Tue.Mar 14, 2023

article thumbnail

Emotet Is Back Again!

Data Breach Today

Malware Reemerges With Improved Evasion and Appreciation of 19th-Century Literature Emotet malware is again active. Researchers marked the latest sighting of the Microsoft Office-loving Trojan in what's becoming a cycle of reemergence and hibernation.

article thumbnail

Two U.S. Men Charged in 2022 Hacking of DEA Portal

Krebs on Security

Two U.S. men have been charged with hacking into a U.S. Drug Enforcement Agency (DEA) online portal that taps into 16 different federal law enforcement databases.

Security 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit Ransomware Group Claims SpaceX Contractor Data Theft

Data Breach Today

Extortionists With Penchant for Splashy PR Moves Call on Elon Musk to Pay Ransom The LockBit ransomware operation claims to have stolen data from a Texas-based supplier to Elon Musk's SpaceX, which designs, manufactures and launches rockets and spacecraft.

article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

The Last Watchdog

A new report from the Bipartisan Policy Center ( BPC ) lays out — in stark terms – the prominent cybersecurity risks of the moment. Related: Pres. Biden’s impact on cybersecurity. The BPC’s Top Risks in Cybersecurity 2023 analysis calls out eight “top macro risks” that frame what’s wrong and what’s at stake in the cyber realm. BPC is a Washington, DC-based think tank that aims to revitalize bipartisanship in national politics. This report has a dark tone, as well it should.

Military 148
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

UK Mulls TikTok Ban on Government Networks

Data Breach Today

UK Security Minister Confirms Agency Is Examining App for Chinese Government Ties Britain's National Cyber Security Agency is examining TikTok to help the government finalize its decision to ban the Chinese video sharing app from federal networks, the country’s security minister Tom Tugendhat revealed.

More Trending

article thumbnail

UK Unveils Agency to Counter Threats to Private Sector

Data Breach Today

The New National Protective Security Authority to Operate Under MI5 The U.K. government says a new national agency will work with the private sector to stymie national security threats including foreign hackers after British intellectual property.

article thumbnail

Google Proposes Reducing TLS Cert Life Span to 90 Days

Dark Reading

Organizations will likely have until the end of 2024 to gain visibility and control over their keys and certificates

111
111
article thumbnail

US CISA to Warn Critical Infrastructure of Ransomware Risk

Data Breach Today

Most Ransomware Attacks Use Known Vulnerabilities to Infiltrate Networks The top U.S.

Risk 130
article thumbnail

Access Control Gap in Microsoft Active Directory Widens Enterprise Attack Surface

Dark Reading

One researcher thinks trust is broken in AD. Microsoft disagrees that there's a security vulnerability. But enterprise IT environments should be aware of an authentication gap either way

article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

SentinelOne CEO: Cloud Security May Be Bigger Than Endpoint

Data Breach Today

Tomer Weingarten on Fueling Cloud Growth Through Wiz Partnership, Revamped Pipeline SentinelOne has inked a partnership with Wiz and revamped its pipeline generation efforts to capitalize on growing demand for cloud protection, said CEO Tomer Weingarten.

article thumbnail

Emotet, QSnatch Malware Dominate Malicious DNS Traffic

Dark Reading

An analysis of trillions of DNS requests shows a shocking amount of malicious traffic inside enterprise networks, with threats using DNS as a sort of malicious Autobahn

105
105
article thumbnail

Darknet Markets Thrive Despite Repeat Disruptions by Police

Data Breach Today

190 'Significant' Darknet Markets Debuted in 2022 to Meet Demand, Researchers Say Despite repeated disruptions by law enforcement, underground cybercrime markets continue to thrive.

Marketing 130
article thumbnail

How Patch Tuesday Keeps the Beat After 20 Years

Dark Reading

Patch Tuesday turned security updates from chaotic events into a routine. Here's how we got here, and where things might be heading

Security 103
article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

NetWire Remote Access Trojan Maker Arrested

Schneier on Security

From Brian Krebs : A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords.

Access 87
article thumbnail

Optiv More Than Doubles Federal Presence With ClearShark Acquisition

Dark Reading

Convergence of two leading cybersecurity companies creates federal sector powerhouse

article thumbnail

5 Reasons Why SecurityCoach Is Awesome

KnowBe4

I’ve been doing computer security for over 34 years and in that time, I haven’t seen a lot of game-changing products.

article thumbnail

LockBit Threatens to Leak Stolen SpaceX Schematics

Dark Reading

The ransomware group sent a message directly to Elon Musk: Pay or the confidential SpaceX information goes up for grabs on the Dark Web

article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

Take another virtual vacation with Spring Seminar-Mania 3

IG Guru

Spring Seminar-Mania 3 is a collaborative effort between 13 local ARMA chapters that will feature 13 virtual educational sessions that are all free! Click on the link below for event details.

article thumbnail

Microsoft Zero-Day Bugs Allow Security Feature Bypass

Dark Reading

Security vendors urge organizations to fix the actively exploited bugs, in Microsoft Outlook and the Mark of the Web feature, immediately

article thumbnail

LockBit Ransomware gang claims to have stolen SpaceX confidential data from Maximum Industries

Security Affairs

The LockBit ransomware group claims to have stolen confidential data belonging to SpaceX from the systems of Maximum Industries. The LockBit ransomware gang claims to have stolen confidential data of SpaceX after they hacked the systems of production company Maximum Industries.

article thumbnail

Why Healthcare Boards Lag Other Industries in Preparing for Cyberattacks

Dark Reading

Only by working collaboratively can boards and security leaders make progress and agree about cybersecurity threats and priorities

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Network security creates shielded, monitored, and secure communications between users and assets.

MDM 76
article thumbnail

Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust

Dark Reading

Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation

article thumbnail

AI Sausage-Making and Unconsidered Consequences

John Battelle's Searchblog

Is that an AI in your sausage? Once again, Google and Microsoft are battling for the AI spotlight – this time with news around their offerings for developers and the enterprise.

article thumbnail

How Businesses Can Get Ready for AI-Powered Security Threats

Dark Reading

Organizations need to take steps now to strengthen their cyber defenses

article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

The CHIPS Act and RFID

RFID Global Solution, Inc.

A Shortage and a Solution The global shortage of semiconductors over the last few years has brought renewed attention to the importance of the semiconductor industry. In the United States, the government took significant steps to expand domestic semiconductor manufacturing capabilities through initiatives such as the CHIPS Act of 2022. The primary goal of the … The CHIPS Act and RFID Read More » The post The CHIPS Act and RFID appeared first on RFID Global Solution.

article thumbnail

CISA Trials Ransomware Warning System for Critical Infrastructure Orgs

Dark Reading

An agency team will identify vulnerabilities being exploited by ransomware groups and alert organizations ahead of attacks, CISA says

article thumbnail

Dissecting the malicious arsenal of the Makop ransomware gang

Security Affairs

Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from a recent intrusion authored by Makop ransomware operators show persistence capability through dedicated.NET tools.