Tue.Dec 06, 2022

article thumbnail

Rackspace Confirms Exchange Outage Caused by Ransomware

Data Breach Today

Companies Tells US SEC That the Incident Will Affect Revenue Ransomware lies behind the ongoing outage of hosted Exchange services at Rackspace, the company disclosed in a Tuesday update. The company did not disclose any particular ransomware actor. It told federal regulators that the outage is likely to create a financial loss.

article thumbnail

Machine Learning Models: A Dangerous New Attack Vector

Dark Reading

Threat actors can weaponize code within AI technology to gain initial network access, move laterally, deploy malware, steal data, or even poison an organization's supply chain.

Access 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attack in New Zealand Has Cascading Effects

Data Breach Today

Government Agencies and Private Sector Affected by Attack on IT Sercices Provider A ransomware attack on a New Zealand third party managed IT service provider impacted several government agencies across the country – including the Ministry of Justice and the national health authority. Investigations are ongoing to determine the incident's full impact.

article thumbnail

Russia’s second-largest bank VTB Bank under DDoS attack

Security Affairs

Russia’s second-largest bank VTB Bank reveals it is facing the largest DDoS (distributed denial of service) attack in its history. State-owned VTB Bank, the second-largest financial institution in Russia, says it is facing the largest DDoS (distributed denial of service) attack in its history. The pro-Ukraine collective IT Army of Ukraine has claimed responsibility for the DDoS attacks against the bank.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

Previewing Black Hat Europe 2022 in London: 12 Hot Sessions

Data Breach Today

Collective DDoS Defense, Rethinking Internet Defense, Zero-Day Harvesting and More Black Hat Europe returns to London, offering deep dives into the latest cybersecurity research and trends, including how to build an open, transparent, but also secure internet; harvesting zero-day flaws before attackers; what we can learn from "metaparasitical" scammers who scam scammers; and more.

More Trending

article thumbnail

Aqua CEO on Why Cloud-Native Apps Need Supply Chain Security

Data Breach Today

Aqua's Dror Davidoff Shares How Open-Source Repositories Create Risk for Cloud Apps Software has increasingly relied on components developed by third parties or from open-source libraries, which Aqua Security CEO Dror Davidoff says injects additional risk. On-premises environments are still managed in more traditional ways, with the development and production phases totally siloed.

Cloud 130
article thumbnail

A flaw in the connected vehicle service SiriusXM allows remote car hacking

Security Affairs

Researchers discovered a security flaw in the connected vehicle service SiriusXM that exposes multiple car models to remote attacks. Cybersecurity researchers discovered a security vulnerability in the connected vehicle service provided by SiriusXM that can allow threat actors to remotely attack vehicles from multiple carmakers, including Honda, Nissan, Infiniti, and Acura.

IT 119
article thumbnail

SentinelOne Pushes Upmarket to Minimize Effects of Slowdown

Data Breach Today

CEO Tomer Weingarten Says SentinelOne Will Focus on the Top Accounts in Its Pipeline SentinelOne plans to go after more Fortune 500 and Global 2000 organizations as the economic downturn prompts customers to shrink the size of their purchases. The company has over the past year doubled the number of clients spending at least $100,000 and $1 million with SentinelOne annually.

IT 130
article thumbnail

Average Fortune 500 Company Has 476 Critical Vulnerabilities

eSecurity Planet

In a recent analysis of the public and Internet-facing assets of 471 of the Fortune 500 companies, Cyberpion uncovered more than 148,000 critical vulnerabilities (exploits that are publicly available and actively targeted), with an average of 476 per company. Fully 98 percent of Fortune 500 companies have critically vulnerable internal assets, 95 percent have expired certificates, and 85 percent have exposed login pages accessible over HTTP.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Profiles in Leadership: Shannon Lawson

Data Breach Today

Phoenix CISO on Navigating the Public Sector Security Landscape Governance issues for public sector CISOs tend to focus more on shifting culture rather than maximizing efficiency for shareholders, as is expected from private sector security leaders. City of Phoenix CISO Shannon Lawson shares why good communication is crucial when a city council is involved.

article thumbnail

Looking Back at 2022 in LegalTech Reveals Trends Going into the New Year: An Ediscovery Day Recap

Hanzo Learning Center

December 1st marked another successful Ediscovery Day celebration full of great educational content for the legal tech industry. Now in its eighth year, Ediscovery day became more focused in its content offerings, with a great lineup of sponsored events.

Education 104
article thumbnail

The Key to CMMC Readiness: NIST Compliance

Daymark

Preparing for a Cybersecurity Maturity Model Certification (CMMC) 2.0 assessment can be completely overwhelming. Here’s the good news: If you’re NIST 800-171 compliant, you’re more than halfway there. If you’re not, you’ve got some work to do for sure, but it’s not as complicated or daunting as you may fear. NIST 800-171.

article thumbnail

Hardening Identities With Phish-Resistant MFA

Dark Reading

Extending multifactor authentication to include device identity assurance offers more authentication confidence than what multiple user-identity factors can by themselves.

