts to safeguard these industries. For example, #CybersecurityAwarenessMonth, celebrating its 20th anniversary this October, aims to empower people and organizations across every sector to protect critical assets against cybe

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Freelance IT Market Flooded With North Korean Actors

Dark Reading

US DoJ: Beware of hiring freelance and temporary workers that could be operatives working to funnel money to North Korea's WMD program.

article thumbnail

Sickened by Software? Changing The Way We Talk About 0Days

The Security Ledger

How do we improve software quality and end the epidemic of shoddy, exploitable software harming consumers, communities and businesses? To start, we need to change the way we think and talk about software-based risks. Related Stories Sickened by Software?

Risk 75
article thumbnail

FedRAMP Rev. 5: How Cloud Service Providers Can Prepare

Dark Reading

What cloud service providers need to know to prepare for FedRAMP Baselines Rev. 5, as documented in the new Transition Guide.

Cloud 98