Fri.Jun 09, 2023

article thumbnail

New Entrants to Ransomware Unleash Frankenstein Malware

Data Breach Today

Opportunistic, Less Sophisticated Hackers Test Limits of the Concept of Code Reuse Ransomware hackers are stretching the concept of code reuse to the limit as they confront the specter of diminishing returns for extortionate malware. In their haste to make money, some new players are picking over the discarded remnants of previous ransomware groups.

article thumbnail

Court Dismisses IBM’s Breach of Contract Claim Against Micro Focus Finding the Claim to Lack Merit

OpenText Information Management

As I wrote earlier, IBM brought a lawsuit against Micro Focus alleging breach of contract and copyright infringement by Micro Focus Enterprise Suite products. Here is the blog I posted as to the technical aspects of the meritless claim. We confidently asserted then that IBM’s claims are legally and factually without merit. With respect to … The post Court Dismisses IBM’s Breach of Contract Claim Against Micro Focus Finding the Claim to Lack Merit appeared first on OpenText Blogs.

118
118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MOVEit Discloses More Vulnerabilities, Issues Patch

Data Breach Today

Progress Software Says New Vulnerabilities Are Unrelated to Zero Day Used by Clop The company behind the MOVEit managed file transfer application is urging customers into a new round of emergency patching after identifying additional vulnerabilities. "These newly discovered vulnerabilities are distinct from the previously reported vulnerability," said Progress Software.

265
265
article thumbnail

'Asylum Ambuscade' Cyberattackers Blend Financial Heists & Cyber Espionage

Dark Reading

In a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on governments.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Threat Detection for 'DEED' Environments of Enterprises Today

Data Breach Today

Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.

More Trending

article thumbnail

Cloud Security Trends, Best Practices Everyone Should Know

Data Breach Today

Experts to Host a Deep Dive into Cloud Security at ISMG Engage Chicago As cloud migration continues across regions and sectors, how are organizations choosing security tools, and how are those tools being operationalized? Which practices are producing the best security outcomes? Explore these cloud security tips from Palo Alto Networks' Ben Nicholson.

Cloud 157
article thumbnail

DOS Attacks Dominate, but System Intrusions Cause Most Pain

Dark Reading

In the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.

article thumbnail

Point32Health, Harvard Pilgrim Facing 4 Data Breach Lawsuits

Data Breach Today

Class Action Suits Hit While Insurer Still Recovering From April Ransomware Attack An April ransomware attack that compromised the personal information of more than 2.5 million individuals has triggered at least four proposed federal class action lawsuits against Massachusetts health insurer Harvard Pilgrim Health and its parent company, Point32Health.

article thumbnail

Russians charged with hacking Mt. Gox exchange and operating BTC-e

Security Affairs

Two Russian nationals have been charged with the hack of the cryptocurrency exchange Mt. Gox in 2011 and money laundering. Russian nationals Alexey Bilyuchenko (43) and Aleksandr Verner (29) have been charged with the hack of the cryptocurrency exchange Mt. Gox in 2011 and the operation of the illicit cryptocurrency exchange BTC-e. The duo has been charged with conspiring to launder approximately 647,000 bitcoins stolen from Mt.

Access 86
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Shift5 Gets $33M to Help Safeguard Commercial Transportation

Data Breach Today

Series B Money from Moore Strategic Ventures Will Help Shift5 Move Beyond Military Moore Strategic Ventures led a $33 million investment into a military and transportation security startup founded by officers who stood up U.S. Army Cyber Command. The funds will help Shift5 expand from safeguarding military vehicles to protecting commercial modes of transportation.

Military 157
article thumbnail

Stealth Soldier backdoor used is targeted espionage attacks in Libya

Security Affairs

Researchers detected a cyberespionage campaign in Libya that employs a new custom, modular backdoor dubbed Stealth Soldier. Experts at the Check Point Research team uncovered a series of highly-targeted espionage attacks in Libya that employ a new custom modular backdoor dubbed Stealth Soldier. Stealth Soldier is surveillance software that allows operators to spy on the victims and exfiltrate collected data.

article thumbnail

US DOJ Charges Two Russian Nationals With Mt. Gox Hack

Data Breach Today

Mt. Gox Proceeds Used to Found BTC-e, Prosecutors Say U.S. federal prosecutors accused two Russian nationals of carrying out the heist that provoked the 2014 collapse cryptocurrency trading exchange Mt. Gox, then the world's largest crypto platform. One of them used the proceeds to co-found BTC-e, a now-shuttered crypto money laundering platform.

