Fri.May 20, 2022

article thumbnail

What Is Behind the Increase in Crypto Fraud?

Data Breach Today

Experian's David Britton on Connection Between Benefits Programs, Crypto Fraud There has been a rise in crypto fraud, and a substantial portion of it can be attributed to stimulus funding and paycheck protection programs, says David Britton, vice president of strategy, global ID and fraud at Experian. He discusses new authentication methods and stricter regulations.

article thumbnail

Authentication Is Static, Yet Attackers Are Dynamic: Filling the Critical Gap

Dark Reading

To succeed against dynamic cybercriminals, organizations must go multiple steps further and build a learning system that evolves over time to keep up with attacker tactics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Conti Ransomware Group Retires Name After Creating Spinoffs

Data Breach Today

Backing Russia's Invasion of Ukraine Burned the Brand, Researchers Report The Russian-language criminal syndicate behind the notorious Conti ransomware has retired that brand name, after having already launched multiple spinoffs to make future operations more difficult to track or disrupt, threat intelligence firm Advanced Intelligence reports.

article thumbnail

380K Kubernetes API Servers Exposed to Public Internet

Threatpost

More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access.

Cloud 107
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DOJ Revises Policy for Good-Faith Security Researchers

Data Breach Today

Specifies That White Hats Cannot Be Charged Under Computer Fraud and Abuse Act The U.S. Department of Justice has revised its policy on who it charges with violations under the Computer Fraud and Abuse Act. The DOJ now specifies that good-faith security research and researchers cannot be charged under the CFAA because they help improve cybersecurity standards.

Security 264

More Trending

article thumbnail

Feds Warn Health Sector of Top Russia-Backed APT Groups

Data Breach Today

Alert Comes as Other Ransomware Assaults, Data Leaks Plague Medical Providers Federal authorities are alerting healthcare sector entities of threats posed by Russian state-sponsored cyber groups, including some linked to attacks on pharmaceutical and related firms. Meanwhile, other ransomware gangs continue their assaults on a variety of U.S. medical facilities.

article thumbnail

Bluetooth Flaw Allows Remote Unlocking of Digital Locks

Schneier on Security

Locks that use Bluetooth Low Energy to authenticate keys are vulnerable to remote unlocking. The research focused on Teslas, but the exploit is generalizable. In a video shared with Reuters, NCC Group researcher Sultan Qasim Khan was able to open and then drive a Tesla using a small relay device attached to a laptop which bridged a large gap between the Tesla and the Tesla owner’s phone. “This proves that any product relying on a trusted BLE connection is vulnerable to attacks even f

article thumbnail

Pathlock-Appsian Deal Combines App Governance, ERP Security

Data Breach Today

Deal Will Help Clients Secure Users and Data Across SAP and Oracle's ERP Apps Pathlock has merged with Appsian to form a 500-person vendor that secures users and data across SAP and Oracle's ERP apps. Bringing Pathlock, Appsian and Security Weaver together will allow the firm to take a larger bite out of the $110 billion market focused on compliance testing for business apps.

article thumbnail

QNAP warns of a new wave of DeadBolt ransomware attacks against its NAS devices

Security Affairs

Taiwanese vendor QNAP warned customers of a new wave of DeadBolt ransomware attacks and urges them to install the latest updates. Taiwanese vendor QNAP is asking users to install the latest update on their NAS devices and avoid exposing them on the Internet. The company issued the alert in response to a new wave of DeadBolt ransomware attacks targeting NAS devices using QTS 4.3.6 and QTS 4.4.1. “QNAP® Systems, Inc. recently detected a new attack by the DEADBOLT Ransomware.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Canada Bans Huawei, ZTE to Secure Telecom Systems

Data Breach Today

Government Says Closest Allies Share Similar Concerns Canada says it will no longer allow the use of products and services from China's Huawei Technologies and ZTE Corp. in its telecommunications systems. The government says its decision is based on reviews by independent security agencies and was made in consultation with its "closest allies.

Security 260
article thumbnail

The activity of the Linux XorDdos bot increased by 254% over the last six months

Security Affairs

Microsoft researchers have observed a spike in the activity of the Linux bot XorDdos over the last six months. XORDDoS , also known as XOR.DDoS , first appeared in the threat landscape in 2014 it is a Linux Botnet that was employed in attacks against gaming and education websites with massive DDoS attacks that reached 150 gigabytes per second of malicious traffic.

article thumbnail

ISMG Editors: The Case of the 'Dr. Evil' of Ransomware

Data Breach Today

Also: Ransomware Attacks on Healthcare; Cybersecurity Market Slows In the latest update, four ISMG editors discuss the alarming, bizarre case of a cardiologist in Venezuela charged with developing malware and recruiting affiliates, recent ransomware and data leak incidents in healthcare and how the economy is causing mature cybersecurity startups to slow hiring.

article thumbnail

Conti ransomware is shutting down operations, what will happen now?

