Thu.Aug 11, 2022

article thumbnail

Recent Cisco Hack by Ransomware Group Started Because of a Phishing Attack

KnowBe4

In a recent article by Forbes, Cisco confirmed that they were hacked by a ransomware group as the group of cybercriminals published a partial list of files that were claimed to be exfiltrated.

article thumbnail

Ex-Twitter Employee Found Guilty of Spying For Saudi Arabia

Data Breach Today

Ahmad Abouammo Now Faces Prospect of Decades in US Prison A U.S. federal jury convicted former Twitter employee Ahmad Abouammo for spying on Saudi Arabian dissidents on behalf of Saudi Arabia. Additionally, the jury found him guilty of conspiracy to commit wire fraud, falsification of records and money laundering.

246
246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Starlink Successfully Hacked Using $25 Modchip

Threatpost

Belgian researcher Lennert Wouters revealed at Black Hat how he mounted a successful fault injection attack on a user terminal for SpaceX’s satellite-based internet system.

IoT 137
article thumbnail

Cyber Operations Keep Affecting Civilians as War Continues

Data Breach Today

The ISMG Security Report discusses how cyberattacks and operations tied to the Russia-Ukraine war have been affecting civilians since the start of Russia's invasion, whether a practicing cardiologist living in Venezuela is also a ransomware mastermind and effective bot management tooling strategies.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cisco Confirms Data Breach, Hacked Files Leaked

Dark Reading

Ransomware gang gained access to the company's VPN in May by convincing an employee to accept a multifactor authentication (MFA) push notification.

More Trending

article thumbnail

FTC Seeks Public Comment Regarding Data Privacy and Security Rulemaking

Hunton Privacy

On August 11, 2022, the Federal Trade Commission announced it is seeking public comment regarding its advance notice of proposed rulemaking (“ANPR”) on commercial surveillance and data security, on which we previously reported. The FTC defines “commercial surveillance” as the business of collecting, analyzing and profiting from consumer data. Specifically, the FTC seeks comment on whether the Commission should implement new rules concerning the ways in which companies (1) collect, aggregate, pro

article thumbnail

FTC Probes BitMart After $200M Theft at Crypto Exchange

Data Breach Today

Investigation Is Latest Evidence of Crypto Fraud Crackdown by Feds A newly disclosed probe shows the Federal Trade Commission is investigating operators of BitMart, a cryptocurrency platform that lost $200 million of investor funds in one of the biggest crypto cyberattacks of 2021. The agency is scrutinizing the companies to see if they misled consumers.

245
245
article thumbnail

Palo Alto Networks warns of Reflected Amplification DoS issue in PAN-OS

Security Affairs

Palo Alto Networks devices running the PAN-OS are abused to launch reflected amplification denial-of-service (DoS) attacks. Threat actors are exploiting a vulnerability, tracked as CVE-2022-0028 (CVSS score of 8.6), in Palo Alto Networks devices running the PAN-OS to launch reflected amplification denial-of-service (DoS) attacks. The vendor has learned that firewalls from multiple vendors are abused to conduct distributed denial-of-service (DDoS) attacks, but it did not disclose the name of the

Access 113
article thumbnail

FTC Initiates Privacy and Data Security Rule-Making

Data Breach Today

Commission Asks for Comment on Link Between Consumer Surveillance and Lax Security U.S. companies could see new cybersecurity rules and restrictions on consumer data collection under a rule-making process initiated by the FTC. No regulatory outcome is guaranteed, but today's advanced notice of proposed rule-making is a first step to new data security and privacy regulations.

Privacy 240
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cyber-Insurance Fail: Most Businesses Lack Ransomware Coverage

Dark Reading

Even among businesses with cyber insurance, they lack coverage for basic costs of many cyberattacks, according to a BlackBerry survey.

Insurance 120
article thumbnail

Krebs to Vendors at Black Hat: No More 'Band-Aid' Approach

Data Breach Today

Keynote Speaker Chris Krebs and Top Execs on Overcoming Industry Challenges Black Hat USA 2022 opened with somber warnings from Chris Krebs about why application developers, vendors and the government need to solve major industry challenges. Key security executives also discussed DNS visibility, cloud security, patch management, APT strategies and supply chain woes.

Cloud 239
article thumbnail

The Time Is Now for IoT Security Standards

Dark Reading

Industry standards would provide predictable and understandable IoT security frameworks.