157
157
article thumbnail

Japanese Pharmaceutical giant Eisai hit by a ransomware attack

Security Affairs

This week, the Japanese pharmaceutical giant Eisai has taken its systems offline in response to a ransomware attack. Eisai is a Japanese pharmaceutical company with about 10,000 employees and more than $5 billion in revenue. The company this week was forced to take certain systems offline in response to a cyber attack In response to the ransomware attack, the company immediately established an internal task force and launched an investigation into the security incident.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Brand-New Security Bugs Affect All MOVEit Transfer Versions

Dark Reading

Progress has issued a second patch for additional SQL flaws that are distinct from the zero-day that Cl0p ransomware gang is exploiting.

article thumbnail

Jamf Pro and Jamf Connect now part of the Microsoft Intelligent Security Association

Jamf

Learn how the integration of Jamf Pro and Jamf Connect with Azure AD enhances security and the user experience.

Security 105
article thumbnail

UK and U.S. Announce Commitment to “Data Bridge”

Hunton Privacy

On June 8, 2023, the United Kingdom and the United States announced they reached a commitment in principle to establish the UK Extension to the Data Privacy Framework, which will create a “data bridge” between the two countries. U.S. companies approved to join the framework would be able to receive UK personal data under the new data bridge. According to the UK government, the data bridge would remove the “burden” of putting in place “costly contract clauses. to ensure protection and privacy sta

article thumbnail

Operation Triangulation: Zero-Click iPhone Malware

Schneier on Security

Kaspersky is reporting a zero-click iOS exploit in the wild: Mobile device backups contain a partial copy of the filesystem, including some of the user data and service databases. The timestamps of the files, folders and the database records allow to roughly reconstruct the events happening to the device. The mvt-ios utility produces a sorted timeline of events into a file called “timeline.csv,” similar to a super-timeline used by conventional digital forensic tools.

80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why advanced API security is critical to outsmarting new threats

IBM Big Data Hub

As organizations continue to expand their digital footprint, new vulnerabilities are constantly emerging that can put them at risk. Among the most prominent new examples is attacks that exploit the growth of application programming interfaces (APIs) , which work to connect applications and systems to facilitate the exchange of data. Along with the ease of interaction that APIs provide, however, comes potential new entry points for bad actors to gain access to organizations’ resources and d

article thumbnail

Clop ransomware gang was testing MOVEit Transfer bug since 2021

Security Affairs

Researchers discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll security experts discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll investigated the exploitation attempts for the MOVEit Transfer vulnerability and discovered that Clop threat actors were likely experimenting with how to exploit this issue as far back as 2021.

article thumbnail

Verizon: Stolen Credentials Tops the List of Threat Actions in Breaches

KnowBe4

Verizon's DBIR always has a lot of information to unpack, so I’ll continue my review by covering how stolen credentials play a role in attacks.

88
article thumbnail

Passkeys See Fresh Momentum With New Pilot Programs

Dark Reading

Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

EDPB Adopts Guidelines on the Calculation of Administrative Fines

Hunton Privacy

On June 7, 2023, the European Data Protection Board (“EDPB”) adopted the final version of its Guidelines on the calculation of administrative fines under the GDPR (the “Guidelines”). Through the Guidelines, the EDPB intends to harmonize the methodology used by supervisory authorities (“SA”) to calculate fines. The EDPB maintained the five-step methodology previously included in the public consultation version of the Guidelines, composed of the following steps: 1) identify the processing operatio

GDPR 69
article thumbnail

3 Elite Communication Skills to Help Security Pros Get Projects Funded

Dark Reading

It's not enough to know how to better protect the enterprise — you have to be able to convince decision-makers that your plans are necessary.

article thumbnail

Central and local must government to come together and safeguard the future of our libraries

CILIP

Central and local must government to come together and safeguard the future of our libraries The current regulation and oversight of library services in England means that the Government is failing in its duty of accountability to the taxpayer and in its specific duty of sector development and improvement. It’s time to move out of the era of fragmentation and into better stewardship of our vital library network, put in place new and progressive regulation, and bring an end to the ongoing battle

article thumbnail

5 Tips for Modernizing Your Security Operations Center Strategy

Dark Reading

A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

PRESS RELEASE: 2023 AIEF AWARDS EDUCATION SCHOLARSHIPS

IG Guru

Check out the Press Release here

article thumbnail

How Continuous Monitoring and Threat Intel Can Help Prevent Ransomware

Dark Reading

Security teams should be empowered with the right amount of intelligence to track new and emerging threats and connect that intel to historical data.

article thumbnail

5 Best Cloud Native Application Protection Platforms in 2023

eSecurity Planet

Cloud native application protection platforms (CNAPP) give enterprises the tools and functionality they need to protect their cloud applications and workloads from security threats. Securing cloud-native apps requires an extensive approach that goes well beyond basic security solutions. Cloud native application protection platforms (CNAPP) accomplish that by combining a range of cloud security tools and functions such as cloud workload protection platforms (CWPP) , cloud security posture managem

Cloud 90