Wed.Apr 05, 2023

article thumbnail

Spanish Police Arrest 'Dangerous' Teenage Hacker

Data Breach Today

19-Year-Old José Huerta Allegedly Hacked A Government File Transfer System Spanish National Police arrested Friday a teenager hacker who allegedly stole the sensitive data of more than half a million taxpayers from the national revenue service and boasted in an online podcast about having access to personal data of 90 percent of the population.

article thumbnail

Researcher Tricks ChatGPT into Building Undetectable Steganography Malware

Dark Reading

Using only ChatGPT prompts, a Forcepoint researcher convinced the AI to create malware for finding and exfiltrating specific documents, despite its directive to refuse malicious requests.

IT 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Police Seize Hacker Bazaar Genesis Market

Data Breach Today

International Operation Led by FBI Results in Hundreds of Arrests The FBI and other national police are touting an operation that dismantled Genesis Market, a marketplace used by ransomware hackers and bank thieves to gain ongoing access to victims' computers. Genesis Market since 2018 offered access to more than 1.5 million compromised computers around the world.

Marketing 251
article thumbnail

How to Prevent Malware Attacks: 8 Tips for 2023

IT Governance

Malware is one of the most common cyber security threats that organisations and individuals face. Whenever someone talks about their computer being infected, encountering bots or even falling victim to a scam email, malware is normally involved. It’s why anti-malware software is usually considered a top priority for staying safe online. However, those tools are not flawless.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

OpenText, Google, Varonis Lead Data Security Forrester Wave

Data Breach Today

OpenText, Varonis, Forcepoint Enter Leaders Category While Trellix, Broadcom Fall OpenText, Varonis and Forcepoint joined Google and Microsoft atop Forrester's data security rankings, while Trellix and Broadcom fell from the leaders category. Data protection historically focused on delivering security controls, but firms are increasingly looking to address adjacent use cases.

Security 205

More Trending

article thumbnail

Army Doc Seeks Separate Trial From Spouse in Records Case

Data Breach Today

Prosecutors Allege the Couple Sought to Give US Military Medical Records to Russia A former U.S. Army physician set to go to trial next month in a case alleging a scheme to provide military medical records to the Russian government contends they will not get a fair trial unless they are tried separately from their alleged co-conspirator spouse.

Military 144
article thumbnail

Chambers 2023 Global Practice Guides for Data Protection & Privacy and Cybersecurity Available

Data Matters

The updated 2023 Chambers Global Practice Guides for Data Protection & Privacy and Cybersecurity, edited by Alan Charles Raul , are available now, covering important developments across the globe and offering insightful legal commentary for businesses. The post Chambers 2023 Global Practice Guides for Data Protection & Privacy and Cybersecurity Available appeared first on Data Matters Privacy Blog.

Privacy 104
article thumbnail

US Prosecutors Indict Estonian for Selling Metasploit

Data Breach Today

Andrey Shevlyakov Has History of Flouting Export Controls U.S. federal prosecutors say an Estonian man was prepared violate U.S. export regulations by selling a license for penetration testing software to a Russian individual. Andrey Shevlyakov has been on a U.S. blacklist known as the Entity List since 2012.

144
144
article thumbnail

Over 15 Million Systems Exposed to Known Exploited Vulnerabilities

eSecurity Planet

Effective vulnerability management is about knowing what you own and prioritizing what you need to fix. A new research report shows that millions of organizations are failing at those critical cybersecurity practices. Researchers at cybersecurity firm Rezilion found more than 15 million instances in which systems are vulnerable to the 896 flaws listed in the U.S.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Rorschach Ransomware Opts for Speed and Stealth, Not Hijinks

Data Breach Today

'Quiet' Malware Also Dubbed 'BabLock' for Its Borrowing From Babuk and LockBit Not every ransomware group uses a larger-than-life persona designed to scare victims into immediately acceding to bogeyman extortionists' demands. Recently discovered Rorschach - aka BabLock - ransomware, researchers have found, opts instead for speed, stealth and more modest ransom demands.

article thumbnail

IT Governance Podcast 2023-7: Capita, ChatGPT and TikTok (yet again)

IT Governance

This week, we discuss a cyber attack on the outsourcing giant Capita, Italy’s ban on OpenAI’s ChatGPT chatbot and further bad news for TikTok: a £12.7 million fine from the ICO for breaching UK data protection law. Now available on Spotify , Amazon Music , Apple Podcasts and SoundCloud. The post IT Governance Podcast 2023-7: Capita, ChatGPT and TikTok (yet again) appeared first on IT Governance UK Blog.

article thumbnail

Best Practices to Pass an IT Security Audit

Data Breach Today

Josh Hankins of Qualys on Tips and Tricks He Learned as a Practitioner Before he became a chief technical security officer at Qualys, Josh Hankins was a cybersecurity leader in financial services. He learned how security audit failures are increasingly costly, and he devised new strategies for audit preparation. He shares his insights here.

article thumbnail

Garage Door Openers Open to Hijacking, Thanks to Unpatched Security Vulns

Dark Reading

CISA is advising Nexx customers to unplug impacted devices until the security issues are addressed — but so far, it's crickets as to patch timeline.

