Sat.May 04, 2024 - Fri.May 10, 2024

article thumbnail

LockBitSupp's Identity Revealed: Dmitry Yuryevich Khoroshev

Data Breach Today

Russian National Faces US Criminal Indictment, Sanctions The Russian national known as LockBitSupp, head of ransomware-as-a-service group LockBit, came under indictment Tuesday in U.S. federal court and faces sanctions from the U.S. Department of the Treasury. Prosecutors say LockBitSupp's real identity is Dmitry Yuryevich Khoroshev.

article thumbnail

Why Your VPN May Not Be As Secure As It Claims

Krebs on Security

Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target’s traffic off of the protection provided by their VPN without triggering any alerts to the user.

IT 244
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: AT&T, WillJam Ventures partner to launch new MSSP — LevelBlue

The Last Watchdog

SAN FRANCISCO – The already simmering MSSP global market just got hotter. Related: The transformative power of GenAI/LLM This week at RSA Conference 2024 , AT&T announced the launch of LevelBlue – a top-tier managed security services business formed by an alliance with AT&T and WillJam Ventures. I had the chance to sit down earlier with Theresa Lanowitz , Chief Evangelist of AT&T Cybersecurity /Agent at LevelBlue, to discuss this alliance.

article thumbnail

Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

WIRED Threat Level

The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself.

Privacy 137
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Operation Cronos Again Threatens to Reveal LockBitSupp

Data Breach Today

International Police Operation Revives Seized LockBit Dark Web Leak Site Police behind an international law enforcement operation targeting LockBit resurrected the leak site they seized earlier this year from the ransomware-as-a-service group and posted a countdown clock suggesting they will reveal the identity of LockBitSupp, the group's leader.

More Trending

article thumbnail

Ransomware drama: Law enforcement seized Lockbit group’s website again

Security Affairs

Law enforcement seized the Lockbit group’s Tor website again and announced they will reveal more identities of its operators Law enforcement seized the Lockbit group’s Tor website again. The authorities resumed the Lockbit seized leak site and mocked its administrators. According to the countdown active on the seized, law enforcement that are currently controlling the website will reveal the identities of the LockBitSupps and other members of the gang on May 7, 2024, at 14:00:00 UTC.

article thumbnail

IBM Mainframe Skills Council brings the global community together to grow mainframe talent

IBM Big Data Hub

The global economy runs on transactions, and 70% of transactions by value run through an IBM Z® mainframe. Many of the world’s largest enterprises rely on IBM Z to support their core business, and by a process of continued innovation, IBM Z brings industry-first technologies to our clients with each new generation. Modern mainframe skills are critical as businesses implement AI, modernize their applications, integrate across the enterprise and continue digital transformation.

article thumbnail

ISMG Editors: Opening Day Overview of RSA Conference 2024

Data Breach Today

Ransomware, AI Technology and the Art of the Possible Are Hot Topics This Year ISMG editors are live at RSA Conference 2024 in San Francisco with an overview of opening-day speakers and hot topics including the dismal ransomware landscape, the unbridled growth of AI, security product innovation and deals, and regulatory trends. Join us for daily updates from RSA.

article thumbnail

New Attack on VPNs

Schneier on Security

This attack has been feasible for over two decades: Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering. TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloa

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

El Salvador suffered a massive leak of biometric data

Security Affairs

Resecurity found a massive leak involving the exposure of personally identifiable information (PII) of over five million citizens of El Salvador on the Dark Web. Resecurity identified a massive leak of the personally identifiable information (PII) of over five million citizens from El Salvador on the Dark Web , impacting more than 80% of the country’s population.

article thumbnail

How Large Language Models Are Reshaping the Cybersecurity Landscape

Elie

This talk discuss in concrete terms how large models are currently reshaping cybersecurity from both an offensive and defensive standpoint.

article thumbnail

LevelBlue Leverages AI For Threat Intel Following AT&T Split

Data Breach Today

AI Investments and Global Expansion Set to Propel Growth After Separating From AT&T As Level Blue separates from AT&T, it focuses on harnessing artificial intelligence for advanced threat intelligence, targeting significant growth in international markets, and evaluating potential merger and acquisition opportunities to expand its geographic or technological footprint.

article thumbnail

New Lawsuit Attempting to Make Adversarial Interoperability Legal

Schneier on Security

Lots of complicated details here: too many for me to summarize well. It involves an obscure Section 230 provision—and an even more obscure typo. Read this.

