Mon.Jul 11, 2022

article thumbnail

Crema Finance Issues Recovery Plans After $8.8M Crypto Hack

Data Breach Today

Audit, Bounty Plan Issued Following $1.7M Bounty Paid to Hacker For Stolen Funds Crema Finance has published its compensation and recovery plans, following last week's $8.8 million hack on the Solana blockchain-powered concentrated liquidity protocol. The hacker has returned the stolen funds, in exchange for a bounty offered by the company.

article thumbnail

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

The Last Watchdog

It is astounding that billions of online accounts have been breached over the past 18 years and that US consumer accounts are by far the most compromised. Related: VPNs vs ZTNA. Now comes hard metrics quantifying the scope of this phenomenon. It’s in findings of a deep dive data analytics study led by Surfshark , a supplier of VPN services aimed at the consumer and SMB markets.

Security 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recorded Future Buys Hatching for More Malware Visibility

Data Breach Today

Hatching to Give Recorded Future Clients Clearer View of Malware Campaigns Recorded Future has purchased malware analysis startup Hatching to give its clients better visibility into active campaigns in the wild. Data gathered by Hatching's malware sandboxing tool will benefit both companies, providing clients with a view of malware trends, targets and sources.

IT 288
article thumbnail

New Highly-Evasive Linux Malware Infects All Running Processes

eSecurity Planet

Intezer Labs security researchers have identified a sophisticated new malware that targets Linux devices. Dubbed OrBit , the malware can gain persistence quickly, evade detection and hide its presence in network activity by manipulating logs. The module hooks functions called in shared libraries, which is pretty common for malware, but it also implements “advanced evasion techniques” and “remote capabilities over SSH.”.

Libraries 144
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Aerojet Rocketdyne Pays $9M to Settle Cybersecurity Lawsuit

Data Breach Today

Company Accused of Misrepresenting Its Defenses to Federal Government A federal contractor that makes rocket propulsion systems will pay $9 million to settle allegations from a former executive that it misled the U.S. government over the state of its cybersecurity defenses even after it suffered nation-state hacks. Aerojet Rocketdyne is not admitting any liability.

More Trending

article thumbnail

How Double-Extortion Attacks Vary By Victims' Sector

Data Breach Today

Ransomware attackers executing double-extortion schemes very carefully choose which data to steal and leak based on victims' economic sector, says Erick Galinkin, artificial intelligence researcher at security firm Rapid7. He discusses the latest ransomware data theft trends.

article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q2 2022

IT Governance

Welcome to our second quarterly review of security incidents for 2022, in which we take a closer look at the information gathered in our monthly list of data breaches and cyber attacks. In this article, you’ll find an overview of the cyber security landscape from the past three months, including the latest statistics and our observations. This includes year-on-year comparisons in the number of publicly disclosed data breaches, a review of the most breached sectors and a running total of inciden

article thumbnail

Top 5 Tips for Defending Your Endpoints

Data Breach Today

In today's extended enterprise, there are more endpoints than ever - and the adversaries will take advantage of any vulnerability. Nirav Shah of Cisco offers insights on the top five tips for defending these endpoints, as well as questions you need to be asking of prospective service providers.

244
244
article thumbnail

Experts warn of the new 0mega ransomware operation

Security Affairs

BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide. 0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported. The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Puerto Rico Commits $7.6M to Boost Cybersecurity

Data Breach Today

Island Hopes to Diminish Spate of Ransomware and Phishing Incidents The government of Puerto Rico announced an investment of $7.6 million toward strengthening cybersecurity on the island. The island has undergone a string a embarrassing cybersecurity incidents, including a phishing incident that stole $2.6 million of taxpayer dollars.

article thumbnail

Anubis Networks is back with new C2 server

Security Affairs

A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign is targeting Internet-end users in Brazil and Portugal since March 2022. Anubis Network is a C2 portal developed to control fake portals and aims to steal credentials to fully access the real systems. This C2 server is controlled by a group of operators that come from the previous analysis in 2022, the various brands being divided among the operators of

Phishing 100
article thumbnail

Don't Pay Ransoms, UK Government and Privacy Watchdog Urge

Data Breach Today

Authorities Still Seeing a Strong Flow of Payments to Ransomware-Wielding Criminals Please don't pay ransoms, authorities continue to urge. Britain's lead cyber agency and privacy watchdog are now making that appeal directly to legal advisers, warning them that paying a ransom offers no data protection upsides and won't lessen any fine they might face.

