Mon.Aug 07, 2023

article thumbnail

Colorado Warns Ransomware Attack Caused Massive Data Breach

Data Breach Today

Information From 2004 to 2020 Exposed for High School Students, Teachers and Others Colorado's Department of Higher Education is warning that it suffered a ransomware attack in June, in which attackers stole personal data on current and past students and teachers, dating from 2004 to 2020. While the state has yet to wrap its probe, the victim count could be massive.

article thumbnail

Black Hat Fireside Chat: Horizon3.ai makes a strong case for continuous, self-service pentesting

The Last Watchdog

LAS VEGAS — Penetration testing, traditionally, gave businesses a nice, pretty picture of their network security posture — at a given point in time. Related: Going on the security offensive Such snapshots proved useful for building audit trails, particularly for companies in heavily regulated industries. However, manual pentests never really were very effective at shining a light on emerging cyber exposures of the moment.

Risk 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nigerian Man Admits to $1.3M Business Email Compromise Scam

Data Breach Today

Scammers Used Malware and Spoofed Domain Name to Trick UK Financial Services Firm A Nigerian national has pleaded guilty to participating in a business email compromise scheme that stole $1.25 million from a Boston investment firm. Perpetrators used malware to intercept an employee's emails as well as spoofed email accounts to trick the employee's London financial services firm.

article thumbnail

GUEST ESSAY: Why any sudden influx of spam emails is an indicator of a likely security issue

The Last Watchdog

We all get spam emails, and while it’s annoying, it’s not usually anything to worry about. However, getting a huge influx of spam at once is a warning sign. People suddenly getting a lot of spam emails may be the target of a sophisticated cyber-attack. Related: How AI can relieve security pros What causes spam emails? Someone leaking, stealing or selling account information can cause a sudden influx of spam emails.

Security 188
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Spanish Police Arrest 3 Behind Payment Card Fraud

Data Breach Today

Cybercrime Group Defrauded Nearly 200,000 Euros Spanish police estimate that a group that mainly targeted ATMs of Spanish national banks using cloned payment cards had fraudulently pocketed nearly 196,000 euros. Authorities arrested three members of the group Sunday in the Spanish coastal city of Valencia.

245
245

More Trending

article thumbnail

Critical Bugs Found in PaperCut Allow RCE

Data Breach Today

Vulnerability Could Allow Attackers to Read, Delete or Upload Arbitrary Files A recently identified security vulnerability in PaperCut print management software holds the potential for high-severity outcomes and could let unauthorized hackers run code remotely. The software is used in a wide array of environments, including large printer fleets supporting over 100,000 users.

Security 245
article thumbnail

Catches of the Month: Phishing Scams for August 2023

IT Governance

Welcome to our August 2023 catches of the month feature, in which we explore the latest phishing scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we have a pair of stories about Microsoft. The first looks at an alarming rise in phishing scams that impersonate the tech firm, while the second discusses a new security feature that’s designed to protect users from password compromise.

article thumbnail

Authorities Warn Health Sector of Attacks by Rhysida Group

Data Breach Today

New Ransomware Group Branches Out, Hits Multiple Hospitals, Provider Networks Authorities are sounding the alarm about double-extortion attacks against healthcare and public health sector organizations by a relatively new ransomware-as-a-service group, Rhysida, which until recently had mainly focused on entities in other industries.

article thumbnail

Zoom trains its AI model with some user data, without giving them an opt-out option

Security Affairs

Zoom changed its terms of service requiring users to allow AI to train on all their data without giving them an opt-out option. Zoom updated its terms of service and informed users that it will train its artificial intelligence models using some of its data. The update will be effective as of July 27, and accepting the ToS users will give Zoom the right to utilize some aspects of customer data for training its AI models.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

[New Product] Supercharge Your Anti-Phishing Defense with KnowBe4’s PhishER Plus!

KnowBe4

Staying one step ahead of cybercriminals is absolutely vital in today’s threat landscape. That's why we're thrilled to introduce PhishER Plus, a revolutionary product from KnowBe4 that takes your anti-phishing defense to a whole new level.

article thumbnail

43 Android apps in Google Play with 2.5M installs loaded ads when a phone screen was off

Security Affairs

Experts found 43 Android apps in Google Play with 2.5 million installs that displayed advertisements while a phone’s screen was off. Recently, researchers from McAfee’s Mobile Research Team discovered 43 Android apps in Google Play with 2.5 million installs that loaded advertisements while a phone’s screen was off. The experts pointed out that this behavior violates Google Play Developer policy , in impacts the advertisers who pay for Ads that will be never displayed to the users, a

article thumbnail

Microsoft Signing Key Stolen by Chinese

Schneier on Security

A bunch of networks, including US Government networks , have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key. Congress wants answers. The phrase “ negligent security practices ” is being tossed about—and with good reason. Master signing keys are not supposed to be left around, waiting to be stolen.

