Mon.Aug 15, 2022

article thumbnail

Initial Access Broker Phishing

KnowBe4

Cisco has disclosed a security incident that occurred as a result of sophisticated voice phishing attacks that targeted employees, according to researchers at Cisco Talos. The researchers believe the attack was carried out by an initial access broker with the intent of selling access to the compromised accounts to other threat actors.

Phishing 128
article thumbnail

ENISA Report: Threat Landscape for Ransomware Attacks

Data Breach Today

Ifigeneia Lella of ENISA Calls Out Major Gaps in Incident Reporting ENISA’s new "Threat Landscape for Ransomware Attacks" report analyzes 623 ransomware incidents in the EU, U.K. and U.S. from 2021 to 2022. ENISA cybersecurity officer Ifigeneia Lella shares how attacks have evolved and how 95% of reported incidents lack key data about how the breaches occurred.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace

The Last Watchdog

The top ransomware gangs have become so relentless that it’s not unusual for two or more of them to attack the same company within a few days – or even a few hours. Related: How ‘IABs’ foster ransomware. And if an enterprise is under an active ransomware attack, or a series of attacks, that’s a pretty good indication several other gangs of hacking specialists came through earlier and paved the way.

article thumbnail

Latest US Health Data Breaches Follow Worrisome Trends

Data Breach Today

Federal Tally Underscores Biggest Hacking Threats, Risks From Vendors Some 60 breaches affecting about 2.5 million individuals were added in July to the federal tally of major health data breaches. A vast majority of 2022 breaches continue to be linked to large hacking incidents and ransomware demands - with 40% tied to outside vendors.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CI/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers

eSecurity Planet

Continuous integration and development (CI/CD) pipelines are the most dangerous potential attack surface of the software supply chain , according to NCC researchers. The presentation at last week’s Black Hat security conference by NCC’s Iain Smart and Viktor Gazdag, titled “RCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI/CD Pipeline Compromise,” builds on previous work NCC researchers have done on compromised CI/CD pipelines.

Risk 125

More Trending

article thumbnail

New York Becomes First State to Require CLE in Cybersecurity, Privacy and Data Protection

Hunton Privacy

On June 10, 2022, New York became the first state to require attorneys to complete at least one credit of cybersecurity, privacy and data protection training as part of their continuing legal education (“CLE”) requirements. The new requirement will take effect July 1, 2023. The New York State Bar Association’s (“NYSBA”) Committee on Technology and the Legal Profession initially recommended the new requirement in a 2020 report.

article thumbnail

Building Resilience in a Multi-Cloud Environment

Data Breach Today

Lee Newcombe of Capgemini on Reducing Complexity in the Cloud A well-managed multi-cloud strategy "is a sensible approach" because it allows organizations to move different workloads between providers, but it gets a "bit more complicated when you start thinking about workload portability," says Lee Newcombe, security director, Capgemini U.K.

Cloud 236
article thumbnail

UPDATE DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

The Security Ledger

A researcher presented the results of a year-long effort to reverse engineer John Deere hardware to run a version of the DOOM first person shooter. He also discovered a number of security flaws along the way. The post UPDATE DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition appeared first on The Security Ledger with. Read the whole entry. » Related Stories Feel Good Ukraine Tractor Story Highlights Ag Cyber Risk DEF CON: Security Holes in Deere, Case IH Shine Sp

article thumbnail

Suspected Tornado Cash Developer Accused of Money Laundering

Data Breach Today

Suspect Accused of "Involvement in Concealing Criminal Financial Flows" Using Mixer Dutch police have arrested a man accused of working as a developer for Tornado Cash. "He is suspected of involvement in concealing criminal financial flows and facilitating money laundering through the mixing of cryptocurrencies via the decentralized Ethereum mixing service," Dutch authorities say.

230
230
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

The Security Ledger

A researcher presented the results of a year-long effort to reverse engineer John Deere hardware to run a version of the DOOM first person shooter. He also discovered a number of security flaws along the way. The post DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition appeared first on The Security Ledger with Paul F. Read the whole entry. » Related Stories Feel Good Ukraine Tractor Story Highlights Ag Cyber Risk DEF CON: Security Holes in Deere, Case IH Shine Sp

article thumbnail

SOVA Android malware now also encrypts victims’ files

Security Affairs

Security researchers from Cleafy reported that the SOVA Android banking malware is back and is rapidly evolving. The SOVA Android banking trojan was improved, it has a new ransomware feature that encrypts files on Android devices, Cleafy researchers report. The malware has been active since 2021 and evolves over time. The latest version of the SOVA Trojan, 5.0, targets over 200 banking and cryptocurrency exchange apps.

article thumbnail

DEF CON 30: Hackers Come Home to Vibrant Community

Dark Reading

After 30 years and a brief pandemic hiatus, DEF CON returns with "Hacker Homecoming," an event that put the humans behind cybersecurity first.

article thumbnail

VNC instances exposed to Internet pose critical infrastructures at risk

Security Affairs

Researchers from threat intelligence firm Cyble reported a surge in attacks targeting virtual network computing (VNC). Virtual Network Computing (VNC) is a graphical desktop-sharing system that leverages the Remote Frame Buffer (RFB) protocol to control another machine remotely. It transmits the keyboard and mouse input from one computer to another, relaying the graphical-screen updates, over a network.