Privacy 237
article thumbnail

All it Takes is “Free” Beer to Steal Your Personal Data

KnowBe4

A recent phishing scam impersonating the Heineken beer brand demonstrates how very little effort is needed by scammers to convince victims to give up all kinds of personal information.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Rethinking Vulnerability Management in a Heightened Threat Landscape

Threatpost

Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist.

89
article thumbnail

Diversity in Cybersecurity: Fostering Gender-Inclusive Teams That Perform Better

Dark Reading

Proactive steps in recruiting women to cybersecurity teams, along with policies focused on diversity, equity, and inclusion, help make cybersecurity teams more effective. Addressing specific barriers that female candidates face will make those teams more inclusive and more representative.

article thumbnail

The January 6 Insurrection Hearings Are Just Heating Up

WIRED Threat Level

The US House committee has already uncovered a more organized and sinister plot than many imagined. But history suggests the worst may be yet to come.

article thumbnail

BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands

Security Affairs

BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate BlackCat competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network. Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, has detected a significant increase in the value of ransom demand requests by

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

KnowBe4 Named a Leader in the Summer 2022 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

A fake job offer via LinkedIn allowed to steal $540M from Axie Infinity

Security Affairs

Threat actors used a f ake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft of $540 Million. In March, threat actors stole almost $625 million in Ethereum and USDC (a U.S. dollar pegged stablecoin) tokens from Axie Infinity’s Ronin network bridge. The attack took place on March 23rd, but the cyber heist was discovered after a user was unable to withdraw 5,000 ether.

article thumbnail

KnowBe4 Named a Leader in the Summer 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Summer 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the fifth consecutive quarter!

article thumbnail

Fake Google Software Updates Spread New Ransomware

Dark Reading

"HavanaCrypt" is also using a command-and-control server that is hosted on a Microsoft Hosting Service IP address, researchers say.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Multi-Medium Phishing Tactics Increase Attack Effectiveness by 300%

KnowBe4

New data from IBM shows how attackers are leveraging more than just email to elevate their chances of reaching their malicious goals – and their victims are helping them do it.

article thumbnail

'Luna Moth' Group Ransoms Data Without the Ransomware

Dark Reading

Unsophisticated campaigns use off-the-shelf RATs and other tools to exfiltrate data and demand a ransom to keep it private.

article thumbnail

Popular NFT Marketplace Phished for $540M

Threatpost

In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.

article thumbnail

Proposed SEC Rules Require More Transparency About Cyber-Risk

Dark Reading

The new guidelines would require public companies to file periodic disclosures about their cybersecurity practices and notify the SEC within 96 hours of a material breach.

Risk 81
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

World Youth Skills Day 2022: Addressing the CyberSec Skills Gap

Thales Cloud Protection & Licensing

World Youth Skills Day 2022: Addressing the CyberSec Skills Gap. divya. Tue, 07/12/2022 - 05:20. In 2014, the United Nations General Assembly adopted a resolution recognizing July 15 as World Youth Skills Day. This annual observance is intended to promote the development and empowerment of young people and to mobilize society in addressing the skills gap.

article thumbnail

Nigerian Prison Break

Schneier on Security

There was a massive prison break in Abuja, Nigeria: Armed with bombs, Rocket Propelled Grenade (RPGs) and General Purpose Machine Guns (GPMG), the attackers, who arrived at about 10:05 p.m. local time, gained access through the back of the prison, using dynamites to destroy the heavily fortified facility, freeing 600 out of the prison’s 994 inmates, according to the country’s defense minister, Bashir Magashi… What’s interesting to me is how the defenders got the threat mo

article thumbnail

Paladin Cloud Launches New Cloud Security and Governance Platform

Dark Reading

The new open source security-as-code platform will help developers and security teams automatically detect security policy violations across the organization's cloud infrastructure.

Cloud 72