Fri.Mar 03, 2023

article thumbnail

CISA Warns That Royal Ransomware Is Picking Up Steam

Data Breach Today

US Agency Says Royal Ransomware Group Is Made Up of Experienced Threat Actors The Royal ransomware group targeting critical infrastructure in the United States and other countries is made up of experienced ransomware attackers and has strong similarities to Conti, the infamous Russia-linked hacking group, according to a new alert issued by U.S. authorities.

article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious items will take time to implement, and could face opposition from Congress. President Biden came into office around the time of the SolarWinds and Colonial Pipeline cyber attacks, so cybersecurity has been a major focus of the Administration from the beginning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese APT Group Deploying New Malware Backdoor

Data Breach Today

Mustang Panda Using MQsTTang Tool to Target Victims in Asia and Europe, Eset Finds Chinese APT group Mustang Panda is deploying a previously unseen malware backdoor dubbed MQsTTang as part of a spear-phishing campaign targeting governmental organizations, specifically in Ukraine and Taiwan, security firm Eset says. The malware is currently being spread as RAR files, it adds.

Phishing 259
article thumbnail

Trusted Platform Module (TPM) 2.0 flaws could impact billions of devices

Security Affairs

Two vulnerabilities affecting the Trusted Platform Module ( TPM ) 2.0 library could potentially lead to information disclosure or privilege escalation. The Trusted Computing Group (TCG) is warning of two vulnerabilities affecting the implementations of the Trusted Platform Module ( TPM ) 2.0 that could potentially lead to information disclosure or privilege escalation.

IoT 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What Happens When Cybersecurity Unicorns Lose Their Horns?

Data Breach Today

Noname Security Is Reportedly Up for Sale But Will Have to Shed Its Unicorn Status In the 21-month stretch from October 2020 to June 2022, a whopping 48 cybersecurity startups received 10-figure valuations as investors evaluated prospects on potential rather than performance. Now that the financial boom has gone bust, what happens to these unicorns from a different economic era?

More Trending

article thumbnail

Zscaler Lays Off 3% of Staff Amid Delays Closing Large Deals

Data Breach Today

Nearly 180 Workers Exit After Vetting Around Large Deals Takes Bite Out of Billings Zscaler has axed nearly 180 workers after more deliberation from new customers around large purchasing decisions led to reduced billings growth. The company revealed plans to cut its 5,900-person staff by roughly 3% - or about 177 positions - as it adapts to a more challenging business environment.

IT 189
article thumbnail

Nick Weaver on Regulating Cryptocurrency

Schneier on Security

Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion: Regulators, especially regulators in the United States, often fear accusations of stifling innovation. As such, the cryptocurrency space has grown over the past decade with very little regulatory oversight.

Paper 90
article thumbnail

ISMG Editors: US Supreme Court May Limit Identity Theft Law

Data Breach Today

Also: ISMG Hosts Engage Event in Toronto; Vendor Wiz Quadruples Workforce In the latest weekly update, four ISMG editors share highlights of ISMG's upcoming Engage Toronto event and discuss how the U.S. Supreme Court may undercut the identity theft statute and how - despite tough economic times - vendor Wiz boosted its valuation by $4 billion in 16 months.

IT 173
article thumbnail

Chick-fil-A Gives Customers a Bone to Pick After Data Breach

Dark Reading

A two-month-long automated credential-stuffing campaign exposed personal information of Chick-fil-A customers, including birthdays, phone numbers, and membership details.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Biden National Cyber Strategy Poses Challenges to Healthcare

Data Breach Today

Administration Must Address Lack of Resources, Reactionary Posture, Experts Say The Biden administration's national cybersecurity strategy emphasizes bolstering critical infrastructure sector protections, including setting minimum security requirements and enhancing collaboration. But observers says the industry needs more resources and a better security posture to comply.

article thumbnail

Pegasus spyware used to spy on a Polish mayor

Security Affairs

The phone of an opposition-linked Polish mayor was infected with the powerful Pegasus spyware, local media reported. Reuters reported that the phone of an opposition-linked Polish mayor was infected with the Pegasus spyware. According to rumors, the Polish special services are using surveillance software to spy on government opponents. The news of the hack was reported by the Gazeta Wyborcza daily, and unfortunately, it isn’t the first time that the Pegasus spyware was used in the country.

article thumbnail

Financial Services Sector at Risk of More Significant Impacts of Email-Based Cyberattacks

KnowBe4

Financial services businesses are already in the sights of cybercriminals, and understanding how cyberattacks impact this sector specifically can help establish the need for improved preventative measures.

article thumbnail

The U.S. CISA and FBI warn of Royal ransomware operation

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of the capabilities of the recently emerged Royal ransomware. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars. Unlike other ransomware operations, Royal doesn’t offer Ransomware-as-a-Service, it appears to be a private group without a network of affiliates.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

It's Time to Assess the Potential Dangers of an Increasingly Connected World

Dark Reading

With critical infrastructures ever more dependent on the cloud connectivity, the world needs a more stable infrastructure to avoid a crippling cyberattack.

