Mon.Jul 26, 2021

article thumbnail

Ransomware: Average Ransom Payment Drops to $137,000

Data Breach Today

Fewer Victims Paying Attackers Simply to Delete Stolen Data, Coveware Reports Good news on the ransomware front: The average ransom paid by a victim dropped by 38% from Q1 to Q2, reaching $136,576, reports ransomware incident response firm Coveware. In addition, fewer victims are paying a ransom simply for a promise from attackers to delete stolen data.

article thumbnail

PlugwalkJoe Does the Perp Walk

Krebs on Security

Joseph “PlugwalkJoe” O’Connor, in a photo from a paid press release on Sept. 02, 2020, pitching him as a trustworthy cryptocurrency expert and advisor. One day after last summer’s mass-hack of Twitter , KrebsOnSecurity wrote that 22-year-old British citizen Joseph “PlugwalkJoe” O’Connor appeared to have been involved in the incident.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaseya Says It Did Not Pay Ransom to Obtain Universal Decryptor

Data Breach Today

Software Firm Continues Helping Ransomware Victims to Recover Remote management software company Kaseya said Monday that it obtained a universal decryptor key without paying a ransom to the REvil - aka Sodinokibi - gang that hit the firm with a ransomware attack. But it still has not revealed how it obtained the key, other than to say it was supplied by a third party.

IT 363
article thumbnail

NEW TECH: How the emailing of verified company logos actually stands to fortify cybersecurity

The Last Watchdog

Google’s addition to Gmail of something called Verified Mark Certificates (VMCs) is a very big deal in the arcane world of online marketing. Related: Dangers of weaponized email. This happened rather quietly as Google announced the official launch of VMCs in a blog post on July 12. Henceforth companies will be able to insert their trademarked logos in Gmail’s avatar slot; many marketers can’t wait to distribute email carrying certified logos to billions of inboxes.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AvosLocker Ransomware Gang Recruiting Affiliates, Partners

Data Breach Today

Malwarebytes: Gang Seeking 'Pentesters' and 'Access Brokers' A recently discovered ransomware-as-a-service gang dubbed AvosLocker is recruiting affiliates and partners, including "pentesters" and "access brokers," on darknet forums, according to the security firm Malwarebytes.

More Trending

article thumbnail

Hackers Target Kubernetes Using Misconfigured Argo Workflows

Data Breach Today

Threat Actors Deploying Cryptominers A hacking campaign is targeting Kubernetes environments using misconfigured Argo Workflows to deploy cryptominers, a report by security firm Intezer finds.

Security 329
article thumbnail

The True Impact of Ransomware Attacks

Threatpost

Keeper’s research reveals that in addition to knocking systems offline, ransomware attacks degrade productivity, cause organizations to incur significant indirect costs, and mar their reputations.

article thumbnail

Lawsuits Against CaptureRx Pile Up and So Do Victim Counts

Data Breach Today

At Least 3 Lawsuits Filed So Far After Breach Affecting Millions Another lawsuit seeking class action status was filed last week against San Antonio-based NEC Networks - which does business as CaptureRx - in the aftermath of a hacking incident that now appears to have affected several dozen of the vendor's healthcare clients and at least 2.4 million individuals.

313
313
article thumbnail

Hiding Malware inside a model of a neural network

Security Affairs

Researchers demonstrated how to hide malware inside an image classifier within a neural network in order to bypass the defense solutions. Researchers Zhi Wang, Chaoge Liu, and Xiang Cui presented a technique to deliver malware through neural network models to evade the detection without impacting the performance of the network. Tests conducted by the experts demonstrated how to embed 36.9MB of malware into a 178MB-AlexNet model within 1% accuracy loss, this means that the threat is completely tr

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SASE: Building a Migration Strategy

Data Breach Today

Gartner Report Prompts Discussion of Keys to Success Security experts offer an analysis of Gartner's new strategic road map for SASE adoption that emphasizes the need for a detailed migration plan and offer tips for a successful rollout.

Security 301
article thumbnail

Apple fixes CVE-2021-30807 flaw, the 13th zero-day this year

Security Affairs

Apple released a security update that addresses CVE-2021-30807 flaw in macOS and iOS that may have been actively exploited to deliver malware. Apple addressed a security flaw, tracked as CVE-2021-30807, in macOS and iOS that may have been actively exploited to plant malware on vulnerable devices. The vulnerability resides in the IOMobileFramebuffer , which is a kernel extension for managing the screen framebuffer.

Security 119
article thumbnail

Attackers Rely on 'Exotic' Languages for Malware Creation

Data Breach Today

Blackberry: Newer Programming Languages Help Cybercriminals Evade Detection Malware developers increasingly are relying on "exotic" programming languages - such as Go, Rust, DLang and Nim - to create malicious code that can avoid detection by security tools and add a layer of obfuscation to an attack, according to a report released Monday by BlackBerry.

