Tue.May 09, 2023

article thumbnail

Feds Dismember Russia's 'Snake' Cyberespionage Operation

Data Breach Today

Operation Medusa: FBI Tool Instructs Turla Group's Malware to Self-Destruct Federal officials say a global operation has disrupted Snake, the Russian government's "foremost cyberespionage tool," wielded by its Turla nation-state hacking group. The sophisticated malware has been tied to the theft of secret and classified information from numerous governments and businesses.

article thumbnail

Microsoft Patch Tuesday, May 2023 Edition

Krebs on Security

Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks. First up in May’s zero-day flaws is CVE-2023-29336 , which is an “elevation of privilege” weakness in Windows which has a low attack complexity, requires low privileges, and no user interaction.

Access 206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PEGA Committee Calls for Limits on Commercial Spyware

Data Breach Today

Final Recommendations Drop Call for Moratorium A European Parliament committee investigating commercial spyware tools such as Pegasus recommended new regulatory safeguards but dropped a preliminary call for a moratorium. Members condemned "major violations of EU law in Poland and Hungary" for those governments' use of commercial spyware.

article thumbnail

Feds Take Down 13 More DDoS-for-Hire Services

Krebs on Security

The U.S. Federal Bureau of Investigation (FBI) this week seized 13 domain names connected to “ booter ” services that let paying customers launch crippling distributed denial-of-service (DDoS) attacks. Ten of the domains are reincarnations of DDoS-for-hire services the FBI seized in December 2022, when it charged six U.S. men with computer crimes for allegedly operating booters.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Court Rules for Corellium In Apple Copyright Case

Data Breach Today

Appeals Court Says Corellium Can Virtualize iOS; Remands Two Copyright Claims A U.S. federal appeals court sided with a company that simulates iPhones for security researchers after Apple sued, claiming copyright infringement. The court dismissed a claim that the company had infringed its copyright over iOS and remanded two other claims related to icons and wallpapers.

Security 147

More Trending

article thumbnail

Introducing the technology behind watsonx.ai, IBM’s AI and data platform for enterprise

IBM Big Data Hub

We stand on the frontier of an AI revolution. Over the past decade, deep learning arose from a seismic collision of data availability and sheer compute power, enabling a host of impressive AI capabilities. But we’ve faced a paradoxical challenge: automation is labor intensive. It sounds like a joke, but it’s not, as anyone who has tried to solve business problems with AI may know.

article thumbnail

4 Best Practices to Build Better ESG and Sustainability Programs

Hanzo Learning Center

In recent years, there has been an increasing trend for companies to claim environmental sustainability, making public commitments to lower carbon emissions and other eco-friendly measures. However, this rise in environmental claims has also led to the concern of greenwashing, where companies make false or exaggerated statements about their environmental practices.

Risk 98
article thumbnail

Accelerate your speed of business with IBM Event Automation

IBM Big Data Hub

Customer needs and market dynamics are constantly shifting from one moment to the next. There are thousands of business events flowing through every part of your organization every day. These events can provide a wealth of information about what’s actually happening across your business at any moment in time. Organizations that can capitalize on this continual stream of business intelligence can spot trends, issues and opportunities, address threats, and act quickly.

Marketing 104
article thumbnail

Fortinet warns of a spike of the activity linked to AndoryuBot DDoS botnet

Security Affairs

A DDoS botnet dubbed AndoryuBot has been observed exploiting an RCE, tracked as CVE-2023-25717, in Ruckus access points. FortiGuard Labs researchers have recently observed a spike in attacks attempting to exploit the Ruckus Wireless Admin remote code execution vulnerability tracked as CVE-2023-25717. The activity is associated with a known DDoS botnet tracked as AndoryuBot that first appeared in February 2023.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

At IBM Think, partners are front and center

IBM Big Data Hub

If you’ve followed IBM over the past few years, you know how critical the IBM Ecosystem is to our growth strategy. It’s why we gave partners access to the same training and enablement as IBMers last year, launched a new partner program in January, and continue investing in and growing the IBM Ecosystem. So, it should come as no surprise that partners are front and center during our annual Think conference this week.

Cloud 99
article thumbnail

FBI Disarms Russian FSB 'Snake' Malware Network

Dark Reading

Operation "Medusa" disabled Turla's Snake malware with an FBI-created tool called Perseus.

134
134
article thumbnail

Microsoft Patch Tuesday for May 2023 fixed 2 actively exploited zero-day flaws

Security Affairs

Microsoft Patch Tuesday Security updates for May 2023 address a total of 40 vulnerabilities, including two zero-day actively exploited in attacks. Microsoft’s May 2023 security updates address 40 vulnerabilities, including two zero-day flaws actively exploited in attacks. The flaws affect Microsoft Windows and Windows Components; Office and Office Components; Microsoft Edge (Chromium-based); SharePoint Server; Visual Studio; SysInternals; and Microsoft Teams.

article thumbnail

SideWinder Strikes Victims in Pakistan, Turkey in Multiphase Polymorphic Attack

Dark Reading

The APT is exploiting a remote template injection flaw to deliver malicious documents that lure in government officials and other targets with topics of potential interest.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Dallas Police Department is the Latest Victim of a Ransomware Attack

