Mon.Mar 22, 2021

article thumbnail

Cybercrime Forum Administrator Sentenced to 10 Years in Prison

Data Breach Today

Sergey Medvedev Was Co-Creator of Infraud Organization's Carding Forum A Russian national who co-founded the Infraud Organization's online cybercrime forum, which trafficked in stolen payment card data and was tied to more than $560 million in fraud losses, has been sentenced to serve 10 years in prison.

310
310
article thumbnail

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. There’s a lot of fluff about glitterbombs and the like, but the details are interesting. The scammers convince the victims to give them remote access to their computers, and then that they’ve mistyped a dollar amount and have received a large refund that they didn’t deserve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Charm Offensive: Ransomware Gangs 'Tell All' in Interviews

Data Breach Today

REvil, MountLocker and LockBit Operators Describe Strategies and Target Selection Ransomware-wielding attackers have been in the limelight lately - not just for hitting Acer, Dassault Falcon and celebrity law firms but also for granting tell-all interviews that describe their tactics and motivations.

article thumbnail

Which is the Threat landscape for the ICS sector in 2020?

Security Affairs

The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a report that provided details about the threat landscape for ICS engineering and integration sector in 2020. The experts gathered data related to the cyberthreats that were blocked on computers used to manage industrial control equipment and targeting software used in ICS engineering and integration industry,

Phishing 124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

VMware, Recorded Future, Others Announce M&A Deals

Data Breach Today

Five Cybersecurity Deals Revealed in 2 Weeks, Continuing Consolidation Trend This year's brisk cybersecurity sector M&A activity is continuing, with five more deals announced in the last two weeks. Here's a rundown of the latest activity.

More Trending

article thumbnail

Remote Work Creates Insider Threat Concerns

Data Breach Today

Dr. Margaret Cunningham of Forcepoint X-Labs Describes Risky Remote Worker Behaviors Recent research highlights the growth in risky remote work behaviors. Dr. Margaret Cunningham of Forcepoint X-Labs discusses the implications of this increase in insider threats and provides risk mitigation insights.

Risk 280
article thumbnail

CIPL Publishes Recommendations on a Risk-Based Approach to Regulating AI

Hunton Privacy

On March 22, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published its paper on delivering a risk-based approach to regulating artificial intelligence (the “Paper”), with the intention of informing current EU discussions on the development of rules to regulate AI. CIPL partnered with key EU experts and leaders in AI in drafting the Paper, translating best practices and emerging policy trends into actionable recommendations for effective AI regulation.

Risk 111
article thumbnail

Attackers Exploiting F5 Networks' BIG-IP Vulnerability

Data Breach Today

Flaw in Network Traffic Security Management Platform Ranked as Highly Critical Attackers are exploiting a critical remote code vulnerability in F5 Networks' BIG-IP server network traffic security management platform, for which the company released patches on March 10. The vulnerability is considered highly critical.

Security 269
article thumbnail

3 Classes of Account Fraud That Can Cost Your Company Big Time

Dark Reading

Understanding each one can go a long way toward demystifying the topic as a whole - and combatting the threat.

134
134
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Swiss Firm Says It Accessed SolarWinds Attackers' Servers

Data Breach Today

Prodaft: APT Group Uses 'Unprecedented Malware Detection Sandbox' Swiss cybersecurity firm Prodaft says it has accessed several servers used by an advanced persistent threat group tied to the SolarWinds supply chain attack. These attackers continue to target large corporations and public institutions worldwide, with a focus on the U.S. and the European Union, the researchers say.

Access 230
article thumbnail

RCE flaw in Apache OFBiz could allow to take over the ERP system

Security Affairs

The Apache Software Foundation fixed a high severity remote code execution flaw in Apache OFBiz that could have allowed attackers to take over the ERP system. The Apache Software Foundation addressed last week a high severity vulnerability in Apache OFBiz, tracked as CVE-2021-26295 , that could have allowed a remote, unauthenticated attacker to take over the ERP system.

Cloud 102
article thumbnail

Microsoft Exchange Flaw: Attacks Surge After Code Published

Data Breach Today

Strikes Increase After ProxyLogon Proof-of-Concept Attack Code Released There has been a spike in web shells being detected as ransomware gangs and other attackers increasingly target vulnerable on-premises Microsoft Exchange servers following publication of proof-of-concept attack code for ProxyLogon, which is one of four zero-day flaws patched by Microsoft in early March.

article thumbnail

Abusing distance learning software to hack into student PCs

Security Affairs

Experts uncovered critical flaws in the Netop Vision Pro distance learning software used by many schools to control remote learning sessions. McAfee discovered multiple security vulnerabilities in the Netop Vision Pro popular distance learning software which is used by several teachers to control remote learning sessions. . The distance learning software implements multiple features, including viewing student screens, chat functions, and freezing student screens.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CISA Warns of Security Flaws in GE Power Management Devices

Threatpost

The flaws could allow an attacker to access sensitive information, reboot the UR, gain privileged access, or cause a denial-of-service condition.