Risk 96
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Most Q2 Attacks Targeted Old Microsoft Vulnerabilities

Dark Reading

The most heavily targeted flaw last quarter was a remote code execution vulnerability in Microsoft Office that was disclosed and patched four years ago.

99
article thumbnail

Microsoft disrupts SEABORGIUM ’s ongoing phishing operations

Security Affairs

Microsoft disrupted a hacking operation linked conducted by Russia-linked APT SEABORGIUM aimed at NATO countries. The Microsoft Threat Intelligence Center (MSTIC) has disrupted activity by SEABORGIUM (aka ColdRiver , TA446), a Russia-linked threat actor that is behind a persistent hacking campaign targeting people and organizations in NATO countries.

article thumbnail

$23 Million YouTube Royalties Scam

Schneier on Security

Scammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught. No one knows how common this scam is, and how much money total is being stolen in this way. Presumably this is not an uncommon fraud. While the size of the heist and the breadth of the scheme may be very unique, it’s certainly a situation that many YouTube content creators have faced before.

CMS 85
article thumbnail

Phone numbers of 1,900 Signal users exposed as a result of Twilio security breach

Security Affairs

For about 1,900 users, Twilio hackers could have attempted to re-register their number to another device or learned that their number was registered to Signal. Communication company Twilio provides Signal with phone number verification services, and recent security breach it has suffered had also impacted some users of the popular instant-messaging app.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Crowley Company Expands Document Scanning Capabilities

IG Guru

Frederick, Maryland – In the wake of growing demand for the mass digitization of paper records, The Crowley Company (Crowley) has expanded its physical footprint with the addition of a dedicated digital document scanning facility to its corporate campus. The secure, state-of-the-art studio is specific to high-volume, guideline-compliant paper record and large-format document scanning.

Paper 76
article thumbnail

FIDO - Leading the Zero Trust Passwordless Authentication Evolution

Thales Cloud Protection & Licensing

FIDO - Leading the Zero Trust Passwordless Authentication Evolution. divya. Tue, 08/16/2022 - 06:32. It’s no secret that passwords have become one of the weakest links in enterprise security. Credential compromise is the leading cause of cybercriminals’ ability to gain access to enterprise resources. Zero Trust approaches are crucial in helping modern organisations achieve better security outcomes.

article thumbnail

You Rolled Out Your Remote Workplace in Record Time. Now Let’s Talk Governance

ARMA International

When it comes to the digital workplace, governance and expediency are not always the best of friends. Governance essentially takes a longer-term view, establishing controls, processes and rules that makes the digital workplace sustainable going forward. Expediency tends to yield to the short-term view, cutting corners to drive forwards an immediate need, with the mid- to longer-term view filed under “worry about it later.”.

article thumbnail

A new PyPI Package was found delivering fileless Linux Malware

Security Affairs

Security Researchers discovered a new PyPI Package designed to drop fileless cryptominer to Linux systems. Sonatype researchers have discovered a new PyPI package named ‘ secretslib ‘ that drops fileless cryptominer to the memory of Linux machine systems. The package describes itself as “secrets matching and verification made easy,” it has a total of 93 downloads since August 6, 2020. “ Sonatype has identified a ‘secretslib’ PyPI package that describes i

IT 75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Learn how communications can transform the customer experience

OpenText Information Management

The world has changed and so have customers’ expectations. Today, customers want—and expect—the relevant, personal, consistent, and seamless experiences they get from leaders like Amazon and Netflix. Every customer interaction is an opportunity to exceed expectations, whether it’s online, offline, or a combination of the two. A new world demands a new approach.

article thumbnail

Iron Tiger APT is behind a supply chain attack that employed messaging app MiMi

Security Affairs

China-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi to infect systems. Trend Micro researchers uncovered a new campaign conducted by a China-linked threat actor Iron Tiger that employed a backdoored version of the cross-platform messaging app MiMi Chat App to infect Windows, Mac, and Linux systems. The Iron Tiger APT (aka Panda Emissary , APT27 , Bronze Union , Lucky Mouse , and TG-3390) is active at least since 2010 and targeted organizations in

IT 67
article thumbnail

Transitioning From VPNs to Zero-Trust Access Requires Shoring Up Third-Party Risk Management

Dark Reading

ZTNA brings only marginal benefits unless you ensure that the third parties you authorize are not already compromised.

Access 82
article thumbnail

3 new steps in the data mining process to ensure trustworthy AI

IBM Big Data Hub

Sometimes as data scientists, we are often so determined to build a perfect model that we can unintentionally include human bias into our models. Often the bias creeps in through training data and then is amplified and embedded in the model. If such model enters a production cycle it can have some serious implications directed by bias such as false prediction of credit score or health examination.

Mining 62
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How and Why to Apply OSINT to Protect the Enterprise

Dark Reading

Here's how to flip the tide and tap open source intelligence to protect your users.

88
article thumbnail

Black Hat and DEF CON Roundup

Threatpost

‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.

article thumbnail

Data Modeling 301 for the cloud: data lake and NoSQL data modeling and design

erwin

This blog is based upon a recent webcast that can be viewed here. For NoSQL, data lakes, and data lake houses—data modeling of both structured and unstructured data is somewhat novel and thorny. This blog is an introduction to some advanced NoSQL and data lake database design techniques (while avoiding common pitfalls) is noteworthy. Moreover, this blog will provide readers with a firm foundation for NoSQL and data lakes as they move to the cloud.

Cloud 52