Security Affairs

The Conti ransomware gang shut down its operation, and some of its administrators announced a branding of the gang. Advanced Intel researcher Yelisey Boguslavskiy announced the that Conti Ransomware gang shuts its infrastructure and some of its administrators announced a rebranding of the popular RaaS operation. [FLASH] #Conti Officially DisCONTInued Today the official website of Conti #Ransomware was shut down, marking the end of this notorious crime group; it is truly a historic day in the #in

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Biggest Challenge to Adopting Security Tech in Manufacturing

Data Breach Today

Addressing Manufacturing Vulnerabilities It’s only a matter of time before plants, critical infrastructure, and factories evolve into more interconnected and digital spaces.

article thumbnail

Pwn2Own Vancouver 2022 D2

Security Affairs

During the second day of the Pwn2Own Vancouver 2022 hacking competition, contestants demonstrated a working exploit for Microsoft Windows 11. During the second day of the Pwn2Own Vancouver 2022 hacking competition, white hat hackers demonstrated a working exploit against Microsoft Windows 11 OS. The T0 group demonstrated an exploit for an improper access control flaw leading to the elevation of privilege on Microsoft Windows 11.

article thumbnail

Ransomware: What's Changed Since Colonial Pipeline Got Hit?

Data Breach Today

Rapid7's Jen Ellis Details Cross-Government Response, Impact of Russia-Ukraine War When Colonial Pipeline suffered an outage in May 2021 as a result of an attack by the DarkSide crime syndicate, numerous governments changed their approach to ransomware and began treating it as a national security threat, says Rapid7's Jen Ellis. She details what needs to happen next.

article thumbnail

Partial Patching Still Provides Strong Protection Against APTs

Dark Reading

Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so at a lower cost than those that stay up to date on all of their software, university researchers say.

88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why More Businesses are Switching from Legacy to Modern MDM

Reltio

I’ve heard countless stories from IT and business leaders about the challenges with legacy master data management (MDM). A perception shared by many in the industry is that MDM is hard, especially when approached with legacy solutions. There is a better way. Modern, cloud-native SaaS simplifies MDM and accelerates the value of your data. Most business leaders agree with our core belief that accelerating the power of data is table stakes for staying competitive in today’s rapidly changing and dig

MDM 75
article thumbnail

Chatbot Army Deployed in Latest DHL Shipping Phish

Dark Reading

In a new phishing tactic, faux chatbots establish a conversation with victims to guide them to malicious links, researchers say.

article thumbnail

Closing the Gap Between Application Security and Observability

Threatpost

Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.?.

article thumbnail

New Open Source Project Brings Consistent Identity Access to Multicloud

Dark Reading

Hexa and IDQL allow organizations using cloud platforms such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform to apply consistent access policy across all applications, regardless of environment.

Access 72
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Onion on Google Map Surveillance

Schneier on Security

“ Google Maps Adds Shortcuts through Houses of People Google Knows Aren’t Home Right Now.” Excellent satire.

74
article thumbnail

Microsoft Rushes a Fix After May Patch Tuesday Breaks Authentication

Dark Reading

Two of Microsoft's Patch Tuesday updates need a do-over after causing certificate-based authentication errors.

article thumbnail

Breaking: ISO publishes new Information Governance (IG) standard

IG Guru

ISO 24143 Information and documentation — Information Governance — Concept and principles Introduction Information is a critical asset that is indispensable to support business processes and therefore, a foundation for the success of any business activities. Due to numerous existing and emerging forms and uses of information and information-related risks, organizations often struggle with implementing […].

article thumbnail

Ransomware is here with a vengeance! Take our Ransomware Assessment test TODAY!

Quest Software

Ransomware attacks are growing and are becoming more prevalent every year. Per the Washington Post, Ransomware payments spiked a whopping 70% last year alone, and the victims paid more than $600 million in 2021. “This $600 million, while.( read more ).

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Quantum Key Distribution for a Post-Quantum World

Dark Reading

New versions of QKD use separate wavelengths on the same fiber, improving cost and efficiency, but distance is still a challenge.

77
article thumbnail

Liz Awarded Fellowship of IRMS

Managing Your Information

We are delighted that our managing director Liz Taylor has been made a fellow of the IRMS (Information and Records Management Society). Liz, who has worked in both information governance and delivery of training for the past 20 years, addressed the group’s annual conference in Glasgow earlier this week. She told delegates from around the world about how imperative it was to deliver and recognise success while focusing on what we can achieve instead of ticking boxes in such a dynamic working envi

article thumbnail

GUEST ESSAY: Here’s why managed security services — MSS and MSSP — are catching on

The Last Watchdog

The unification revolution of cybersecurity solutions has started – and managed security service providers are leading the way. Managed security services (MSS) refer to a service model that enable the monitoring and managing of security technologies, systems, or even software-as-a-service (SaaS) products. Here’s more on the various types and benefits of MSS, as well as the state of the MSS(P) market in 2022!

Security 230