Fri.Sep 15, 2023

article thumbnail

Caesars Confirms Ransomware Payoff and Customer Data Breach

Data Breach Today

MGM Resorts Continuing to Be Extorted by the Same Alphv/BlackCat Ransomware Group Casino and hotel giant Caesars Entertainment is warning customers that their personal details were stolen in a recent hack attack. After successfully shaking down Caesars for a ransom, the same attackers are continuing to extort MGM Resorts, claiming to have crypto-locked its EXSi hypervisors.

article thumbnail

Okta Flaw Involved in MGM Resorts Breach, Attackers Claim

Dark Reading

ALPHV/BlackCat ransomware operators have used their leak site to "set the record straight" about the MGM Resorts cyberattack. Meanwhile, more attacks abusing Okta could be likely.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lessons to Learn From Clop's MOVEit Supply-Chain Attacks

Data Breach Today

Data Minimization and Encryption Mitigate Fallout, Says FS-ISAC's Teresa Walsh The Clop ransomware group's zero-day attack on MOVEit software was its fourth data theft campaign targeting secure file transfer users. Organizations can combat such attacks by using data minimization and encryption - among other defenses, says Teresa Walsh, global head of intelligence for FS-ISAC.

article thumbnail

DoD: China's ICS Cyber Onslaught Aimed at Gaining Kinetic Warfare Advantage

Dark Reading

Escalating incursions into military base infrastructure, telecom networks, utilities, and more signal that Beijing is laying the groundwork for mass disruption.

Military 120
article thumbnail

Customer Experience Management: Optimizing Your Strategy for Financial Success

Speaker: Diane Magers, Founder and Chief Experience Officer at Experience Catalysts

In the world of business, connecting the dots from experience to financial impact is an essential skill. Transforming customer engagement, Voice of Customer (VoC) insights, and Journey Maps into tangible financial outcomes poses a significant challenge for most organizations. To gain buy-in from the C-Suite and key stakeholders, it’s crucial to illustrate how Experience Management translates into clear, measurable business results.

article thumbnail

Critical Considerations for Generative AI Use in Healthcare

Data Breach Today

Generative AI holds great potential for many amazing applications in healthcare, but it's critical to establish a strong framework before deploying it, said Barbee Mooneyhan, vice president of security, IT and privacy of Woebot Health, a provider of AI-driven online mental health services.

Privacy 277

More Trending

article thumbnail

Iranian Hackers Gain Sophistication, Microsoft Warns

Data Breach Today

Noisy 'Peach Sandstorm' Password Spraying Campaign Is Followed by Stealth Iranian state threat actor "Peach Sandstorm" is growing in sophistication, warns Microsoft in an alert about a campaign of password hacking targeting the satellite, defense and pharmaceutical sectors. The group's newfound polish is reflected in what the hackers did after establishing persistence.

Passwords 262
article thumbnail

Caesars Entertainment paid a ransom to avoid stolen data leaks

Security Affairs

Caesars Entertainment announced it has paid a ransom to avoid the leak of customer data stolen in a recent intrusion. Caesars Entertainment is the world’s most geographically diversified casino-entertainment company. It is the largest gaming company in the United States, with over 50 casinos and hotels in 13 U.S. states and five countries. The company also owns and operates a number of other businesses, including a golf course management company, a travel agency, and a marketing firm.

article thumbnail

TikTok Fined 345 Million Euros by Irish Privacy Watchdog

Data Breach Today

ByteDance-Owned App Fined for Violating Children's Privacy TikTok will pay Irish data privacy regulators 345 million euros to settle allegations it violated the privacy of underage users. A TikTok spokesperson said the company disagreed with Irish Data Protection Commission, calling the violations based on features that no longer exist.

