Fri.Feb 10, 2023

article thumbnail

Reddit Data Breach Leaks Code, Internal Data

Data Breach Today

Breach Phished Employee Credentials Reddit says hackers penetrated its internal systems via a phishing attack but that user passwords and accounts appear safe. The self-proclaimed "front page of the internet" says the hackers gained access to its internal documents, code and some internal business systems.

article thumbnail

Which Document Storage System is Right For You?

Record Nations

Companies of all sizes are creating and managing an ever-increasing amount of data, and selecting the right document storage system is crucial to effectively storing and protecting that data. Records storage systems break down into two broad categories, digital and physical. Physical record storage systems were previously the standard. For many small businesses and contractors, […] The post Which Document Storage System is Right For You?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2023 Cyber Bank Heists Report: The Rise of Punitive Attacks

Data Breach Today

Contrast's Tom Kellermann on How Cybercriminals Escalated Destructive Strikes Banking Trojans, ransomware, fake finance apps programmed to steal data - the cybercriminal cartels have become more punitive in 2023, escalating destructive attacks on financial institutions. This is just one key finding of the annual Cyber Bank Heists report by Contrast Security's Tom Kellermann.

article thumbnail

Ransomware attack hit the City of Oakland

Security Affairs

A ransomware attack hit the City of Oakland this week, forcing it to take all systems offline in response to the incident. The City of Oakland disclosed a ransomware attack, the security breach began on Wednesday night. In an abundance of caution, the City of Oakland has taken impacted systems offline, while they work to secure the impacted infrastructure. “The City of Oakland has learned that it was recently subject to a ransomware attack that began on Wednesday night.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tackling Top Cyber Challenges in APAC's Healthcare Sector

Data Breach Today

Chief Security Officer of H-ISAC Discusses Inaugural Event for Asia-Pacific Region Asia-Pacific healthcare sector organizations struggle with many of the same cybersecurity challenges as clinics in other parts of the world, including ransomware threats and denial-of-service attacks, says Errol Weiss, chief security officer of the Health Information Sharing and Analysis Center.

More Trending

article thumbnail

California Medical Group's Ransomware Breach Affects 3.3M

Data Breach Today

Regal Medical Group Says Patients of Several Affiliates Are Among Those Affected Regal Medical Group, one of the largest medical groups in Southern California, has reported that a December ransomware incident involving data exfiltration has potentially compromised the protected health information of more than 3.3 million individuals.

article thumbnail

New TA886 group targets companies with custom Screenshotter malware

Security Affairs

The TA886 hacking group targets organizations in the United States and Germany with new spyware tracked as Screenshotter. A recently discovered threat actor, tracked as TA886 by security firm Proofpoint, is targeting organizations in the United States and Germany with new malware dubbed Screenshotter. The experts first spotted the attacks attributed to this threat actor in October 2022, they believe that the group is financially motivated.

article thumbnail

Merck Germany Exec on Why FIDO Is Still Such a Tough Sell

Data Breach Today

Andreas Pellenghar Points to Identity and Usability Issues, Lack of Tools Identity verification and lack of WebAuthn implementation in legacy applications and smartphones are two of the biggest challenges associated with adopting FIDO authentication. Merck Germany's Andreas Pellenghar also says the current setup of jumping to a browser to log in is turning people off.

article thumbnail

Weekly Update 334

Troy Hunt

Did I really need to get a connected BBQ? No more than I needed to connect most of the other things in the house which is to say "a bit useful but not entirely necessary" But it's a fascinating process when looked at through the lens of how accessible the technology is to your average person given it's embedded in a consumer-orientated product.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Google's Christiaan Brand on Bringing Passkeys to the Masses

Data Breach Today

Developers, CISOs and CTOs Need to Team Up With FIDO to Accelerate Passkey Adoption Phishing is the number one way to compromise accounts, and Google's Christiaan Brand says passkeys have emerged as a great technical solution to the issue. He wants to ensure what FIDO Alliance has built benefits and is relevant to how Google wants to see passkeys implemented for its own accounts.

Phishing 130
article thumbnail

Attacker Allure: A Look at the Super Bowl's Operational Cyber-Risks

Dark Reading

Event organizers should be exercising various cyberattack scenarios to ensure they have the proper checks and balances in place to respond accordingly and maintain resilience.

