Wed.Jul 05, 2023

article thumbnail

Russian Ransomware Group Shuts Down Major Japanese Port

Data Breach Today

Reported LockBit 3.0 Attack Locks Up Systems, Delays Shipping of Toyota Auto Parts Ransomware believed to originate from the Russian LockBit 3.0 group has locked up computer systems for the Port of Nagoya, Japan's largest cargo hub. The attack held up shipments of Toyota auto parts containers starting Tuesday, but port authorities expect to resume operations Thursday morning.

article thumbnail

Microsoft Teams Exploit Tool Auto-Delivers Malware

Dark Reading

The "TeamsPhisher" cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Chinese Counterespionage Law Aimed at US Tech Sector

Data Breach Today

Experts Say China Aims to Retaliate Against US Tech Companies, Dissidents Experts believe China's revised Counter-Espionage Law gives the Chinese Communist Party the power to retaliate against Western financial and technological sanctions and also control rising discontent among Chinese citizens. The law went into effect on Saturday.

141
141
article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

On June 28, 2023, the New York Department of Financial Services (“NYDFS”) published an updated proposed Second Amendment (“Amendment”) to its Cybersecurity Regulation, 23 NYCRR Part 500. On November 9, 2022, NYDFS published a first draft of the proposed Amendment and received comments from stakeholders over a 60-day period. The updated proposed Amendment will be subject to an additional 45-day comment period.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

UK Academics Join Critics of Proposal to Weaken Encryption

Data Breach Today

Proposed Online Safety Bill Is 'Doomed to Fail,' Academics Say in an Open Letter Over five dozen British academics joined a widening group of technology firms and privacy groups in criticizing a U.K. government bill aimed at protecting children from online harassments by weakening encryption. In an open letter, they said the bill is "doomed to fail.

More Trending

article thumbnail

Tennessee Clinic: April 'BianLian' Attack Affected 559,000

Data Breach Today

Cybercrime Group May Have Stolen Patient and Employee Information A Tennessee medical clinic and surgical center is notifying more than half a million patients and employees that their personal information may have been stolen by cybercriminals in an April cyberattack that disrupted healthcare services for several days.

130
130
article thumbnail

What Is a Pentest Framework? Top 7 Frameworks Explained

eSecurity Planet

A pentest framework, or penetration testing framework, is a standardized set of guidelines and suggested tools for structuring and conducting effective pentests across different networks and security environments. While it’s certainly possible to construct your own pentest framework that meets the specific security and compliance requirements of your organization, a number of existing methodologies and frameworks can be built upon to make the job easier for you.

article thumbnail

Sweden Fines Firms for Google Analytics Use, Privacy Issues

Data Breach Today

Swedish Authority for Privacy Protection: Companies Must Not Use Google Analytics Swedish data privacy officials issued fines against two of four companies found to have violated rules against the export of European users' data due to their use of Google Analytics, which was found to contravene EU privacy regulations due to the potential risks of U.S. government surveillance.

Analytics 130
article thumbnail

Ransomware accounts for 54% of cyber threats in the health sector

Security Affairs

The European Union Agency for Cybersecurity (ENISA) releases its first cyber threat landscape report for the health sector. The European Union Agency for Cybersecurity (ENISA) releases today its first cyber threat landscape report for the health sector. The report identifies prime threats, threat actors, and trends and covers a period of over 2 years.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Accounting Fraud: Which Tools Should You Invest In?

Data Breach Today

3 Experts Discuss the Vendor Market in Anti-Fraud Technology, DOJ Regulations Accounting statement fraud is hard to catch, typically requiring specialized anti-fraud tools and an understanding of how fraudsters think. In this second installment on accounting fraud, a panel of experts discussed the tools available and why you need fraud expertise to build an effective system.

Marketing 130
article thumbnail

US Spies Are Buying Americans' Private Data. Congress Has a Chance to Stop It

WIRED Threat Level

The National Defense Authorization Act may include new language forbidding government entities from buying Americans' search histories, location data, and more.

IT 98
article thumbnail

Kevin Mandia on Attacks Against Ukraine and Why They Matter

Data Breach Today

Mandiant CEO Shares How Russian Wiper Malware Is Evading Ukrainian EDR, Antivirus Russia has relied on blunt-force cyberattacks in Ukraine to inflict maximum damage rather than turning to new techniques. In many cases, Ukrainian defenders are flying blind because Russian wiper malware is designed to evade most security controls, said Mandiant CEO Kevin Mandia.

Security 130
article thumbnail

Class-Action Lawsuit for Scraping Data without Permission

Schneier on Security

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either registering as a data broker or obtaining consent. On the one hand, I want this to be a protected fair use of public data. On the other hand, I want us all to be compensated for our uniquely human ability to generate language.