Privacy 272
article thumbnail

Microsoft: 'Peach Sandstorm' Cyberattacks Target Defense, Pharmaceutical Orgs

Dark Reading

For months, the Iran-backed APT has carried out waves of password spray attacks attempting to authenticate to thousands of environments across multiple targets worldwide.

article thumbnail

How to Stay Competitive in the Evolving State of Martech

Marketing technology is essential for B2B marketers to stay competitive in a rapidly changing digital landscape — and with 53% of marketers experiencing legacy technology issues and limitations, they’re researching innovations to expand and refine their technology stacks. To help practitioners keep up with the rapidly evolving martech landscape, this special report will discuss: How practitioners are integrating technologies and systems to encourage information-sharing between departments and pr

article thumbnail

ISMG Editors: Are Frequently Used Usernames a Security Risk?

Data Breach Today

Also; The 'Quantum Divide'; Global AI Regulatory Trends In the latest weekly update, four editors at ISMG discuss important cybersecurity and privacy issues, including how to keep assets secure in the quantum era, when common usernames pose a cybersecurity threat, and how to strike the right balance between regulation and innovation in AI.

Security 268
article thumbnail

Dangerous permissions detected in top Android health apps

Security Affairs

Leading Android health apps expose users to avoidable threats like surveillance and identity theft, due to their risky permissions. Cybernews has the story. The Android challenge In the digital age, mobile applications have become an integral part of our lives, transforming the way we communicate, work, and entertain ourselves. With the vast array of apps available at our fingertips, it’s easy to overlook the potential risks they may pose.

Privacy 105
article thumbnail

Enhancing Cloud Security on AWS

Data Breach Today

Why You Should Consider a Cloud-Native Firewall Service How does an organization achieve peace of mind with security while overcoming the challenges of complex hybrid and multi-cloud networks? Here are the top reasons why your organization should consider implementing a cloud-native firewall service to protect your AWS environments and applications.

Cloud 230
article thumbnail

NCSC: Why Cyber Extortion Attacks No Longer Require Ransomware

Dark Reading

Ransomware becoming less of a factor as threat actors extort businesses with payment options that are less than regulatory fines.

article thumbnail

The Essential Guide to Analytic Applications

Embedding dashboards, reports and analytics in your application presents unique opportunities and poses unique challenges. We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core. No matter where you are in your analytics journey, you will learn about emerging trends and gather best practices from product experts.

article thumbnail

Board Members' Lack of Security Awareness Puts Businesses at Risk of Cyber Attacks, Finds Savanti Report

KnowBe4

A report from cybersecurity consultancy Savanti reveals that board members are facing challenges in understanding cyber risks , and this has important implications for businesses.

article thumbnail

TikTok fined €345m for breaking EU data law on children’s accounts

The Guardian Data Protection

Irish data regulator says platform put 13- to 17-year-old users’ accounts on default public setting, among other breaches TikTok has been fined €345m (£296m) for breaking EU data law in its handling of children’s accounts, including failing to shield underage users’ content from public view. The Irish data watchdog, which regulates TikTok across the EU, said the Chinese-owned video app had committed multiple breaches of GDPR rules.

GDPR 106
article thumbnail

Greater Manchester Police Hack Follows Third-Party Supplier Fumble

Dark Reading

This incident bears notable resemblance to an attack that occurred just last month affecting London's Metropolitan Police, raising concerns over UK cybersecurity safeguards for public safety.

article thumbnail

On Technologies for Automatic Facial Recognition

Schneier on Security

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference. However, six years later, the company now known as Meta has not released a version of that product and Mr.

IT 96
article thumbnail

ABM Evolution: How Top Marketers Are Using Account-Based Strategies

In times of economic uncertainty, account-based strategies are essential. According to several business analysts and practitioners, ABM is a necessity for creating more predictable revenue. Research shows that nearly three-quarters of marketers (74%) already have the resources needed to build successful ABM programs.

article thumbnail

Catches of the Month: Phishing Scams for September 2023

IT Governance

Welcome to our September 2023 catches of the month feature, which examines recent phishing scams and the tactics criminals use to trick people into compromising their data. Following last month’s news that Microsoft was the most impersonated brand in phishing scams in Q2 2023 – which is hardly surprising given its popularity – this month we discuss three more Microsoft-based scams: two involving Teams and one exploiting Word.

article thumbnail

How to Mitigate Cybersecurity Risks From Misguided Trust

Dark Reading

Trust is the crucial bridge between security and people, but excessive or misguided trust can pose serious security risks.

