Fri.Jul 09, 2021

article thumbnail

The Business of Ransomware: Specialists Help Boost Profits

Data Breach Today

Ransomware-as-a-Service Operations Tap Expert Intrusion Specialists and Negotiators As ransomware attacks become more prolific, their success is being driven by the increasing use of specialists who can refine every stage of an attack. It's a reminder that the goal of cybercrime remains to maximize illicit profits as easily and quickly as possible.

article thumbnail

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry

Dark Reading

The ElectroRAT Trojan attacker's success highlights the increasingly sophisticated nature of threats to cryptocurrency exchanges, wallets, brokerages, investing, and other services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malspam Campaign Targets Kaseya Victims

Data Breach Today

Phishing Emails Contain Malicious Link, Attachment Spammers posing as software vendor Kaseya are waging a malspam campaign to target users of the company's VSA remote IT management software that was hit by a ransomware attack, the security firm Malwarebytes reports.

Phishing 333
article thumbnail

Insurance firm CNA discloses data breach after March ransomware attack

Security Affairs

Insurance giant CNA notifies customers of a data breach after the Phoenix CryptoLocker ransomware attack suffered in March. US insurance giant CNA is notifying customers of a data breach after the ransomware attack that it suffered in March. The insurance firm paid a $40 ransom to restore access to its files following the ransomware attack. According to Bloomberg, CNA Financial opted to pay the ransom two weeks after the security breach because it was not able to restore its operations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Biden's New Executive Order Looks to Address Data Privacy

Data Breach Today

White House Asks FTC to Develop New Rules on Consumer Data Collection In his new executive order, President Biden asks the FTC to establish new rules over how tech firms can collect and use data from their customers, as a way to offer more privacy protections for U.S. consumers. The order also looks to push the Justice Department to step up its antitrust enforcement.

More Trending

article thumbnail

Government Cybersecurity Summit: A Preview

Data Breach Today

CISA's Brandon Wales, Rep. Jim Langevin Among the Featured Speakers Acting CISA Director Brandon Wales, Rep. Jim Langevin and many others will discuss the government's top priorities in addressing cybersecurity challenges at ISMG's Virtual Cybersecurity Summit: Government, to be held July 13 and 14.

article thumbnail

Kaseya warns customers of ongoing malspam campaign posing as security updates

Security Affairs

Threat actors are conducting a spam campaign aimed at infecting Kaseya customers, posing as legitimate VSA security updates. Kaseya is warning customers of threat actors attempting to exploit the recent massive supply chain ransomware attack suffered by the company. The software provider is warning of an ongoing malspam campaign aimed at delivering malware into their networks, the messages used malicious attachments and embedded links posing as legitimate VSA security updates. “As previous

Security 119
article thumbnail

ISMG Editors’ Panel: Analysis of Kaseya Attack

Data Breach Today

Sizing Up the Impact of the Ransomware Attack and How to Mitigate Risks In the latest weekly update, a panel of Information Security Media Group editors discusses the repercussions of the Kaseya ransomware incident, the immediate response of the cybersecurity community and key risk management takeaways.

article thumbnail

Hackers use a new technique in malspam attacks to disable Macro security warnings in weaponized docs

Security Affairs

Threat actors have devised a new trick to disable macro security warning that leverage non-malicious docs in malspam attacks. Most of the malspam campaigns leverage weaponized Microsoft Office documents and social engineering techniques to trick recipients into enabling the macros. Now experts from McAfee Labs warn of a novel technique used by threat actors that are using non-malicious documents to disable security warnings prior to executing macro code on the recipient’s PC.

Security 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

An Office Phone Flaw Can’t Be Fixed by Cisco Alone

WIRED Threat Level

The company released a patch this week, but security researchers say the root of the problem is beyond its control—and symptomatic of a larger issue.

Security 111
article thumbnail

Microsoft says that the emergency patch recently released correctly fix the PrintNightmare flaw

Security Affairs

Microsoft confirmed that the emergency security updates ( KB5005010 ) correctly address the PrintNightmare Print Spooler vulnerability (CVE-2021-34527). Microsoft says that the emergency security patches released early this week correctly address the PrintNightmare Print Spooler vulnerability (CVE-2021-34527) for all supported Windows versions. Immediately after the release of the updates ( KB5004945 ) multiple researchers questioned its efficiency and explained that the updates don’t full

article thumbnail

New Framework Aims to Describe & Address Complex Social Engineering Attacks

Dark Reading

As attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.