Paper 93
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Crypto Cybercrime Cost Dips to $920M in 2023

Data Breach Today

Losses Plunge 54% YoY; Number of Security Incidents Stays About the Same Hackers kept pace with the rapid evolution of blockchain systems, stealing about $920 million in the first half of 2023. Cybercriminals attacked smart contracts, phished victims and stole from crypto exchanges in dozens of security incidents through June 30.

article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

RedEnergy is a sophisticated stealer-as-a-ransomware that was employed in attacks targeting energy utilities, oil, gas, telecom, and machinery sectors. Zscaler ThreatLabz researchers discovered a new Stealer-as-a-Ransomware named RedEnergy used in attacks against energy utilities, oil, gas, telecom, and machinery sectors. The malware allows operators to steal information from various browsers, it also supports ransomware capabilities.

article thumbnail

Startup Spotlight: Gomboc.ai Balances Cloud Infrastructure Security

Dark Reading

The startup, one of four finalists in Black Hat USA's 2023 startup competition, uses deterministic AI to optimize cloud security.

Cloud 105
article thumbnail

CVE-2022-29303 flaw in SolarView product can be exploited in attacks against the energy sector

Security Affairs

A vulnerability in SolarView product can be exploited in attacks targeting organizations in the energy sector. Researchers from the cybersecurity firm VulnCheck reported that the vulnerability CVE-2022-29303 in the solar power monitoring Contec SolarView product can be exploited in attacks targeting organizations in the energy sector. CVE-2022-29303 is an unauthenticated and remote command injection vulnerability impacting the Contec SolarView Series.

IoT 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems

Dark Reading

Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.

101
101
article thumbnail

The Port of Nagoya, the largest Japanese port, suffered a ransomware attack

Security Affairs

The Port of Nagoya, the largest port in Japan, suffered a ransomware attack that severely impacted its operations. The Port of Nagoya , in the Ise Bay, is the largest and busiest trading port in Japan, accounting for about 10% of the total trade value of Japan. Notably, this port is the largest exporter of cars in Japan and where the Toyota Motor Corporation exports most of its cars.

article thumbnail

KnowBe4 Named a Leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the ninth consecutive quarter!

article thumbnail

Swedish data protection authority rules against the use of Google Analytics

Security Affairs

Swedish data protection watchdog warns companies against using Google Analytics due to the risk of surveillance operated by the US government. The Swedish data protection watchdog warned businesses against using Google Analytics due to the risk of surveillance carried out by the US government. The Swedish Authority for Privacy Protection (IMY) conducted audits against CDON, Coop, Dagens Industri, and Tele2 and determined how they use Google Analytics for web statistics.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Stitching: The key to end-to-end lineage

Collibra

In the world of data governance and intelligence, understanding data lineage is essential for making informed decisions. This is where stitching comes in as an incredibly important concept in Collibra. Stitching entails matching different segments of lineage to obtain end-to-end lineage, allowing for a comprehensive view of the data’s journey throughout the organization.

article thumbnail

NoName(057)16’s DDoSia Project’s gets an upgrade

Security Affairs

The DDoSia attack tool received an upgrade, it supports a new security mechanism to conceal the list of targets. Researchers at the cybersecurity firm Sekoia analyzed an updated variant of the DDoSia attack tool that was developed and used by the pro-Russia collective NoName(057)16. The tool was employed in attacks against Ukraine and NATO countries, including the Eastern Flank (Lithuania, Poland, Czech Republic and Latvia).

article thumbnail

KnowBe4 Named a Leader in the Summer 2023 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

Mitigating Risk With Threat Intelligence

Dark Reading

Dark Reading's latest publication looks at a missing, but necessary, ingredient to effective third-party risk management.

Risk 99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

EV Charger Hacking Poses a ‘Catastrophic’ Risk

WIRED Threat Level

Vulnerabilities in electric vehicle charging stations and a lack of broad standards threaten drivers—and the power grid.

Risk 94
article thumbnail

Cl0p's MOVEit Campaign Represents a New Era in Cyberattacks

Dark Reading

The ransomware group shows an evolution of its tactics with MOVEit zero-day — potentially ushering in a new normal when it comes to extortion supply chain cyberattacks, experts say.

article thumbnail

What is cloud cost optimization?

IBM Big Data Hub

Moving data and applications from traditional on-premises data centers to cloud infrastructure offers companies the potential for significant cost savings through accelerating innovation, keeping a competitive edge and better interacting with customers and employees. What’s more, IT infrastructure becomes a pay-as-you-go operational expense with most public cloud providers.

Cloud 75