Security 293
article thumbnail

Podcast: IoT Piranhas Are Swarming Industrial Controls

Threatpost

Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure.

IoT 135
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Australia Says Uber 'Interfered' With Users' Privacy

Data Breach Today

Uber Must Tighten Data Handling, Regulator Says Australia's data regulator has found that Uber interfered with the privacy of 1.2 million of its customers as a result of a 2016 global data breach. Uber says it's made improvements to its systems and its internal security policies.

Privacy 284
article thumbnail

No More Ransom helped ransomware victims to save almost €1B

Security Affairs

The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for free saving almost €1 billion in payments. No More Ransom is celebrating its 5th anniversary, the initiative allowed more than 6 million ransomware victims to recover their files for free saving roughly $1 billion in ransom payments.

article thumbnail

18 Companies to Participate in NIST 'Zero Trust' Project

Data Breach Today

Firms Will Demonstrate Their Architectures to Help Agency Develop Guidance NIST has selected 18 technology companies to demonstrate "zero trust" security architectures as it prepares to draft guidance for use of the model by federal agencies, which the private sector can also follow.

Security 176
article thumbnail

Microsoft publishes mitigations for the PetitPotam attack

Security Affairs

Microsoft published mitigations for the recently discovered PetitPotam attack that allows attackers to force remote Windows machines to share their password hashes. Microsoft has released mitigations for the recently discovered PetitPotam NTLM attack that could allow attackers to take over a domain controller. A few days ago, security researcher Gilles Lionel (aka Topotam ) has discovered a vulnerability in the Windows operating system that allows an attacker to force remote Windows machines

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Malware Makers Using ‘Exotic’ Programming Languages

Threatpost

Sprechen Sie Rust? Polyglot malware authors are increasingly using obscure programming languages to evade detection.

Security 135
article thumbnail

Controlling Access to ePHI: For Whose Eyes Only? via the OCR Listserv

IG Guru

Summer 2021 Cybersecurity Newsletter July 14, 2021 A recent report of security incidents and data breaches found that 61% of analyzed data breaches in the healthcare sector were perpetrated by external threat actors and 39% by insiders.[1] Without appropriate authorization policies and procedures and access controls, hackers, workforce members, or anyone with an Internet connection may […].

Access 98
article thumbnail

What’s new in OpenText Extended ECM Platform CE 21.3

OpenText Information Management

OpenText™ continues to advance our Content Services solutions with the latest release for OpenText™ Extended ECM Platform CE 21.3. These new innovations provide content driven automation that enables businesses with greater productivity, provides users with immersive experiences to help them be more effective, and improves information flows and processes with tighter integrations.

ECM 64
article thumbnail

3 success factors for moving payments to the public cloud

CGI

3 success factors for moving payments to the public cloud. This CGI blog post discusses three success factors for moving payments to the public cloud. dharini.s@cgi.com. Tue, 07/27/2021 - 00:29.

Cloud 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What’s new in OpenText Gupta Team Developer 7.4

OpenText Information Management

OpenText™ Gupta Team Developer 7.4 lets developers experience smart and higher-productivity software development through easier loop coding. Many powerful new reporting features transform the reporting experience, and many UX features optimize the user experience. For example, users can now zoom in and out of their application windows, which supports the trend of ultra-high-resolution (UHD) monitors … The post What’s new in OpenText Gupta Team Developer 7.4 appeared first on OpenText Blogs

64
article thumbnail

Processing of riders’ personal data ? The Italian Data Protection Authority sanctions a food delivery company

Privacy and Cybersecurity Law

On July 5, 2021, the Italian supervisory authority (“ Garante ”) published an injunction against a company operating a food delivery app (“ Company ”) over the processing of riders’ personal data with respect to the use of algorithms for the management of the orders. The decision imposed on the Company: (i) The obligation to take several corrective measures aimed at protecting the riders’ personal data, including preventing inappropriate and/or discriminatory applications of the automated orders

article thumbnail

Taking an opportunity

CILIP

Taking an opportunity. When I started this apprenticeship, I made a commitment to put my foot forward in everything new. And here I was taking on a project I would not have considered a year ago. A daunting yet opportunistic prospect; something this apprenticeship has provided abundantly. Most of the library staff were off on their annual leave (an extremely well deserved break after their continuous hard work).

article thumbnail

Disrupting Ransomware by Disrupting Bitcoin

Schneier on Security

Ransomware isn’t new; the idea dates back to 1986 with the “Brain” computer virus. Now, it’s become the criminal business model of the internet for two reasons. The first is the realization that no one values data more than its original owner, and it makes more sense to ransom it back to them — sometimes with the added extortion of threatening to make it public — than it does to sell it to anyone else.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Babuk Ransomware Gang Ransomed, New Forum Stuffed With Porn

Threatpost

A comment spammer flooded Babuk’s new ransomware forum with gay orgy porn GIFs and demanded $5K in bitcoin.