Wed.Aug 09, 2023

article thumbnail

Lawsuits Mounting Against Florida Hospital in Wake of Breach

Data Breach Today

So Far, 3 Proposed Class Actions Allege Negligence in Case Affecting 1.3M People Tampa General Hospital is facing at least three proposed federal class action lawsuits filed in recent days following the nonprofit Florida healthcare provider's disclosure late last month of a data theft incident that affected 1.3 million patients and employees.

246
246
article thumbnail

News alert: Fireblocks uncovers vulnerabilities impacting dozens of major wallet providers

The Last Watchdog

New York, N.Y., Aug.9, 2023 – Today, the Fireblocks Cryptography Research Team announced the findings of multiple zero-day vulnerabilities in some of the most used cryptographic multi-party computation (MPC) protocols, including GG-18, GG-20, and implementations of Lindell 17. If left unremediated, the exposures would allow attackers and malicious insiders to drain funds from the wallets of millions of retail and institutional customers in seconds, with no knowledge to the user or vendor.

Retail 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rapid7 Lays Off 18% of Employees Amid Shift to MDR Services

Data Breach Today

Loss of 470 Workers Is Cybersecurity Industry's Second-Largest Workforce Reduction Rapid7 will lay off close to 1 in 5 of its employees in cuts that amount to the second-largest round of layoffs of any pure-play cybersecurity company since worries about an economic downturn began percolating in spring 2022. The vendor will reduce its 2,623-person staff by 18%.

article thumbnail

Windows Defender-Pretender Attack Dismantles Flagship Microsoft EDR

Dark Reading

A newly patched flaw in Windows Defender allows attackers to hijack the signature-update process to sneak in malware, delete benign files, and inflict mayhem on target systems.

98
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Law Enforcement Takes Down Phishing As A Service Site

Data Breach Today

Authorities In Multiple Countries Arrest Operators of 16Shop An international law enforcement operation took down a phishing-as-a-service website that security researchers say was responsible for more than 150,000 phishing domains. The site, 16shop, sold phishing kits that targeted more than 70,000 people in 43 countries.

Phishing 244

More Trending

article thumbnail

Northern Ireland Police at Risk After Serious Data Breach

Data Breach Today

Current PSNI Employees' Surnames and Locations Revealed Via Public Spreadsheet Police officers in Northern Ireland are sounding alarms over their personal safety after a data breach revealed the surnames and locations where they serve for nearly 10,000 police officers and staff. Experts warn this could lead to "their death or injury" at the hands of criminals or terrorists.

article thumbnail

Understanding Security Frameworks: Guide for IT Security Professionals

Jamf

In this webinar series, Aaron Webb explains what security frameworks are, their importance and explains the critical role they play when securing your organization’s environment. This includes the importance of establishing risk management and compliance best practices and how Jamf solutions brings together device management, user identity and endpoint security for a comprehensive security solution based on the security framework that meets your organizational needs.

article thumbnail

Finland and Norway Ban Yango's Data Transfer to Russia

Data Breach Today

Move Comes as Russia Allows a Law Permitting Access to Taxi User Data Data protection agencies in Finland and Norway on Tuesday imposed a temporary data transfer ban on Russian ride-hailing app Yango over concerns that Moscow could access sensitive data of Europeans. The ban comes before a Russian law granting the FSB access to taxi users' data takes effect Sept. 1.

Access 241
article thumbnail

Balada Injector still at large – new domains discovered

Security Affairs

The Balada Injector is still at large and still evading security software by utilizing new domain names and using new obfuscation. During a routine web monitoring operation, we discovered an address that led us down a rabbit hole of WordPress-orientated “hack waves” caused by the Balada Injector malware. This evidence suggests that the malware is still at large and still evading security software by utilizing new domain names and slight changes between the waves of obfuscated attacks.

Access 96
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Defending Against Real-Time Financial Fraud

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alisdair Faulkner of security and fraud prevention startup Darwinium discussed how the FedNow Service will add a layer of complexity to defending against real-time financial fraud scams used in faster payments transactions.

article thumbnail

EvilProxy used in massive cloud account takeover scheme

Security Affairs

Cloud account takeover scheme utilizing EvilProxy hit over 100 top-level executives of global organizations EvilProxy was observed sending 120,000 phishing emails to over a hundred organizations to steal Microsoft 365 accounts. Proofpoint noticed a worrisome surge of successful cloud account compromises in the past five months. Most of the attacks targeted high-ranking executives.

Cloud 95
article thumbnail

Ukraine Fends Off Sandworm Battlefield Espionage Ploy

Data Breach Today

Russian Military Hackers Planned Mobile Device Malware Campaign Ukrainian cyber defenders said they had thwarted an attempt by Russian military intelligence to deploy widespread malware programmed to spy on battlefield management apps. Russian hackers' preparation for the malware campaign was "long-term and thorough," Ukraine's SBU said.