Risk 109
article thumbnail

The BISO Secret Weapon: Enhancing Collaboration for Cybersecurity and Business Growth with Nicole Dove

KnowBe4

Do you want to bridge the gap between IT, cybersecurity, and the business to enhance collaboration and integration? Are you seeking a solution to align cybersecurity efforts with business goals?

article thumbnail

Dariy Pankov, the NLBrute malware author, pleads guilty

Security Affairs

The Russian national Dariy Pankov, aka dpxaker, has pleaded guilty to conspiracy to commit wire and computer fraud. The Russian national Dariy Pankov (28), aka dpxaker, is the author of the NLBrute malware. The man has been extradited to the United States from Georgia. In February 2023, Pankov was charged with conspiracy, access device fraud, and computer fraud.

article thumbnail

7+ Graphics Libraries to Enhance Your Embedded Analytics

When your customers come to your app, what do they see: clunky, outdated dashboards or a sleek, modern interface? If your embedded analytics are looking stale, leverage these free graphics libraries to take your embedded analytics offerings above and beyond. This e-book details a number of graphics libraries plus a few bonus tools to modernize your embedded dashboards.

article thumbnail

91% of Cybersecurity Professionals Have Experienced Cyber Attacks that Use AI

KnowBe4

A new report takes an exhaustive look at how cybersecurity professionals see the current and future state of attacks, and how well vendors are keeping up.

article thumbnail

Why Shared Fate is a Better Way to Manage Cloud Risk

Dark Reading

The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature model for the future of cloud security.

Cloud 73
article thumbnail

Deepfakes More Common So Bolster Your Defenses

KnowBe4

The United States FBI, NSA, and CISA have released a joint report outlining the various social engineering threats posed by deepfakes.

article thumbnail

ONC and HHS OCR Release Updated HIPAA Security Risk Assessment Tool

Hunton Privacy

On September 13, 2023, the National Coordinator for Health Information Technology (“ONC”) and the Office for Civil Rights (“OCR”) at the U.S. Department of Health and Human Services released version 3.4 of the Security Risk Assessment (“SRA”) Tool under the Health Insurance Portability and Accountability Act (“HIPAA”) Security Rule. The HIPAA Security Rule requires HIPAA covered entities to perform a risk assessment to identify and evaluate potential risks and vulnerabilities associated with the

Risk 66
article thumbnail

ABM Success Recipe: Mastering the Crawl, Walk, Run Approach

Shifting to an account-based marketing (ABM) strategy can be both exciting and challenging. Well-implemented ABM motions build engagement with high-value accounts and drive impactful campaigns that resonate with your audience. But where do you begin, and how do you progress from crawling to running? Watch now as Demand Gen experts delve into the essentials of each stage of the ABM process.

article thumbnail

Microsoft (Once Again) Tops the List of Most Impersonated Brands in 2023

KnowBe4

Out of the over 350 brands regularly impersonated in phishing attacks, Microsoft continues to stand out because they provide attackers with one unique advantage over other brands.

article thumbnail

The tsunami of sustainability disclosures facing American multinationals: Is your company prepared?

IBM Big Data Hub

Globally, there has been an uptick of landmark regulations forcing companies to address sustainability issues like climate change, and to disclose the work they are doing to address these issues. On July 31, 2023, the European Union (EU) adopted the European Sustainability Reporting Standards (ESRS) and published them as “ final rules ” for the Corporate Sustainability Reporting Directive (CSRD), the most far-reaching set of disclosure requirements companies have to comply with, cove

article thumbnail

New Scam Impersonates QuickBooks to Steal Credentials, Extract Money

KnowBe4

Establishing urgency through a false need to “upgrade” or lose services, this new attack takes advantage of the widespread use of the popular accounting app to attract victims.