KnowBe4

Unfortunately ransomware attacks have taken another victim. The City of Dallas recently confirmed that their police department suffered a ransomware attack. This attack shutdown essential services along with some 911 dispatch systems.

article thumbnail

A Linux NetFilter kernel flaw allows escalating privileges to ‘root’

Security Affairs

A Linux NetFilter kernel flaw, tracked as CVE-2023-32233, can be exploited by unprivileged local users to escalate their privileges to root. Netfilter is a framework provided by the Linux kernel that allows various networking-related operations to be implemented in the form of customized handlers. Netfilter offers various functions and operations for packet filtering, network address translation, and port translation, which provide the functionality required for directing packets through a netw

article thumbnail

Microsoft Patches 2 Zero-Day Vulnerabilities

Dark Reading

The 49 CVE's in Microsoft's May security update is the lowest volume in nearly two years.

Security 126
article thumbnail

Reshaping IT automation with IBM Watson Code Assistant

IBM Big Data Hub

In today’s digital world, business and IT leaders are turning to automation to improve operational efficiency, increase employee productivity and, ultimately, boost business performance. At IBM, we believe that organizations need AI coupled with automation to help developers reduce time to productivity. By empowering employees with automation and AI technologies like machine learning , deep learning , and natural language processing , IT organizations can narrow skills gaps and enable deve

IT 88
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

More InterPlanetary File System Services Use Also Means Phishing Abuse by Cybercriminals

KnowBe4

The InterPlanetary File System (IPFS), a distributed file-sharing system that represents an alternative to the more familiar location-based hypermedia server protocols (like HTTPS), is seeing more use in file-storage, web-hosting, and cloud services. As might be expected, more use is accompanied by more abuse via phishing attacks.

article thumbnail

Iran-linked APT groups started exploiting Papercut flaw

Security Affairs

Microsoft warns of Iran-linked APT groups that are targeting vulnerable PaperCut MF/NG print management servers. Microsoft warns that Iran-linked APT groups have been observed exploiting the CVE-2023-27350 flaw in attacks against PaperCut MF/NG print management servers. The CVE-2023-27350 flaw is a PaperCut MF/NG Improper Access Control Vulnerability.

article thumbnail

[Finger on the Trigger] How the FBI Nuked Russian FSB's Snake Data Theft Malware

KnowBe4

The Five Eyes member nations' cybersecurity and intelligence agencies dismantled the infrastructure of the Snake cyber-espionage malware that was operated by Russia's Federal Security Service (FSB).

article thumbnail

The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services

WIRED Threat Level

For a decade, a group called Big Pipes has worked behind the scenes with the FBI to target the worst cybercriminal “booter” services plaguing the internet.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

PIPEDREAM Malware against Industrial Control Systems

Schneier on Security

Another nation-state malware , Russian in origin: In the early stages of the war in Ukraine in 2022, PIPEDREAM, a known malware was quietly on the brink of wiping out a handful of critical U.S. electric and liquid natural gas sites. PIPEDREAM is an attack toolkit with unmatched and unprecedented capabilities developed for use against industrial control systems (ICSs).

article thumbnail

FBI seized 13 domains linked to DDoS-for-hire platforms

Security Affairs

The U.S. DoJ announced the seizure of 13 new domains associated with DDoS-for-hire platforms as part of Operation PowerOFF. The U.S. Justice Department announced the seizure of 13 domains linked to DDoS-for-hire services as part of a coordinated international law enforcement effort known as Operation PowerOFF. DDoS-for-hire or ‘booter’ services allows registered users to launch order DDoS attacks without specific knowledge.

article thumbnail

Royal Ransomware Expands to Target Linux, VMware ESXi

Dark Reading

The ransomware gang has also started using the BatLoader dropper and SEO poisoning for initial access.

article thumbnail

The global food distribution giant Sysco discloses a data breach

Security Affairs

Sysco, the global food distribution giant, disclosed a data breach, the compromised data includes customer and employee data. Sysco Corporation is an American multinational corporation involved in marketing and distributing food products, smallwares, kitchen equipment and tabletop items. BleepingComputer, who has seen an internal memo sent to employees on May 3, first reported that threat actors may have had access to customer and supplier data in the U.S. and Canada, as well as personal inform

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Bring light to the black box

IBM Big Data Hub

It is well known that Artificial Intelligence (AI) has progressed, moving past the era of experimentation to become business critical for many organizations. Today, AI presents an enormous opportunity to turn data into insights and actions, to help amplify human capabilities, decrease risk and increase ROI by achieving break through innovations. While the promise of AI isn’t guaranteed and may not come easy, adoption is no longer a choice.

article thumbnail

New CACTUS ransomware appeared in the threat landscape

Security Affairs

Researchers warn of a new ransomware family called CACTUS that exploits known vulnerabilities in VPN appliances to gain initial access to victims’ networks. Researchers from cybersecurity firm Kroll have analyzed on a new ransomware family called CACTUS that has been spotted exploiting known flaws in VPN appliances to achieve initial access to targeted networks.

article thumbnail

The Problem of Old Vulnerabilities — and What to Do About It

Dark Reading

The vulnerabilities most often exploited by ransomware attackers are already known to us.

IT 92