107
107
article thumbnail

Hackers use a new technique in phishing attacks to disable Macro security warnings in weaponized docs

Security Affairs

Threat actors have devised a new trick to disable macro security warning that leverage non-malicious docs in phishing attacks. Most of the phishing attacks leverage weaponized Microsoft Office documents and social engineering techniques to trick recipients into enabling the macros. Now experts from McAfee Labs warn of a novel technique used by threat actors that are using non-malicious documents to disable security warnings prior to executing macro code on the recipient’s PC.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Lazarus Targets Job-Seeking Engineers with Malicious Documents

Threatpost

Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.

106
106
article thumbnail

How Dangerous Is Malware? New Report Finds It's Tough to Tell

Dark Reading

Determining which malware is most damaging, and worthy of immediate attention, has become difficult in environments filled with alerts and noise.

IT 106
article thumbnail

Cisco BPA, WSA Bugs Allow Remote Cyberattacks

Threatpost

The high-severity security vulnerabilities allow elevation of privileges, leading to data theft and more.

Security 115
article thumbnail

Europe Makes the Case to Ban Biometric Surveillance

WIRED Threat Level

Companies are racing to track everything about you. It could be a convenient way to reduce fraud—or seriously creepy and discriminatory.

IT 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Improve learning experiences for teachers, students and parents with Apple

Jamf

Learn how educational technology can create a harmonious educational experience with Apple and Jamf.

article thumbnail

It's in the Game (but It Shouldn't Be)

Dark Reading

Five ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.

IT 129
article thumbnail

New Mac malware, OSX.WildPressure, prevented by Jamf Protect

Jamf

As Apple device adoption rates continue to increase in the enterprise, we’re seeing proportional growth in malware targeting macOS as well.

72
article thumbnail

The Never-Ending Evolution of Data Governance

erwin

For many organizations, data is the heart of the business, and data intelligence is the key differentiator. At the root of data intelligence is data governance , which helps ensure the right level of data access, availability and usage based on a defined set of data policies and principles. While the maturity of data governance strategies and implementations varies across all organizations, every organization must remain vigilant in how data governance is applied and agile in being able to evolv

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to Store Paper Medical Records

Armstrong Archives

In 1996, the Health Insurance Portability and Accountability Act (HIPAA) established a set of regulations involving the storage of and destruction of protected health information (PHI). This act was created to protect the sensitive patient information used by healthcare providers. As non-compliance can cause providers to face costly fines and lawsuits, as well as jeopardize the trust of their patients, remaining HIPAA compliant is critical for all medical professionals.

Paper 52
article thumbnail

3Q3M?—?Getting Started with a Software Project with Caleb Woods?—?Episode 4

Role Model Software

When it comes time to explore custom software, often times business owners are unsure of what they need to know to get started. Continue reading on RoleModel Software ».

IT 52
article thumbnail

Retention and Destruction of Health Information

Armstrong Archives

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was created to set forth national standards for electronic health care transactions. Subsequently, additional rules have been published under HIPAA which set further standards for the handling and safeguarding of protected health information (PHI). These rules protect an individual’s private health information from being revealed without permission or consent.

article thumbnail

CISA Analysis Reveals Successful Attack Techniques of FY 2020

Dark Reading

The analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.

Risk 62
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Improve learning experiences for teachers, students and parents with Apple

Jamf

Learn how educational technology can create a harmonious educational experience with Apple and Jamf.

article thumbnail

Cartoon Caption Winner: Sight Unseen

Dark Reading

And the winner of Dark Reading's June contest is.

76
article thumbnail

Spike in “Chain Gang” Destructive Attacks on ATMs

Krebs on Security

Last summer, financial institutions throughout Texas started reporting a sudden increase in attacks involving well-orchestrated teams that would show up at night, use stolen trucks and heavy chains to rip Automated Teller Machines (ATMs) out of their foundations, and make off with the cash boxes inside. Now it appears the crime — known variously as “ ATM smash-and-grab ” or “ chain gang ” attacks — is rapidly increasing in other states.

Insurance 316