Sun.Jun 05, 2022

article thumbnail

Hackers stole over $250,000 in Ethereum from Bored Ape Yacht Club

Security Affairs

Hackers have stolen over $250,000 in Ethereum from Bored Ape Yacht Club (BAYC), this is the third security breach it suffered this year. Threat actors compromised Bored Ape Yacht Club (BAYC) for the third time this year, they have stolen and sold NFTs, making away with 142 ETH, equivalent to over $250,000. The hacker conducted a phishing attack, they set up a phishing site that impersonated the official BAYC site claiming that BAYC, MAYC and OthersideMeta holders were able to claim a free NFT fo

Phishing 132
article thumbnail

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective

Elie

Using end-to-end encrypted services is quickly becoming a critical component of how enterprises meet regulations and ensure data sovereignty. This presentation will provide an inside look at the value E2EE (end-to-end encrypted) services offer to enterprises, how they work in practice, the tradeoffs of using them, and practical strategies currently being investigated to try to bridge features gaps between E2EE and non-E2EE services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PoC exploits for Atlassian CVE-2022-26134 RCE flaw released online

Security Affairs

Proof-of-concept exploits for the critical CVE-2022-26134 vulnerability in Atlassian Confluence and Data Center servers are available online. Proof-of-concept exploits for the critical CVE-2022-26134 flaw, affecting Atlassian Confluence and Data Center servers, have been released. Bleeping Computer reported that starting from Friday afternoon, a proof-of-concept exploit for this issue was publicly shared.

article thumbnail

Welcoming the Indonesian Government to Have I Been Pwned

Troy Hunt

Four years ago now, I started making domains belonging to various governments around the world freely searchable via a set of APIs in Have I Been Pwned. Today, I'm very happy to welcome the 33rd government, Indonesia! As of now, the Indonesian National CERT managed under the National Cyber and Crypto Agency has full access to this service to help protect government departments within the country.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Atlassian rolled out fixes for Confluence zero-day actively exploited in the wild

Security Affairs

Atlassian has addressed on Friday an actively exploited critical remote code execution flaw (CVE-2022-26134) in Confluence Server and Data Center products. Early this week, Atlassian warned of a critical unpatched remote code execution vulnerability affecting all Confluence Server and Data Center supported versions, tracked as CVE-2022-26134, that is being actively exploited in attacks in the wild.

IoT 120

More Trending

article thumbnail

Security Affairs newsletter Round 368 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for free in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Anonymous: Operation Russia after 100 days of war GitLab addressed critical account take over via SCIM email change LuoYu APT delivers WinDealer malware via man-on-the-side attacks Clipminer Botnet already allowed operators to make at least $1.7 Millio

Security 101
article thumbnail

The Hacker Gold Rush That's Poised to Eclipse Ransomware

WIRED Threat Level

As governments crack down on ransomware, cybercriminals may soon shift to business email compromise—already the world's most profitable type of scam.

article thumbnail

My Health Record: after 12 years and more than $2bn, hardly anyone is using digital service

The Guardian Data Protection

Research shows many Australians find medical records not uploaded and clinicians fail to see benefits of using the national online database Get our free news app ; get our morning email briefing Twelve years after the introduction of My Health Record, Australians are struggling to access their medical information, while clinicians report frustrating difficulties uploading and finding vital health details such as pathology results and diagnostic tests.

Access 75
article thumbnail

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective

Elie

Using end-to-end encrypted services is quickly becoming a critical component of how enterprises meet regulations and ensure data sovereignty. This presentation will provide an inside look at the value E2EE (end-to-end encrypted) services offer to enterprises, how they work in practice, the tradeoffs of using them, and practical strategies currently being investigated to try to bridge features gaps between E2EE and non-E2EE services.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Met police did not consult us on children’s data project, say youth violence experts

The Guardian Data Protection

Force claimed it approached groups before launch of Project Alpha which scours social media sites Youth violence experts have said they had no involvement with a police scheme that collects children’s personal data , despite the Met claiming to have consulted them. Project Alpha, involving more than 30 staff and launched in 2019 with Home Office funding, scours social media sites looking at drill music videos and other content.