IT 81
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

City of Wichita hit by a ransomware attack

Security Affairs

The City of Wichita in Kansas was forced to shut down its computer systems after a ransomware attack. The City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. The security breach took place on May 5th, 2024, and immediately started its incident response procedure to prevent the threat from spreading.

article thumbnail

DSAR and CIAM: A Strategic Guide for Businesses

Thales Cloud Protection & Licensing

DSAR and CIAM: A Strategic Guide for Businesses madhav Tue, 05/07/2024 - 09:30 Introduction to Data Subject Access Requests and CIAM When the GDPR was enforced in 2018, it set out to give individuals control over their data by granting eight data subject rights. One of these controls is the right of access, which allows individuals to request information about the personal data held by organizations and to find out how that information is being used.

article thumbnail

The Challenges in Keeping Medical Device Software Updated

Data Breach Today

Updating software as new vulnerabilities are discovered persistently remains a top medical device cybersecurity challenge, said David Brumley, a cybersecurity professor at Carnegie Mellon University and CEO of security firm ForAllSecure. Solving this requires a major mindset shift, he said.

article thumbnail

The Alleged LockBit Ransomware Mastermind Has Been Identified

WIRED Threat Level

Law enforcement officials say they’ve identified, sanctioned, and indicted the person behind LockBitSupp, the administrator at the heart of LockBit’s $500 million hacking rampage.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Blackbasta gang claimed responsibility for Synlab Italia attack

Security Affairs

The Blackbasta extortion group claimed responsibility for the attack that in April severely impacted the operations of Synlab Italia. Since April 18, Synlab Italia, a major provider of medical diagnosis services, has been experiencing disruptions due to a cyber attack. The company initially cited technical issues as the cause leading to “temporary interruption of access to computer and telephone systems and related services.

article thumbnail

U.S. Government Warns of North Korean Spear-Phishing Campaigns

KnowBe4

The North Korean state-sponsored threat actor Kimsuky is launching spear phishing attacks against individuals working at think tanks and academic institutions in the US, according to a joint advisory from the US State Department, the FBI, and the NSA.

article thumbnail

Microsoft Overhauls Security Practices After Major Breaches

Data Breach Today

Company Plans to Link Executive Compensation to Achieving Security Milestones The executive vice president for Microsoft Security has announced an overhaul of the company's security practices following a series of high-profile cyberattacks that allowed foreign state-sponsored hacking groups to access its internal systems and cloud networks.

Security 162
article thumbnail

How to Block a Program in a Firewall (Windows & Mac)

eSecurity Planet

Blocking a program in a firewall is a security measure that protects systems from unwanted access. This process monitors resource consumption, limits internet access, blocks inbound access from malicious sources, and prevents outbound access from installed apps. Learn how to block a program in a firewall by exploring when to allow or block programs, methods to permanently or temporarily block in Windows or MacOS, and the common troubleshooting tips.

Access 70
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Alexander Vinnik, the operator of BTC-e exchange, pleaded guilty to money laundering

Security Affairs

Alexander Vinnik, a Russian operator of virtual currency exchange BTC-e pleaded guilty to participating in a money laundering scheme. Alexander Vinnik , a Russian national, pleaded guilty to conspiracy to commit money laundering for his involvement in operating the cryptocurrency exchange BTC-e from 2011 to 2017. BTC-e processed over $9 billion in transactions and served over one million users globally, including many in the United States.

article thumbnail

The Education Sector Experienced the Highest Number of Data Breaches in 2023

KnowBe4

New data from Verizon makes it clear that the Education sector is under attack, but also breaks down which threat actions and patterns are used most.

article thumbnail

Suspected Chinese Hackers Hacked UK Defense Contractor

Data Breach Today

Up to 270,000 Defense Staff Across the UK Affected by Hack Sensitive information of thousands of U.K. defense personnel was exposed to hackers after a threat actor with suspected ties to the Chinese government compromised the networks of a defense contractor. The data may not have been stolen, a government official said.

article thumbnail

6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident

IT Governance

Plus, a further 3,029,461 known records newly breached Welcome to this week’s global round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight More than 6 million accounts compromised from streaming service MovieBoxPro MovieBoxPro, a streaming service of “questionable legalit

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MITRE attributes the recent attack to China-linked UNC5221

Security Affairs

MITRE published more details on the recent security breach, including a timeline of the attack and attribution evidence. MITRE has shared more details on the recent hack , including the new malware involved in the attack and a timeline of the attacker’s activities. In April 2024, MITRE disclosed a security breach in one of its research and prototyping networks.

article thumbnail

Verizon: Nearly 80% of Data Breaches Involve Phishing and the Misuse of Credentials

KnowBe4

Innovative analysis of data breaches shows which attack vectors are being used and how they’re enabled, highlighting the roles phishing and credentials play.

article thumbnail

Ransomware Attack Shuts Down Kansas City Systems

Data Breach Today

Phones, Wi-Fi, Digital Payments Are Among the Affected Systems The city administration of Kansas's largest city shut down IT systems and switched to cash transactions in the wake of a ransomware attack detected on Sunday. Municipal officials from the city of Wichita said Tuesday that no timetable yet exists for the restoration of systems.