Risk 81
article thumbnail

ISMG Editors: How Police Nabbed the Notorious Zeekill Hacker

Data Breach Today

Also: The New Cold 'Cyber' War; Is the Time Right for Cyber Innovation? In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues, including cybersecurity innovation in today's market, how French police nabbed notorious Finnish hacker Zeekill and whether we are in a new form of cold war - specifically, an ongoing cyberwar.

article thumbnail

DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure

Security Affairs

North Korea-linked APT groups conduct ransomware attacks against healthcare and critical infrastructure facilities to fund its activities. Ransomware attacks on critical infrastructure conducted by North Korea-linked hacker groups are used by the government of Pyongyang to fund its malicious cyber operations, U.S. and South Korean agencies warn. US CISA published a Cybersecurity Advisory (CSA) to provide information about the threat actors to network defenders.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Darknet Marketplace Revenue Plummets After Hydra Raid

Data Breach Today

Competitors Jockey For Position in Russian-Language Online Market for Illicit Goods Revenue at dark web illicit marketplaces plummeted in 2022 following seizure by U.S. and German police last spring of what was then the world's largest online bazaar for illegal goods and services. Three markets have jockeyed for dominance following Hydra's collapse: OMG!

Marketing 130
article thumbnail

LookingGlass Cyber Solutions: Threat Intelligence Review

eSecurity Planet

The LookingGlass scoutPrime threat intelligence platform (TIP) integrates enterprise-grade external security threat information with information on internal architecture and security information to create actionable, prioritized risk scores for threats. The TIP provides security professionals with accelerated analysis of how threats might impact the organization and how to counter those threats.

article thumbnail

Illinois Supreme Court Clarifies Statute of Limitations for Illinois Biometric Privacy Act Claims: Five Years

Data Matters

Last week, the Illinois Supreme Court held that a five-year statute of limitations applies to all claims under the Illinois Biometric Privacy Act (BIPA), further expanding the already broad scope and application of the Illinois statute. 1 The post Illinois Supreme Court Clarifies Statute of Limitations for Illinois Biometric Privacy Act Claims: Five Years appeared first on Data Matters Privacy Blog.

Privacy 97
article thumbnail

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Dark Reading

The US Treasury Department linked the notorious cybercrime gang to Russian Intelligence Services because cyberattacks that disrupted hospitals and other critical infrastructure align with Russian state interests.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The FBI’s Most Controversial Surveillance Tool Is Under Threat

WIRED Threat Level

A review of the FBI’s access to foreign intelligence reveals troubling misuse of powerful surveillance tech.

Access 98
article thumbnail

Reddit Hack Shows Limits of MFA, Strengths of Security Training

Dark Reading

A tailored spear-phishing attack successfully convinced a Reddit employee to hand over their credentials and their one-time password, but soon after, the same worker notified security.

article thumbnail

A Hacker’s Mind Is Now Published

Schneier on Security

Tuesday was the official publication date of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back. It broke into the 2000s on the Amazon best-seller list. Reviews in the New York Times , Cory Doctorow’s blog , Science , and the Associated Press. I wrote essays related to the book for CNN and John Scalzi’s blog.

IT 72
article thumbnail

Malicious Game Mods Target Dota 2 Game Users

Dark Reading

Valve's unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored.

76
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Preparing fax for the next era of enterprise communications

OpenText Information Management

“Wait! Are you seriously going to fax me that request?” It’s a question echoing across workplaces in industries like healthcare, financial services, and law, especially as Gen Z employees join the ranks. After more than a century of service, many IT professionals wish they could retire the old faithful fax. But there are reasons why … The post Preparing fax for the next era of enterprise communications appeared first on OpenText Blogs.

article thumbnail

MagicWeb Mystery Highlights Nobelium Attacker's Sophistication

Dark Reading

The authentication bypass used by the Nobelium group, best known for the supply chain attack on SolarWinds, required a massive, real-time investigation to uncover, Microsoft says.

article thumbnail

Meet the Creator of North Korea’s Favorite Crypto Privacy Service

WIRED Threat Level

The world’s most prolific crypto thieves have used Sinbad.io to launder tens of millions. Its creator, “Mehdi,” answers WIRED’s questions.

Privacy 67
article thumbnail

Addressing the Elephant in the Room: Getting Developers & Security Teams to Work Together

Dark Reading

Bridging the divide between developers and security can create a culture change organically.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Which Document Storage System is Right For You?

Record Nations

Companies of all sizes are creating and managing an ever-increasing amount of data, and selecting the right document storage system is crucial to effectively storing and protecting that data. Records storage systems break down into two broad categories, digital and physical. Physical record storage systems were previously the standard. For many small businesses and contractors, […] The post Which Document Storage System is Right For You?

article thumbnail

Reminder: Attorneys’ Duty of Competence Extends to Technological Competence

eDiscovery Law

Within each United States jurisdiction in which attorneys are licensed to practice law, the relevant rules of professional responsibility require attorneys to meet a duty of competence. Such competence is not limited to legal judgment and skill.

40
article thumbnail

Integreon Launches Cyber Incident Response Offering with Development of AI-Based Review and Integration of RadarFirst

Dark Reading

71