Security 111
article thumbnail

Adobe addresses a critical vulnerability in ColdFusion product

Security Affairs

Adobe has released security updates to address a critical vulnerability in the ColdFusion product (versions?2021, 2016, and?2018) that could lead to arbitrary code execution.?. Adobe has released security patches to address a critical vulnerability in Adobe ColdFusion that could be exploited by attackers to execute arbitrary code on vulnerable systems.

article thumbnail

7 Reasons Your Clients Will Love Onehub

OneHub

Meeting clients’ needs is the number one goal of successful businesses. For many companies, meeting those needs involves a significant amount of client interaction and collaboration. The processes and software you use to collect information from clients are just as important as the final product or service you provide them. Onehub was created with these needs in mind, and our platform consistently wows clients with its user-friendly interface, top-notch security, and robust functionality.

Sales 98
article thumbnail

Trial Court Examines Stored Communications Act Applicability to Offline Mobile Phone

DLA Piper Privacy Matters

The Electronic Communications Privacy Act (ECPA) is a law noted for its complexity, and the second portion of it, the Stored Communications Act (SCA) is no exception. In a recent case in the Seventh Circuit, the District Court for the Northern District of Illinois examined the scope of the SCA and what it was, and was not, intended to cover. At its core, the SCA applies to communications that are in “electronic storage.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Former ARMA Executive Director Joins IPRO as Director of Information Governance via EINPRESSWIRE

IG Guru

Check out the link here. The post Former ARMA Executive Director Joins IPRO as Director of Information Governance via EINPRESSWIRE appeared first on IG GURU.

article thumbnail

Adobe Fixes Critical ColdFusion Flaw in Emergency Update

Threatpost

Attackers can leverage the critical Adobe ColdFusion flaw to launch arbitrary code execution attacks.

Security 114
article thumbnail

Top 3 Cybersecurity Lessons Learned From the Pandemic

Dark Reading

Defending an enterprise of fully remote employees and their devices at this scale and speed had never been done before. Now, we do it every day.

article thumbnail

ICRM Announces Virtual Exam Prep Workshops

IG Guru

ICRM Virtual Exam Prep Workshops will be hosted as a series of 4-hour half day workshops for CRA, CRM and Part 6 Practice Business Case. In addition, there will be two presentations offered a la carte to the end of the CRM Half Day Workshop for the Post Certification Specialty Designations for Nuclear Specialist and […]. The post ICRM Announces Virtual Exam Prep Workshops appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Researchers Discover Two Dozen Malicious Chrome Extensions

Dark Reading

Extensions are being used to serve up unwanted adds, steal data, and divert users to malicious sites, Cato Networks says.

128
128
article thumbnail

The Opportunity Narrative

Information Governance Perspectives

We can count on the fact that entrepreneurs and technology enterprises will continue to invent, innovate, and disrupt the status quo. For the foreseeable future, there will be jobs and careers for speeding the introduction and adoption of new technologies and building operationalization capabilities (accountabilities, workflows, and systems). Experimenters, early adopters, early majority, late majority, and laggards will all have jobs to do.

69
article thumbnail

Acer Reportedly Hit With $50M Ransomware Attack

Dark Reading

Reports say a ransomware gang has given Acer until March 28 to pay, or it will double the ransom amount.

article thumbnail

Critical Security Bugs Fixed in Virtual Learning Software

Threatpost

Remote ed software bugs give attackers wide access student computers, data.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Edge Pro Tip: The Feds Are Your Friends

Dark Reading

Here's what to expect when you report an insider incident to the FBI.

104
104
article thumbnail

Advisory Solutions, Jamf partner adding value to the Apple ecosystem

Jamf

With more than 40,000 customers managing over 20 million Apple devices, there are more customers, partners and third-party vendors creating solutions around the Jamf ecosystem.

52
article thumbnail

CSA & ISACA Team Up on Cloud Auditing Certificate

Dark Reading

The Certificate of Cloud Auditing Knowledge aims to fill a gap in the market for cloud IT auditing as more organizations work in cloud environments.

Cloud 74