Wed.May 03, 2023

article thumbnail

WinRAR Weaponized for Attacks on Ukrainian Public Sector

Data Breach Today

Ukraine Links Attacks to Russian Intelligence Sandworm Hackers Ukrainian cyber defenders say they spotted a malicious script used to activate the delete option on a Windows file archiving utility likely planted by the Russian intelligence agency unit Sandworm. CERT-UA says attackers likely used a compromised VPN credential to gain access.

Archiving 264
article thumbnail

Google Chrome Drops Browser Lock Icon

Dark Reading

Chrome 117 will retire the lock icon and replace it with a "tune" icon, reflecting evolving cybersecurity standards.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

XDR for ChromeOS: What Does It Mean for the Cyber Industry?

Data Breach Today

CrowdStrike's Michael Sentonas on Aiding Education Clients With XDR for Chromebooks CrowdStrike has focused on bringing its extended detection and response technology to users with less expensive devices such as Chromebooks by adding support for Google's ChromeOS. The pact will give CrowdStrike clients greater visibility into the security posture and compliance of ChromeOS devices.

IT 144
article thumbnail

Meta Expunges Multiple APT, Cybercrime Groups From Facebook, Instagram

Dark Reading

The company has removed three APTs and six potentially criminal networks from its platforms who leveraged elaborate campaigns of fake personas and profiles to lure and compromise users.

IT 98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US FTC Asks Meta to Limit Monetization, Facial Recognition

Data Breach Today

FTC Also Wants Confirmation That New & Modified Products Meet Privacy Requirements The U.S. Federal Trade Commission is seeking tougher sanctions for Facebook after determining that several gaps exist in the company's compliance with a 2020 consent decree mandating privacy improvements. The company will have 30 days to respond and could challenge tougher privacy rules in court.

Privacy 144

More Trending

article thumbnail

Irish Civil Society Dogs Irish DPC With GDPR Criticism

Data Breach Today

Irish Civil Liberties Council Files Complaint With European Commission Ombudsman A civil society group accused the Irish data protection agency of soft peddling enforcement of European privacy law in a complaint filed with the European Commission ombudsman. The Irish Council for Civil Liberties says the Irish Data Protection Commission leaves systemic problems unaddressed.

GDPR 144
article thumbnail

What is Legal Operations and How Does it Help Legal Departments

Hanzo Learning Center

The role of Legal Operations is becoming increasingly important in today's fast-paced and complex corporate legal department. With more companies expecting their legal departments to contribute to their overall vision and mission, as well as their bottom line, a greater emphasis has been placed on managing and optimizing these departments.

IT 94
article thumbnail

Police Seize Key Carder Market Infrastructure

Data Breach Today

US Indicts Russian National Denis Kulkov for Authenticating Stolen Credit Cards U.S. authorities revealed the Russian man behind a two-decade span of abetting cybercriminals' theft of credit cards, dismantled his online infrastructure and offered a hefty reward for information leading to his arrest. Prosecutors say the man, Denis Kulkov, ran a service now known as Try2Check.

Marketing 144
article thumbnail

Anatomy of a Malicious Package Attack

Dark Reading

Malicious packages are hard to avoid and hard to detect — unless you know what to look for.

132
132
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Reinventing Government: An Automation Leadership Guide

Data Breach Today

Moving from Alerts to Action: An Agency Exclusive SOAR Discussion

article thumbnail

Hackers are taking advantage of the interest in generative AI to install Malware

Security Affairs

Threat actors are using the promise of generative AI like ChatGPT to deliver malware, Facebook parent Meta warned. Threat actors are taking advantage of the huge interest in generative AI like ChatGPT to trick victims into installing malware, Meta warns. The hackers attempt to trick victims into installing malicious apps and browser extensions on their devices.

article thumbnail

Google Is Rolling Out Passkeys, the Password-Killing Tech, to All Accounts

WIRED Threat Level

The tech industry’s transition to passkeys gets its first massive boost with the launch of the alternative login scheme for Google’s billions of users.

article thumbnail

Passwordless sign-in with passkeys is now available for Google accounts

Security Affairs

Google announced the introduction of the passwordless secure sign-in with Passkeys for Google Accounts on all platforms. Google is rolling out the passwordless secure sign-in with Passkeys for Google Accounts on all platforms. Passwords are essential to protect services and data online, but when obtained by threat actors they can pose a risk to the users.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft 365 SharePoint Records Management Training Course on May 15th 9am-1pm CST via ARMA International

IG Guru

Are you a records manager seeking knowledge and experience in the Microsoft 365 ecosystem? Our partner Leadership Through Data has you covered with their 'Microsoft 365 SharePoint Records Management' training course. This four-day interactive program is designed by records managers for records managers, giving you an overview of Microsoft's compliance features from a standards perspective, how to assess information risk, and hands-on experience with practical exercises.

article thumbnail

Researchers found DoS flaws in popular BGP implementation

Security Affairs

Vulnerabilities in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to trigger a DoS condition on BGP peers. Forescout Vedere Labs researchers discovered multiple vulnerabilities in the software implementation of the Border Gateway Protocol (BGP). The issues reside in the BGP message parsing in version 8.4 of FRRouting implementation, a leading open-source implementation of the protocol.

article thumbnail

Hotels at Risk From Bug in Oracle Property Management Software

Dark Reading

Oracle's characterization of the vulnerability in its Opera software as complex and hard to exploit is incorrect, researchers who found the flaw and reported it say.