IT 88
article thumbnail

CISA's latest ransomware warning promotes fighting social engineering at the top of the document, once again

KnowBe4

So, today CISA released another ransomware notice. The Cybersecurity and Infrastructure Security Agency is an agency of the United States Department of Homeland Security that is responsible for strengthening cybersecurity and infrastructure protection.

article thumbnail

3 Ways Security Teams Can Use IP Data Context

Dark Reading

Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.

article thumbnail

The Sketchy Plan to Build a Russian Android Phone

WIRED Threat Level

Amid isolating sanctions, a Russian tech giant plans to launch new Android phones and tablets. But experts are skeptical the company can pull it off.

IT 82
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EV Charging Infrastructure Offers an Electric Cyberattack Opportunity

Dark Reading

Attackers have already targeted electric vehicle (EV) charging stations, and experts are calling for cybersecurity standards to protect this necessary component of the electrified future.

article thumbnail

How to Configure a Router to Use WPA2 in 7 Easy Steps

eSecurity Planet

Most of us connect our mobile devices to a Wi-Fi router for internet access, but this connection can leave our network and data vulnerable to cyber threats. To protect against those threats, a Wi-Fi Protected Access (WPA) encryption protocol is recommended. And even though it’s been around since 2004, WPA2 remains the Wi-Fi security standard. WPA2 is a security protocol that secures wireless networks using the advanced encryption standard (AES).

article thumbnail

Indigo Books Refuses LockBit Ransomware Demand

Dark Reading

Canada's largest bookseller rejected the pressure of the ransomware gang's countdown timer, despite data threats.

article thumbnail

U.S. Employers Need to Reconsider Use of Confidentiality and Nondisparagement Provisions in Light of New NLRB Decision

Data Matters

Employers frequently seek to include confidentiality and nondisparagement provisions in severance agreements provided to departing employees. Last week, the U.S. National Labor Relations Board (NLRB or Board) significantly altered the legal landscape governing such provisions, making it much more difficult for unionized and nonunionized employers alike to use them for nonsupervisory employees without running afoul of the National Labor Relations Act (NLRA).

Privacy 88
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Your KnowBe4 Fresh Content Updates from February 2023

KnowBe4

Check out the 24 new pieces of training content added in February, alongside the always fresh content update highlights, events and new features.

article thumbnail

Polish Politician's Phone Patrolled by Pegasus

Dark Reading

A mayor backing Polish opposition elections in parliament has been targeted by special services with Pegasus spyware.

79
article thumbnail

Why composability matters in digital experience

OpenText Information Management

When times get tough, the tough get innovative. From a global pandemic to rapid inflation to economic uncertainty, business leaders have navigated their fair share of curve balls in recent years. Digital transformation is moving faster than ever but at the same time, it will never move this slowly again. Thousands of micro-experiences occur every … The post Why composability matters in digital experience appeared first on OpenText Blogs.

article thumbnail

Bill to Amend the Gramm-Leach-Bliley Act Introduced to Congress

Hunton Privacy

On February 24, 2023, Representative Patrick T. McHenry of North Carolina introduced a bill proposing the creation of the Data Privacy Act of 2023. The bill proposes to amend the Gramm-Leach-Bliley Act (“GLBA”) by making the following changes: Financial institutions would need to notify “consumers” (in addition to customers) that their nonpublic personal information (“NPI”) is being collected; The definition of GLBA-covered “financial institution” would be updated to include “data aggregators”;

Privacy 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Benefits of Apple Business Manager and MDM integration

Jamf

Apple Business Manager and Mobile Device Management (MDM) is a perfect pairing for managing Apple devices in the enterprise.

MDM 52
article thumbnail

House Energy & Commerce Subcommittee Holds Hearing on U.S. Privacy Law

Hunton Privacy

On March 1, 2023, the U.S. House of Representatives Innovation, Data and Commerce Subcommittee (“Subcommittee”) of the Energy and Commerce Committee (“Committee”) held a hearing to restart the discussion on comprehensive federal privacy legislation. Last year, the full Committee reached bipartisan consensus on H.R. 8152, the American Data Privacy and Protection Act (“ADPPA”), by a vote of 53-2.

Privacy 55
article thumbnail

Government to Fix Loophole in Aussie Data Retention Regime via Gizmodo.com

IG Guru

Check out the article here.