Fri.Aug 28, 2020

article thumbnail

Elon Musk Says Tesla Saved From 'Serious' Ransom Attempt

Data Breach Today

FBI: $4 Million Scheme - Mixing Malware, DDoS and Extortion - Thwarted by Insider Tesla CEO Elon Musk says a "serious attack" aimed at stealing corporate data and holding his company to ransom has been thwarted. The FBI has accused a Russian national of attempting to recruit an insider to install malware to steal data, which criminals hoped to ransom for $4 million.

363
363
article thumbnail

Lemon_Duck cryptomining malware evolves to target Linux devices

Security Affairs

A new variant of the infamous Lemon_Duck cryptomining malware has been updated to targets Linux devices. Security researchers from Sophos have spotted a new variant of the Lemon_Duck cryptomining malware that has been updated to compromise Linux machines via SSH brute force attacks. The new variant also exploits SMBGhost bug in Windows systems, and is also able to target servers running Redis and Hadoop instances.

Mining 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware-Wielding Extortionists Target Tesla: 8 Takeaways

Data Breach Today

How Many Organizations' Threat Models Feature Russian Criminals Bribing Insiders? News that a malware-wielding gang of Russians targeted Tesla by attempting to work with an insider should have all organizations asking: What would happen if extortionists attempted to bribe one of our employees to install malicious code designed to steal corporate secrets for ransom?

363
363
article thumbnail

Elon Musk confirms that Russian hackers tried to recruit Tesla employee to plant a malware

Security Affairs

Elon Musk confirmed that Russian hackers attempted to recruit an employee to install malware into the network of electric car maker Tesla. Recently US authorities arrested the Russian national Egor Igorevich Kriuchkov (27) after attempting to recruit an employee at a targeted company to plant a piece of malware. The man was arrested on August 22 and appeared in court on August 24.

Access 132
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New Zealand Stock Exchange Trades Again After DDoS

Data Breach Today

Trading Resumes Following Several Days of Difficulties The New Zealand Stock Exchange resumed trading in the early afternoon on Friday after the impacts of distributed denial-of-service disruptions reverberated into a fourth day. The hobbling of the exchange's trading has demonstrated that DDoS attacks remain an unpredictable threat.

352
352

More Trending

article thumbnail

Iranian Hackers Using LinkedIn, WhatsApp to Target Victims

Data Breach Today

'Charming Kitten' Threat Group Continues Impersonating Journalists "Charming Kitten," a hacking group with ties to Iran, is now using LinkedIn and WhatsApp messages to contact potential victims and persuade them to visit a phishing page, according to ClearSky. The threat actors initially posed as journalists looking to contact sources.

Phishing 341
article thumbnail

Former Cisco employee pleads guilty to hacking, damaging company systems

Security Affairs

A former Cisco employee has pleaded guilty to hacking charges and intentionally causing damage to the systems of his company. The former Cisco employee Sudhish Kasaba Ramesh (30) pleaded guilty in federal court in San Jose today to intentionally accessing a protected computer of his company without authorization and causing damage. The news was announced by United States Attorney David L.

Cloud 124
article thumbnail

DOJ Seeks to Recover Stolen Cryptocurrency

Data Breach Today

Justice Department: North Korean Hackers Laundered Millions Through Chinese Traders The U.S. Justice Department has filed a civil forfeiture complaint in an effort to recover millions in cryptocurrency from 280 accounts that allegedly was stolen by North Korean hackers. Prosecutors believe much of the money was laundered through Chinese exchanges.

298
298
article thumbnail

Transforming Public Sector employees to the digital home office

OpenText Information Management

At the start of 2020, we saw entire workforces transition to home working due to the COVID-19 pandemic.? And for many Public Sector agencies that rely on paper processes for their day to day operations, the transition has not been easy. With people out of the office, accessing older records – often on paper or microfiche – is not an option.?

Paper 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Agencies Warn of Uptick in North Korean Bank Heists

Data Breach Today

'BeagleBoyz' Hacking Group Uses Remote Access Tools U.S. agencies have issued a warning about increases in bank heists worldwide spearheaded by a hacking group called "BeagleBoyz," a subset of the Lazarus Group, which has ties to the North Korean government.

article thumbnail

Redefining What CISO Success Looks Like

Dark Reading

Key to this new definition is the principle that security programs are designed to minimize business risk, not to achieve 100% no-risk.

Risk 132
article thumbnail

Analysis: The Unusual Case Against Former Uber CSO

Data Breach Today

The latest edition of the ISMG Security Report analyzes the unusual case against former Uber CSO, Joe Sullivan, who was charged in connection with allegedly covering up a data breach. Also featured: CISA director on election security; insights on preventing healthcare fraud.

article thumbnail

Weekly Update 206

Troy Hunt

Since I recorded this morning, I've had an absolute breakthrough - I CAN OPEN MY GARAGE DOOR WITH MY WATCH ! I know, I know, it shouldn't be this hard and that's a lot of the point I'm making in this week's video. Having said that, some parts have been hard because I've made simple mistakes , but the nature of the IoT ecosystem as it stands today predisposes you to mistakes because there's so freakin' many moving parts that all need to be aligned.

