Mon.Jul 05, 2021

article thumbnail

Kaseya Attack: REvil Offers $70 Million 'Super Decryptor'

Data Breach Today

Yet Another Ransomware Attack Targets Managed Service Providers to Maximize Profits The REvil ransomware operation behind the massive attack centering on Kaseya, which develops software used by managed service providers, has offered to decrypt all victims - MSPs as well as their customers - for $70 million in bitcoins. Experts note this isn't the first time REvil has hit MSPs, or even Kaseya.

article thumbnail

Welcoming the Dutch Government to Have I Been Pwned

Troy Hunt

Today I'm very happy to welcome the Dutch government to HIBP, marking 24 national CERTs that now have full and free access to API level domain searches. The Nationaal Cyber Security Centrum of the Netherlands (NCSC-NL) now has access to monitor the exposure of government departments across all the data breaches that make their way into HIBP. Visibility into the impact of data breaches helps defenders protect national assets and I'm very pleased to see the Netherlands join so many other

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaseya Was Working on Patches Before Ransomware Attack

Data Breach Today

REvil Beat Patching Effort in a 'Final Sprint,' Researcher Says Kaseya, the vendor at the center of a mass ransomware attack, was close to fixing the flaw in its software before the notorious REvil gang struck. It's unclear if REvil somehow figured out that patches were forthcoming, but one Dutch researcher says the gang beat Kaseya in a "final sprint.

article thumbnail

Ransomware Defense: Top 5 Things to do Right Now

Threatpost

Matt Bromiley, senior consultant with Mandiant Managed Defense, discusses the top tricks and tips for protecting enterprise environments from ransomware. InfoSec Insider Malware

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Chinese-owned firm acquires UK’s largest semiconductor manufacturer

The Guardian Data Protection

Tory MP Tom Tugendhat raises concerns about deal in light of global computer chip shortage The UK’s largest producer of semiconductors has been acquired by the Chinese-owned manufacturer Nexperia, prompting a senior Tory MP to call for the government to review the sale to a foreign owner during an increasingly severe global shortage of computer chips.

More Trending

article thumbnail

Stealing Xbox Codes

Schneier on Security

Detailed story of Volodymyr Kvashuk, a Microsoft insider who noticed a bug in the company’s internal systems that allowed him to create unlimited Xbox gift cards, and stole $10.1 million before he was caught.

121
121
article thumbnail

US water company WSSC Water hit by a ransomware attack

Security Affairs

US water company WSSC Water is investigating a ransomware attack that affected non-essential business systems in May. WSSC Water is investigating a ransomware attack that took place on May 24 and that targeted a portion of their network that operates non-essential business systems. According to reports from WJZ13 Baltimore , the company removed the malware just hours later and locked out the threat, however, the attackers accessed internal files.

article thumbnail

Kaseya Attack Fallout: CISA, FBI Offer Guidance

Threatpost

Following a brazen ransomware attack by the REvil cybergang, CISA and FBI offer guidance to victims.

article thumbnail

Watch for Cybersecurity Games at the Tokyo Olympics

Dark Reading

The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Amazon Echo Dots Store a Wealth of Data—Even After a Reset

WIRED Threat Level

Thinking about selling your smart speaker? Be aware that you can't completely delete personal content from the device.

Privacy 100
article thumbnail

Didi ride-hailing service pulled from app stores in China

The Guardian Data Protection

Cyberspace regulator claimed the company had illegally collected users’ personal data China’s cyberspace regulator has ordered smartphone app stores to pull Didi Global Inc’s app after it alleged the ride-hailing company had “illegally collected users’ personal data”. On Sunday, the Cyberspace Administration of China (CAC) said it had told Didi to make changes to comply with data protection rules, four days after its initial public offering (IPO) in New York, which raised $4.4bn (£3.2bn) – the b

article thumbnail

Improve Business File Organization and Collaboration With Document Control

OneHub

What is document control? Document control is a standardized system of file management within a business. Document control sets protocols for the lifecycle and use of documents, from creation to deletion and everything in between. With proper management, employees will always have access to accurate and up-to-date information at any point in a document’s lifecycle.

article thumbnail

EU: What’s left of the GDPR’s one-stop-shop? CJEU clarifies the competences of non-lead data protection authorities

DLA Piper Privacy Matters

Authors: Heidi Waem, Simon Verschaeve. When the GDPR was adopted back in 2016, its new cooperation and consistency mechanism, coined as the one-stop-shop, was marketed as one of the major advancements that the GDPR would bring to organisations. Instead of having to engage with multiple local data protection authorities, controllers and processors established in the EU would be able to deal with only a single data protection authority (DPA) with respect to their cross-border processing activities

GDPR 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

EU’s possible Data Act: What can we anticipate from the Inception Impact Assessment and the Consultation?

Data Protection Report

The European Commission (EC) signalled plans for a new Data Act, to be published in late 2021, in its February 2020 Data Strategy Communication. The EC revealed more details in its 2021 Consultation and Inception Impact Assessment. The responses to the Consultation and Inception Impact Assessment are bound to shape the future of EU’s digital economy.

B2B 144
article thumbnail

Revil ransomware gang hit Spanish telecom giant MasMovil

Security Affairs

Revil ransomware gang hit Spanish telecom giant MasMovil and claims to have stolen sensitive data from the group. MasMovil is one of the largest Spanish telecom operators, last week the group was hit by the REvil ransomware gang that claims to have stolen sensitive data from the company. “We have downloaded databases and other important data” reads the message published by REvil ransomware gang on its Tor leak site.

article thumbnail

Best Zero Trust Security Solutions for 2021

eSecurity Planet

Zero trust security is a concept that’s been around for several years, but it may finally be starting to gain traction as a technology product. The problem is that zero trust can mean different things to different people – and not all vendors take the same approach. But buyers are beginning to express interest, and a number of security vendors have assembled some interesting approaches to zero trust security.

article thumbnail

CISA, FBI share guidance for MSPs and their customers impacted in Kaseya attack

Security Affairs

CISA and the FBI published guidance for the victims impacted by the REvil supply-chain ransomware attack against Kaseya. CISA and the Federal Bureau of Investigation (FBI) have published guidance for the organizations impacted by the massive REvil supply-chain ransomware attack that hit Kaseya ‘s cloud-based MSP platform. The US agencies provides instructions to affected MSPs and their customers on how to check their infrastructure for indicators of compromise.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

REvil ransomware gang demanded $70M for universal decryptor for Kaseya victims

Security Affairs

REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil ransomware is asking $70 million worth of Bitcoin for decrypting all systems impacted in the Kaseya supply-chain ransomware attack. On Friday the REvil ransomware gang hit the Kaseya cloud-based MSP platform impacting MSPs and their customers.