Sun.Feb 05, 2023

article thumbnail

Finland’s Most-Wanted Hacker Nabbed in France

Krebs on Security

Julius “Zeekill” Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week in France. A notorious hacker convicted of perpetrating tens of thousands of cybercrimes, Kivimäki had been in hiding since October 2022, when he failed to show up in court and Finland issued an international warrant for his arrest.

ROT 219
article thumbnail

Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT

Security Affairs

Microsoft attributes a recent cyber attack against the satirical French magazine Charlie Hebdo to an Iran-linked NEPTUNIUM APT group. Microsoft’s Digital Threat Analysis Center (DTAC) attributes a recent cyberattacks against the satirical French magazine Charlie Hebdo to an Iran-linked threat actor tracked as NEPTUNIUM (aka Emennet Pasargad , Holy Souls).

Sales 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Forget the IoT. Meet the IoZ: our Internet of Zombie things

The Security Ledger

A school that never sleeps? Cameras that go dark? A dead company hacked back to life? Welcome to the growing Internet of Zombie devices that threatens the security of the Internet. The post Forget the IoT. Meet the IoZ: our Internet of Zombie things appeared first on The Security Ledger with Paul F. Roberts. Related Stories CES Overlooks New Report That Finds Auto Cyber Is A Dumpster Fire The Future of IoT Security Standards IoCs vs.

IoT 98
article thumbnail

Security Affairs newsletter Round 405 by Pierluigi Paganini

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog GoAnywhere MFT zero-day flaw actively exploited CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers Tallahassee Memorial HealthCare, Florida,

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

TikTok: how the west has turned on gen Z’s favourite app

The Guardian Data Protection

US and European fears about China exploiting TikTok’s data harvest and promoting Beijing’s worldview look set to inspire an urgent overhaul in data privacy laws The FBI has called it a national security threat. The US government has passed a law forcing officials to delete it from their phones. Texas senator Ted Cruz has denounced it as “a Trojan horse the Chinese Communist party can use to influence what Americans see, hear, and ultimately think”.