Security 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FBI: 870 Critical Infrastructure Organizations Were the Victim of Ransomware in 2022

KnowBe4

The FBI’s newly-released report shows just how ransomware continues to plague critical infrastructure sectors, despite the U.S. government’s recent efforts to stop these attacks.

article thumbnail

Another Password Manager Breach: Practical Tips to Protect Stolen Credentials

Outpost24

Another Password Manager Breach: Practical Tips to Protect Stolen Credentials 05.Apr.2023 Florian Barre Wed, 04/05/2023 - 04:22 Password security Teaser In light of recent password manager breaches, our experts have provided tips on how to protect your organization from compromised credentials.

article thumbnail

That’s Not Actually Mr. Musk, That's a Scam

KnowBe4

A school principal in Volusia County, Florida has resigned after sending $100,000 to a scammer posing as Elon Musk, WESH 2 News reports. Dr. Jan McGee from the Burns Science and Technology Charter School had been in communication with the individual for four months, even though her colleagues warned her that it was a scam.

article thumbnail

QNAP Zero-Days Leave 80K Devices Vulnerable to Cyberattack

Dark Reading

Multiple QNAP operating systems are affected, including QTS, QuTS hero, QuTScloud, and QVP Pro appliances, and some don't yet have patches available.

103
103
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Animal Identification Powered by RFID Is Not Just for Livestock Management

HID Global

HID's RFID-enabled animal ID solutions cover industries ranging from livestock management, fish conservation, laboratory animal data tracking, to pet safety.

98
article thumbnail

How Long Does It Take To Recover From a Ransomware Attack?

KnowBe4

When I was in my 30s, I woke up one morning with a terrible pain shooting down one side of my back and around the side. The pain was so terrible, I could barely move, and was only able to move my neck slightly to look down, convinced that I would see myself impaled by a sword.

article thumbnail

Extreme Networks ExtremeControl: NAC Product Review

eSecurity Planet

As a leader in wireless and wired large area network (LAN) infrastructure, Extreme Networks deeply understands the operational requirements for networks and the IT teams managing them. To aid in reducing IT labor requirements and to improve security, Extreme Networks created their ExtremeControl network access solution. To compare ExtremeControl against competitors, see our complete list of top network access control (NAC) solutions.

MDM 88
article thumbnail

A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

KnowBe4

Cybercriminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and take control of alarms and plugs. In late 2022, the researcher Sam Sabetan discovered a series of critical vulnerabilities in several smart devices manufactured by Nexx, including Smart Garage Door Openers, Alarms, and Plugs.

article thumbnail

AppSec Looms Large for RSAC 2023 Innovation Sandbox Finalists

Dark Reading

Application security is the dominant trend for this year's startup contest, but AI, blockchain, and compliance are all represented as well.

article thumbnail

HP would take up to 90 days to fix a critical bug in some business-grade printers

Security Affairs

HP would take up to 90 days to address a critical flaw, tracked as CVE-2023-1707, that resides in the firmware of some business-grade printers. HP is aware of a critical vulnerability, tracked as CVE-2023-1707 (CVSS v3.1 score 9.1), that affects tens of HP Enterprise LaserJet and HP LaserJet Managed Printers models. The exploitation of the flaw can potentially lead to information disclosure and the IT giant announced that it would take up to 90 days to address the vulnerability.

article thumbnail

3 Fronts in the Battle for Digital Identity

Dark Reading

As both digital protection strategies and digital attacks become more sophisticated, organizations that know the terrain have a better chance of navigating it.

IT 86
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Law enforcement seized the Genesis Market cybercrime marketplace

Security Affairs

Law enforcement seized the Genesis Market black marketplace, a platform focused on the sale of stolen credentials, as part of Operation Cookie Monster. The FBI seized the Genesis Market , a black marketplace for stolen credentials that was launched in 2017. Genesis Market was an invite-only marketplace, but it was not complex to find invite codes online.

article thumbnail

"We are hurtling toward a glitchy, spammy, scammy, AI-powered internet."

KnowBe4

This MIT Technology Review headline caught my eye, and I think you understand why. They described a new type of exploit called prompt injection.

article thumbnail

FBI (and Others) Shut Down Genesis Market

Schneier on Security

Genesis Market is shut down : Active since 2018, Genesis Market’s slogan was, “Our store sells bots with logs, cookies, and their real fingerprints.” Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials. But earlier today, multiple domains associated with Genesis had their homepages replaced with a seizure notice from the FBI, which said the domains were seized pursuan