IoT 145
article thumbnail

Alleged Business Email Compromise Fraudsters Extradited

Data Breach Today

Schemers Spoofed Construction Companies to Bilk Universities Three Nigerian nationals accused of participating in multimillion-dollar business email compromise fraud with a fixation on universities arrived in the United States after extradition from the United Kingdom. They allegedly attempted to steal more than $5 million.

239
239
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Cross-Industry Group Launches Open Cybersecurity Framework

Dark Reading

18 companies led by Amazon and Splunk announced the OCSF framework, to provide a standard way for sharing threat detection telemetry among different monitoring tools and applications.

article thumbnail

Cyber Insurance: A Helping Hand But Premiums Are Rising

Data Breach Today

Kelly Butler Says Underwriting Requirements Are Becoming More Strict Cyber insurance can defray costs associated with data breaches and ransomware attacks. But Kelly Butler of the advisory firm Marsh & McLennan says insurers are tightening their requirements for policies due to rising costs associated with increasingly severe incidents.

Insurance 237
article thumbnail

92% of Organizations Have Experienced a Security Incident as a Result of an Email-Borne Threat

KnowBe4

New data shows that not only are email-borne threats increasing, but that current integrated cloud email security solutions do little to detect and stop advanced email-based threats.

article thumbnail

Cisco Hacked: Firm Traces Intrusion to Initial Access Broker

Data Breach Today

But Cisco Dismisses Claim by Yanluowang Group That It Fell Victim to Ransomware Cisco says it fell victim to a successful hack attack and data breach in May. While an attacker wielding Yanluowang ransomware claimed to have exfiltrated data and crypto-locked systems, Cisco says nothing sensitive was stolen and no systems were infected by ransomware.

Access 231
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hacking Starlink

Schneier on Security

This is the first —of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities, attackers can access the Starlink system and run custom code on the devices.

Access 92
article thumbnail

How Code Hardening Enables Mobile App Developers to Meet OWASP MASVS Recommendations

Data Breach Today

Why have attacks from rogue mobile apps grown by 49% in Q3?

244
244
article thumbnail

Phishing-as-a-Service Platform “Robin Banks” Helps Cybercriminals Target Customers of Financial Institutions

KnowBe4

Initial Access Brokers (IABs) are one of the new breeds of cybercrime services. But this newest PhaaS platform makes it easy for anyone to target banks for as little as $50 monthly.

article thumbnail

Fears for patient data after ransomware attack on NHS software supplier

The Guardian Data Protection

Attack being investigated for potential data theft as experts warn criminals could use stolen details as leverage A ransomware attack on an NHS software supplier last week is being investigated for potential theft of patient data, as experts warned that criminals could use personal information as leverage in negotiations. Advanced, which provides services for NHS 111 and patient records, said it was investigating “potentially impacted data” and that it would provide updates when it had more info

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Paypal Phishing Scam Uses “Legitimate” Invoices to Reach Victim Inboxes

KnowBe4

Newer phishing scams are looking for ways to make legitimate websites do the work of delivering malicious messages to unsuspecting victims – this new scam achieves it perfectly.

article thumbnail

BazarCall attacks have revolutionized ransomware operations

Security Affairs

The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack, aka call back phishing, is an attack vector that utilizes targeted phishing methodology and was first used by the Ryuk ransomware gang in 2020/2021. The BazarCall attack chain is composed of the following stages: Stage One.

article thumbnail

Microsoft: We Don't Want to Zero-Day Our Customers

Dark Reading

The head of Microsoft's Security Response Center defends keeping its initial vulnerability disclosures sparse — it is, she says, to protect customers.

article thumbnail

This Anti-Tracking Tool Checks If You’re Being Followed

WIRED Threat Level

The Raspberry Pi-powered device can scan for phones around you. If it keeps spotting the same one, it’ll send you an alert.

IT 95
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cisco Confirms Network Breach Via Hacked Employee Google Account

Threatpost

Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.

Access 98
article thumbnail

SolidBit Ransomware Targets League of Legends Players

KnowBe4

Researchers at Trend Micro warn that a SolidBit ransomware variant is being distributed via fraudulent software targeting video game players and social media users. The malware is being packaged with a fake League of Legends account checker and an Instagram follower bot. These tools have been posted on GitHub to trick users into installing them.

article thumbnail

Krebs: Taiwan, Geopolitical Headwinds Loom Large

Dark Reading

During a keynote at Black Hat 2022, former CISA director Chris Krebs outlined the biggest risk areas for the public and private sectors for the next few years.

Risk 79