article thumbnail

FBI warns of crooks posing as NFT developers in fraudulent schema

Security Affairs

The FBI is warning about cyber criminals masquerading as NFT developers to steal cryptocurrency and other digital assets. The U.S. Federal Bureau of Investigation (FBI) is warning about cyber criminals posing as legitimate NFT developers in fraud schemes designed to target active users within the NFT community. The end goal is to steal cryptocurrency and other digital assets from the users.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Criminals Have Created Their Own ChatGPT Clones

WIRED Threat Level

Cybercriminals are touting large language models that could help them with phishing or creating malware. But the AI chatbots could just be their own kind of scam.

article thumbnail

North Korea compromised Russian missile engineering firm NPO Mashinostroyeniya

Security Affairs

Two North Korea-linked APT groups compromised the infrastructure of the major Russian missile engineering firm NPO Mashinostroyeniya. Cybersecurity firm SentinelOne linked the compromise of the major Russian missile engineering firm NPO Mashinostroyeniya to two different North Korea-linked APT groups. NPO Mashinostroyeniya (JSC MIC Mashinostroyenia, NPO Mash) is a leading Russian manufacturer of missiles and military spacecraft.

article thumbnail

Microsoft’s AI Red Team Has Already Made the Case for Itself

WIRED Threat Level

Since 2018, a dedicated team within Microsoft has attacked machine learning systems to make them safer. But with the public release of new generative AI tools, the field is already evolving.

article thumbnail

Data Theft Extortion Attacks Rise 25 Percent in Just One Quarter and Take Top Attack Spot

KnowBe4

A recap of Q2 from Cisco Talos’ incident response services provides insight into exactly what kinds of attacks are being seen in the field, and what kinds of attacks you need to be protecting against.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Mystery of Chernobyl’s Post-Invasion Radiation Spikes

WIRED Threat Level

Soon after Russian troops invaded Ukraine in February 2022, sensors in the Chernobyl Exclusion Zone reported radiation spikes. A researcher now believes he’s found evidence the data was manipulated.

article thumbnail

Phishing Attacks Continue to Use Attachments as HTML Files Containing Java Dominate

KnowBe4

As traditional phishing attack attachment types like Office documents dwindle in use, threat actors look for new effective ways to use email as a delivery medium to launch an attack.

article thumbnail

Apple Users See Big Mac Attack, Says Accenture

Dark Reading

Accenture's Cyber Threat Intelligence unit has observed a tenfold rise in Dark Web threat actors targeting macOS since 2019, and the trend is poised to continue.

87
article thumbnail

Fraud Masquerades as Anti-Fraud

KnowBe4

Many of us have received a phone call or other notification from a credit card company telling us that they’ve detected suspicious activity on our card. Was it us? Did we just spend $500 at that big box store up the road? No? Thank you; there’ll be no charge. Or, if that was you, then you need take no further action.

IT 86
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Ransomware Victims Surge as Threat Actors Pivot to Zero-Day Exploits

Dark Reading

Threat actors such as the operators of the Cl0p ransomware family increasingly exploit unknown and day-one vulnerabilities in their attacks.

article thumbnail

Vendor Email Compromise Attacks Use the Same Playbook for Multiple Attacks

KnowBe4

Seeking very large paydays, Vendor Email Compromise (VEC) threat actors are finding out what works and repurposing their content and processes to increase chances of seeing a massive payout.

79
article thumbnail

Colorado Dept. of Higher Education Hit With Massive Data Breach

Dark Reading

Last week, the department uncovered a data breach that occurred back in June stemming from what it deems to be a cybersecurity ransomware incident.

article thumbnail

GitHub Warns of Social Engineering Campaign Targeting Employees in the Technology Industry

KnowBe4

A few weeks ago GitHub posted on their blog of a recent security alert that should have any organization in the tech industry worried.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics

Dark Reading

The group continues to target SQL servers, adding the Remcos RAT, BatCloak, and Metasploit in an attack that shows advance obfuscation methods.

article thumbnail

Vital Records Control Consolidates Digital Services Under New “VitalECM” Sub-Brand Name

IG Guru

Check out the post on PMSNewswire. The post Vital Records Control Consolidates Digital Services Under New “VitalECM” Sub-Brand Name first appeared on IG GURU.

90
article thumbnail

The Dark Web Is Expanding (As Is the Value of Monitoring It)

Dark Reading

Rising cybercrime threats heighten risks. Dark Web monitoring offers early alerts and helps lessen exposures.

IT 88