Military 223
article thumbnail

New PCI Password Requirements Could Be the Impetus for Credential Harvesting Scams

KnowBe4

As the retirement countdown for the current version of PCI is now less than six months, a new standard for password length, complexity, and change frequency may create some risk.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Hackers Rig Casino Card-Shuffling Machines for ‘Full Control’ Cheating

WIRED Threat Level

Security researchers accessed an internal camera inside the Deckmate 2 shuffler to learn the exact deck order—and the hand of every player at a poker table.

Access 98
article thumbnail

Scammers Exploit Twitter’s Transition to “X”

KnowBe4

Scammers are taking advantage of Twitter’s rebranding to “X,” according to Stephanie Adlam at Gridinsoft. A phishing campaign is targeting Twitter Blue users by telling them they need to transfer their subscription to X.

article thumbnail

It's Time for Cybersecurity to Talk About Climate Change

Dark Reading

From e-waste to conference swag to addressing data center energy consumption, cybersecurity stakeholders need a whole-industry approach to being part of the solution and reducing the risk of climate change.

article thumbnail

Wordfence Becomes the Latest Brand to be Impersonated Putting 800 Million Sites at Risk

KnowBe4

With its wide use and trusted state among Wordpress developers and website admins, a new campaign impersonating the website security brand could put hundreds of millions of websites at risk.

Risk 88
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Downfall' Bug in Billions of Intel CPUs Reveals Major Design Flaw

Dark Reading

A newly revealed flaw affects a good chunk of the world's computers. A patch has been released, but broad, structural change in CPU design will be required to address the root cause.

88
article thumbnail

Australians Reporting Alarming Number of Losses to Vishing and Smishing Scams

KnowBe4

We know that scam calls (aka vishing) and scam SMSs (aka smishing) are out of control, and for most unaware Australians, they continue to cause pain and suffering. According to the Australian Competition and Consumer Commission (ACCC) Australians reported at least $3.1 billion in scam losses in 2022, an 80% increase from 2021. What that says to me is that something is missing.

article thumbnail

What is a phishing simulation?

IBM Big Data Hub

A phishing simulation is a cybersecurity exercise that tests an organization’s ability to recognize and respond to a phishing attack. A phishing attack is a fraudulent email, text or voice message designed to trick people into downloading malware (such as ransomware ), revealing sensitive information (such as usernames, passwords or credit card details) or sending money to the wrong people.

article thumbnail

Record ¥3 bil stolen via phishing in Japan in 1st half of 2023

KnowBe4

A record 2,322 scams in Japan to steal internet banking IDs and passwords have resulted in unauthorized money transfers totaling a record of around 3 billion yen ($21 million) in the first half of this year, a report by the National Police Agency showed Tuesday.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Connecting IBM VPC to IBM Power Virtual Servers and IBM Cloud Object Storage

IBM Big Data Hub

In the ever-evolving landscape of cloud computing, businesses are continuously seeking robust, secure and flexible solutions to meet their IT infrastructure demands. In this post, we’ll discuss connecting the robust IBM Power Virtual Servers service to the secure IBM Cloud Virtual Private Cloud environment using IBM Cloud to support diverse workloads.

Cloud 85
article thumbnail

Disposed-of Gadgets Can Lead to Wi-Fi Network Hacks, Kaspersky Says

Dark Reading

Wi-Fi settings are easily stolen when old gadgets are gotten rid of, which puts end users in the crosshairs for network attacks.

97
article thumbnail

Using Machine Learning to Detect Keystrokes

Schneier on Security

Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy. “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards” Abstract: With recent developments in deep learning, the ubiquity of microphones and the rise in online services via personal devices, acoustic side channel attacks present a greater threat to keyboards than ever.

Paper 73
article thumbnail

New LLM Tool Seeks and Remediates Vulnerabilities

Dark Reading

At Black Hat USA 2023, Vicarius launched vuln_GPT, which it says will generate and execute scripts to ameliorate flaws such as the TETRA backdoor.

IT 87
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to Remove Your Info From Google With the 'Results About You' Tool

WIRED Threat Level

You can also set up alerts for whenever your home address, phone number, or email address appears in Search.

article thumbnail

Downfall Intel CPU side-channel attack exposes sensitive data

Security Affairs

Google researcher Daniel Moghimi devised a new side-channel attack technique, named Downfall, against Intel CPU. Google researcher Daniel Moghimi devised a new side-channel attack technique Intel CPU, named Downfall, that relies on a flaw tracked as CVE-2022-40982. An attacker can exploit this vulnerability to access and steal data from other users who share the same systems.

article thumbnail

Interpol Shuts Down African Cybercrime Group, Seizes $2 Million

Dark Reading

Operation Jackal involved law enforcement agencies in 21 countries and yielded more than 100 arrests.

98