Risk 84
article thumbnail

Authorities dismantled the card-checking platform Try2Check

Security Affairs

Authorities dismantled the Try2Check platform, a Card-Checking platform that generated tens of millions of dollars in revenue. The U.S. DoJ charged the Russian citizen Denis Gennadievich Kulkov with running the Card-Checking services. The platform has been active since 2005, according to the DoJ, it generated tens of millions of dollars in revenue. The service allowed crooks to check the status of bulks of stolen credit card data that were purchased or sold by cybercriminals. “Try2Check ra

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DNA Sequencing Equipment Vulnerability Adds New Twist to Medical Device Cyber Threats

Dark Reading

A vulnerability in a DNA sequencer highlights the expanded attack surface area of healthcare organizations but also shows that reporting of medical device vulnerabilities works.

111
111
article thumbnail

Meta Moves to Counter New Malware and Repeat Account Takeovers

WIRED Threat Level

The company is adding new tools as bad actors use ChatGPT-themed lures and mask their infrastructure in an attempt to trick victims and elude defenders.

article thumbnail

SolarWinds Detected Six Months Earlier

Schneier on Security

New reporting from Wired reveals that the Department of Justice detected the SolarWinds attack six months before Mandient detected it in December 2020, but didn’t realize what they detected—and so ignored it. WIRED can now confirm that the operation was actually discovered by the DOJ six months earlier, in late May 2020­but the scale and significance of the breach wasn’t immediately apparent.

article thumbnail

Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023

Thales Cloud Protection & Licensing

Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023 madhav Wed, 05/03/2023 - 08:08 From May 9 to May 12, 2023, Berlin will host the European Identity and Cloud Conference (EIC), organized by industry analyst KuppingerCole. The EIC conference is where the digital identity and cyber community come together to set the course for the future of digitization.

Cloud 71
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Generative AI Tools Aim to Improve Security

Dark Reading

The debate over whether ChatGPT and other generative AI tools will benefit defenders or further embolden attackers may be ongoing, but companies are going forward with new tools.

article thumbnail

WSJ: "Merck’s Insurers On the Hook in $1.4 Billion NotPetya Attack, Court Says"

KnowBe4

I get the WSJ Cybersecurity newsletter, which by the way is warmly recommended. Kim Nash today reported a shocker which will make everyone's insurance premiums go even further up: " Six years after the worldwide NotPetya cyberattack, a court ruled insurers for Merck & Co. must help cover $1.4 billion in losses.

article thumbnail

Legitimate Software Abuse: A Disturbing Trend in Ransomware Attacks

Dark Reading

Build a culture of security so that everyone is on the lookout for suspect behavior. Implement least privilege, improve visibility.

article thumbnail

Adapture Recognized with Pacesetter Award

Adapture

IT Consultancy Recognized by the Atlanta Business Chronicle for Exceptional Growth ATLANTA, May 3, 2023— Adapture was recognized on April 27th with the Atlanta Business Chronicle’s Pacesetter Award. This award recognizes the 100 fastest growing companies in Atlanta. Adapture placed in the top 10 among technology companies and 54 th overall. This is the third time Adapture has been recognized, the previous times being 2017 and 2018.

Sales 59
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Court Rejects Merck Insurers' Attempt to Refuse Coverage for NotPetya Damages

Dark Reading

Insurers unsuccessfully argued Merck's $1.4B in losses following NotPetya cyberattack fell under wartime exclusion.

article thumbnail

Tennessee Privacy Law Recognizes CBPR and PRP Certifications

Hunton Privacy

On April 21, 2023, the Tennessee legislature voted to enact the Tennessee Information Privacy Act ( H.B. 1181 )(“TIPA”). TIPA includes a requirement for controllers and processors to create, maintain and comply with a written privacy program that reasonably conforms to the National Institute of Standards and Technology (NIST) privacy framework. Under TIPA, the scale and scope of a controller or processor’s privacy program is appropriate if it is based on specific factors enumerated in the law.

Privacy 55
article thumbnail

What's the Secret to Finding the Next Big Thing in Cybersecurity?

Dark Reading

Varun Badhwar, who has brought each of the three startups he founded to the finals of the RSAC Innovation Sandbox, talks about how to see around the corner.