Phishing 105
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Sophos fixed a critical flaw in its Sophos Firewall version 19.5

Security Affairs

Sophos addressed several vulnerabilities affecting its Sophos Firewall version 19.5, including arbitrary code execution issues. Sophos has released security patches to address seven vulnerabilities in Sophos Firewall version 19.5 , including some arbitrary code execution bugs. The most severe issue addressed by the security vendor is a critical code injection vulnerability tracked as CVE-2022-3236. “A code injection vulnerability allowing remote code execution was discovered in the User Po

IT 99
article thumbnail

CryWiper Data Wiper Targeting Russian Sites

Schneier on Security

Kaspersky is reporting on a data wiper masquerading as ransomware that is targeting local Russian government networks. The Trojan corrupts any data that’s not vital for the functioning of the operating system. It doesn’t affect files with extensions.exe,dll,lnk,sys or.msi, and ignores several system folders in the C:Windows directory. The malware focuses on databases, archives, and user documents.

article thumbnail

Crook sentenced to 18 months for stealing $20M in SIM swapping attack

Security Affairs

Nicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more than $20 million in a SIM swapping scheme. DoJ announced that Nicholas Truglia (25) was sentenced to 18 months in prison for the theft of over $20 million worth of cryptocurrency through SIM swapping attacks. The man was ordered to pay $20,379,007 in restitution to the victim within 60 days. .

Access 89
article thumbnail

CyberheistNews Vol 12 #49 [Keep An Eye Out] Beware of New Holiday Gift Card Scams

KnowBe4

CyberheistNews Vol 12 #49 | December 6th, 2022. [Keep An Eye Out] Beware of New Holiday Gift Card Scams. By Roger A. Grimes. Every holiday season brings on an increase in gift card scams. Most people love to buy and use gift cards. They are convenient, easy to buy, easy to use, easy to gift, usually allow the receiver to pick just what they want, and are often received as a reward for doing something.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Russian Actors Use Compromised Healthcare Networks Against Ukrainian Orgs

Dark Reading

Victims include at least 15 healthcare organizations, one Fortune 500 company, and other organizations in multiple countries, security vendor says.

article thumbnail

NY DFS Proposes New Class of Entities and More Detailed Regulations in Second Amendment to Cybersecurity Regulations

Data Matters

On November 9, 2022, the New York Department of Financial Services (DFS) published its proposed second amendment to its cybersecurity regulations (23 NY CRR Part 500). This proposal follows a July 29 pre-proposal and comment period. The amendment is available for a sixty-day comment period – until January 9, 2023 – after which the agency may adopt final regulations or issue a further revised version.

article thumbnail

What Will It Take to Secure Critical Infrastructure?

Dark Reading

There's no quick fix after decades of underinvestment, but the process has started. Cybersecurity grants, mandatory reporting protocols, and beefed-up authentication requirements are being put in place.

IT 81
article thumbnail

The Dangerous Digital Creep of Britain's ‘Hostile Environment’

WIRED Threat Level

The UK's use of technology to enforce its hard-line immigration policy brings the border into every facet of migrants' lives.

IT 80
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Applying the OODA Loop to Cybersecurity and Secure Access Service Edge

Dark Reading

Organizations can best defend themselves on the cyber battlefield by adopting a military-style defense.

Military 100
article thumbnail

Transforming health and care experiences and outcomes

CGI

Our health and care industry is in urgent need of transforming the way it delivers services and measures outcomes. Although individuals may have multiple conditions, both chronic and acute, transformation is possible if carried out in a graceful, inclusive, way that addresses patient and citizen needs.

IT 52
article thumbnail

Russia Readies Winter Cyberattacks As Troops Retreat From Ukraine

Dark Reading

Microsoft warns that the Kremlin is ramping up cyberattacks against infrastructure and supply chains and starting disinformation campaigns as Russian troops lose on the battlefield.

71
article thumbnail

BIPA and the record retention requirement

Data Protection Report

On November 30, 2022, an Illinois court of appeals ruled that Illinois’ biometrics privacy law—known as BIPA—requires that anyone subject to that law must develop a retention and destruction schedule when it possesses biometric data. In this case , the court found that the employer (J&M Plating Inc.) violated BIPA because it did not create its retention and destruction schedule until four years after it possessed employees’ fingerprint data.

Privacy 52
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Google Chrome Flaw Added to CISA Patch List

Dark Reading

CISA gives agencies deadline to patch against Google Chrome bug being actively exploited in the wild.

94
article thumbnail

3 Reasons Developers Should Shift Left for API Security

ForAllSecure

Shifting left for API security has many benefits. It allows developers to produce better code, catch API issues earlier in the development cycle, and get their work done faster. In order to build API security testing into the development process naturally, use a shift left approach along with an automated API tester, such as Mayhem for API. What Is Shifting Left?

article thumbnail

Name That Edge Toon: Not Your Average Bear

Dark Reading

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

90