Fri.Mar 22, 2024

article thumbnail

Russian Nation-State Hacker Targets German Political Parties

Data Breach Today

Latest APT29 Campaign Uses a Previously Unseen Malware Backdoor A Russian hacking group is targeting German political parties as part of a Moscow-backed espionage campaign. The latest APT29 campaign marks the first time the group has been seen targeting political organizations, according to researchers at Mandiant.

305
305
article thumbnail

Mozilla Drops Onerep After CEO Admits to Running People-Search Networks

Krebs on Security

The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep , an identity protection service recently bundled with Firefox that offers to remove users from hundreds of people-search sites. The move comes just days after a report by KrebsOnSecurity forced Onerep’s CEO to admit that he has founded dozens of people-search networks over the years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nursing Home Declares Bankruptcy, Blames Recent Cyberattacks

Data Breach Today

Also, Senate Bill Proposes Payment Relief for Firms Meeting Cyber 'Standards' A nursing home operator is seeking bankruptcy protection, citing the effects of a ransomware attack last fall and fallout from the recent Change Healthcare outage as factors that contributed to its financial woes. Also, a Senate bill aims to address cash flows for some health firms hit by an attack.

article thumbnail

Pwn2Own Vancouver 2024: participants earned $1,132,500 for 29 unique 0-days

Security Affairs

Pwn2Own Vancouver 2024 hacking competition has ended, and participants earned $1,132,500 for demonstrating 29 unique zero-days. Trend Micro’s Zero Day Initiative (ZDI) announced that participants earned $1,132,500 on the Pwn2Own Vancouver 2024 hacking competition for demonstrating 29 unique zero-days. On day one , the Team Synacktiv successfully demonstrated exploits against a Tesla car.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Iranian TA450 Group Tries Out New Tactics on Israelis

Data Breach Today

Proofpoint Researchers Say Beware of Phishing Emails, Embedded Links in PDFs Iran-aligned threat actor TA450, also called MuddyWater, is using fake salary, compensation and financial incentive emails to trick Israeli employees at multi-national organizations into clicking malicious links, according to researchers at security firm Proofpoint.

Phishing 288

More Trending

article thumbnail

CISOs: Make Sure Your Team Members Fit Your Company Culture

Data Breach Today

Why? Because 'Culture Eats Strategy for Breakfast,' as the Saying Goes Chief information security officers are challenged with building high-functioning cybersecurity teams amid an impossible labor and skills market. Here are strategies they can use to assemble teams capable of defending their organizations against the myriad of cyberthreats they face daily.

Marketing 287
article thumbnail

Google Pays $10M in Bug Bounties in 2023

Schneier on Security

BleepingComputer has the details. It’s $2M less than in 2022, but it’s still a lot. The highest reward for a vulnerability report in 2023 was $113,337, while the total tally since the program’s launch in 2010 has reached $59 million. For Android, the world’s most popular and widely used mobile operating system, the program awarded over $3.4 million.

article thumbnail

ISMG Editors: How Will the Quantum Era Reshape Cybersecurity?

Data Breach Today

Also: US Regulators Backtrack on Web Tracker Privacy; ISMG's RSA 2024 Coverage In the latest weekly update, four editors discussed ISMG's plans for in-depth and diverse coverage at the 2024 RSA conference, the latest guidance on web trackers from federal regulators and the latest forecasts on quantum computing - and why security teams should care.

article thumbnail

Navigating change: Why managed services make sense for insurance carriers

CGI

The property and casualty insurance industry continues to face economic pressures, talent shortages, and the need to adapt quickly in a climate of rapid change. According to our latest Voice of Our Clients research, difficulty hiring IT talent continues to be a top challenge across the industry. Many carriers struggle to train talent fast enough to keep pace with digital modernization requirements and changing customer expectations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Likely Chinese Hacking Contractor Is Quick to Exploit N-Days

Data Breach Today

UNC5174 Exploited F5 BIG-IP and ScreenConnect Vulnerabilities A likely Chinese hacker-for-hire used high-profile vulnerabilities in a campaign targeting a slew of Southeast Asian and U.S. governmental and research organizations, says threat intel firm Mandiant. Rapid exploitation of newly patched flaws has become a hallmark of Chinese threat actors.

282
282
article thumbnail

Hackers use pirated software to hijack Mac, Android and Windows devices via Fox News

IG Guru

Check out the link here. The post Hackers use pirated software to hijack Mac, Android and Windows devices via Fox News first appeared on IG GURU.

article thumbnail

GitLab Acquires Oxeye to Bolster SAST in DevSecOps Workflow

Data Breach Today

Acquisition Promises Enhanced Application Security and Reduced False Positives The integration of Oxeye into GitLab’s suite marks a significant leap in the accuracy and efficiency of security scans, directly addressing the challenge of false positives in static application security testing and enhancing software security across development stages, according to GitLab.

Security 270
article thumbnail

e-Invoicing mandates and updates: Germany

OpenText Information Management

March 2024 German Federal Council officially approves law driving the e-Invoicing mandate On 22nd March 2024 The German Bundesrat - the Federal Council - officially approved the Federal Government's Growth Opportunities Act, which is the legal instrument that includes the provisions for the planned e-Invoicing mandate. The law had undergone criticism and review but was finally passed with a clear majority.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Identity Security Clinic

Data Breach Today

See Also: When Every Identity is at Risk, Where Do You Begin? Introducing CyberArk’s Identity Security Clinic.

Security 272
article thumbnail

The history of Apple device management: where we started

Jamf

The future of Apple Mobile Device Management (MDM) is declarative device management. But how did we get here?

MDM 81
article thumbnail

Navigating the integration of AI with anti-money laundering

CGI

This CGI blog post covers key considerations in navigating the integration of artificial intelligence with anti-money laundering.

article thumbnail

Zero Trust vs Least Privilege

Jamf

Explore the critical differences and synergies between Zero Trust and Least Privilege models in cybersecurity. Learn how to enhance your security posture.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The 2024 California CIO Academy: Musings From an eDiscovery Guy

eDiscovery Daily

Spending the past 20+ years in forensics, eDiscovery, and investigations has kept me in a legal conference circuit lane, but this week I stepped into a new and interesting adjacent world: information technology leadership in public service. This conference is formally called the California Public Sector CIO Academy and its organizer, e.republic, hosted over 800 attendees from all over the state.

article thumbnail

OpenText Summit | Houston Energy 2024 summary & key takeaways

OpenText Information Management

Hello from Alaska! Last week industry leaders, experts, and innovators gathered at the Houston Aquarium for the OpenText Energy Summit in Houston , a pivotal event driving conversations on the intersection of artificial intelligence, information management, and energy sector dynamics. The summit provided valuable insights into the future of energy operations with AI.

article thumbnail

Driving quality assurance through the IBM Ignite Quality Platform

IBM Big Data Hub

Quality Assurance (QA) is a critical component of the software development lifecycle, aiming to ensure that software products meet specified quality standards before release. QA encompasses a systematic and strategic approach to identifying, preventing and resolving issues throughout the development process. However, various challenges arise in the QA domain that affect test case inventory, test case automation and defect volume.

article thumbnail

Friday Squid Blogging: New Species of Squid Discovered

Schneier on Security

A new species of squid was discovered , along with about a hundred other species. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Biden's Economic Team Warns of AI Risks and Job Displacement

Data Breach Today

US Council of Economic Advisers Includes AI Section in Newly Released Report The 2024 Economic Report of the President includes a chapter on artificial intelligence that warns of the risks associated with AI-fueled job displacement and discrimination. The report also highlights the benefits associated with the federal government harnessing AI tools.