IoT 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Alleged BEC Scammer Extradited From Ghana

Data Breach Today

Prosecutors: Scheme Targeted Memphis-Based Real Estate Company A Ghana resident has been extradited to the U.S. to face charges of targeting a Memphis-based real estate company in a sophisticated BEC scam and participating in other criminal schemes, according to the Justice Department.

157
157
article thumbnail

US Postal Service Files Blockchain Voting Patent

Schneier on Security

The US Postal Service has filed a patent on a blockchain voting method: Abstract: A voting system can use the security of blockchain and the mail to provide a reliable voting system. A registered voter receives a computer readable code in the mail and confirms identity and confirms correct ballot information in an election. The system separates voter identification and votes to ensure vote anonymity, and stores votes on a distributed ledger in a blockchain.

article thumbnail

Instagram ‘Help Center’ Phishing Scam Pilfers Credentials

Threatpost

Researchers warn that a phishing scam is targeting Instagram users via direct messages on the app.

Phishing 130
article thumbnail

Data Privacy Concerns, Lack of Trust Foil Automated Contact Tracing

Dark Reading

Efforts to create a technology framework for alerting people to whether they have been exposed to an infectious disease have been hindered by a number of key issues.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack

Threatpost

A Tesla employee was reportedly approached by a Russian national and asked to install malware on the company's systems.

article thumbnail

BIS Issues Long-Awaited Notice on Controls on Foundational Technologies, Adds New Entities to Entity List

Data Matters

The U.S. Department of Commerce, Bureau of Industry and Security (BIS) published an advance notice of proposed rulemaking (ANPRM) soliciting comments to identify foundational technologies essential to U.S. national security by October 26, 2020 (the Foundational Technologies ANPRM). The ANPRM is only one step in a multiyear process through which the U.S. government transforms the regulations restricting the availability of U.S.

article thumbnail

DoJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers

Threatpost

Complaint details collaboration with China to funnel $250m in stolen funds as part of state-sponsored attacks.

article thumbnail

Ransomware Red Flags: 7 Signs You're About to Get Hit

Dark Reading

Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Infographic: What Major Tech Companies are Collecting from Users via The Digital Information World

IG Guru

Check out the link to their article here. The post Infographic: What Major Tech Companies are Collecting from Users via The Digital Information World appeared first on IG GURU.

article thumbnail

How a global research and manufacturing company achieves regulatory compliance

OpenText Information Management

As a Contract Research and Manufacturing organization with over 330 clients around the globe, regulatory compliance is non-negotiable for Syngene International. Its integrated scientific solutions necessitate careful documenting of trials, test results, product formulae, manufacturing processes, and more. Committed to upholding the highest standards, Syngene introduced a company-wide initiative to remove all paper from its … The post How a global research and manufacturing company achieves

article thumbnail

TA542 Returns With Emotet: What's Different Now

Dark Reading

Researchers report the TA542 threat group has made code changes to its malware and started targeting new locations with Emotet.

IT 83
article thumbnail

Hiring IT Experts to Support Your Technology Investments

Adapture

Hiring IT experts typically comes down to choosing between a generalist with a long resume of client projects and diverse ideas or a specialist who has expertise in your chosen technology. While you might have a place for both in your company, they serve different roles for different seasons. Jack of all trades or a hyper-focused expert?which is the best fit for your team?

IT 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Register Now! Remote Training for State & Local Governments

The Texas Record

We are excited to announce that we will be conducting free introductory records management classes via Zoom for both state agencies and local governments on: Local Governments: Records Management Basics Tuesday, September 15, 2020 – 9:00 a.m.-12:00 p.m. (CDT) – Register here! State Agencies: Records Management Basics Tuesday, October 6, 2020 – 10:00 a.m.-11:30 a.m.

article thumbnail

Hiring IT Experts to Support Your Technology Investments

Adapture

Hiring IT experts typically comes down to choosing between a generalist with a long resume of client projects and diverse ideas or a specialist who has expertise in your chosen technology. While you might have a place for both in your company, they serve different roles for different seasons. Jack of all trades or a [ ] The post Hiring IT Experts to Support Your Technology Investments appeared first on ADAPTURE.

IT 52
article thumbnail

Spotlight Podcast: Taking a Risk-Based Approach to Election Security

The Security Ledger

In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? We're joined by two information security professionals: Rob Carey is the Vice President and General Manager of Global Public Sector. Read the whole entry. » Related Stories Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience Spotlight Podcast: RSA President

Risk 52