Thu.Mar 31, 2022

article thumbnail

Takeaways From Viasat Outage

Data Breach Today

This edition analyzes how hackers exploited a misconfigured VPN device, gained access to Viasat's satellite network and caused a massive outage in Europe as Russia's invasion of Ukraine began. It also examines the invasion's impact on financial services and how to modernize security operations.

article thumbnail

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Krebs on Security

On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Target Russian Federal Air Transport Agency

Data Breach Today

65 Terabytes of Data Wiped Out, According to Reports Hackers have allegedly managed to breach the infrastructure belonging to Russia's Federal Air Transport Agency, or Rosaviatsiya, and wiped out its entire database and files consisting of 65TB of data, including documents, files, aircraft registration data and emails from the servers.

IT 300
article thumbnail

GUEST ESSAY: The case for leveraging hardware to shore up security — via a co-processor

The Last Watchdog

Cybersecurity has never felt more porous. You are no doubt aware of the grim statistics: •The average cost of a data breach rose year-over-year from $3.86 million to $4.24 million in 2021, according to IBM. •The majority of cyberattacks result in damages of $500,000 or more, Cisco says. •A sobering analysis by Cybersecurity Ventures forecasts that the global cost of ransomware attacks will reach $265 billion in 2031. • The FBI reports that 3,000-4,000 cyberattacks are counted each day.

Security 204
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

SpringShell, Spring Cloud Function Bugs Need Urgent Patching

Data Breach Today

Both Bugs Have a POC and at Least 1 Is Known to Be Exploited in the Wild Spring IO, a cohesive, versioned platform used for building modern applications, has reported two remote code execution vulnerabilities in the past two days. Both the RCEs are reportedly having proof of concept exploits, and at least one is actively being targeted in the wild.

Cloud 286

More Trending

article thumbnail

Nokia Supported Russia's 'Lawful' Surveillance Program

Data Breach Today

When Do Technology Firms That Support Autocratic Surveillance Cross the Line? As Finnish technology giant Nokia announces it is ceasing sales in Russia over the war with Ukraine, the company is facing tough questions over how it helped enable a mass surveillance program that supports President Vladimir Putin's autocratic regime.

Sales 243
article thumbnail

Follow the 3-2-1 Rules of Data Backups

Adam Levin

When it comes to backing up your data, IT and cybersecurity experts alike consistently advise what’s known as the “3-2-1” rules, which are: Keep at least three copies of your data: The emphasis here is on at least. Backups are inherently fallible, and can fall prey to malware, ransomware, power surges, and hardware failure. The only way to make sure your data is truly secured is by having backups of your backups.

Cloud 117
article thumbnail

State-Sponsored Actors Using Russia-Ukraine War for Phishing

Data Breach Today

Actors From China, Iran, North Korea and Russia Using Ukraine War-Related Themes Researchers have observed a growing number of threat actors using the Russia-Ukraine war as a lure in phishing and malware campaigns to target the military of multiple Eastern European countries, as well as a NATO Center of Excellence, according to Google's Threat Analysis Group.

Phishing 241
article thumbnail

List of data breaches and cyber attacks in March 2022 – 3.99 million records breached

IT Governance

In March, we discovered 88 publicly disclosed cyber security incidents, accounting for 3,987,593 breached records. That brings the total number of breached records in the first quarter of 2022 to 75,099,482. We’ll be providing more stats from Q1 2022 in our quarterly review of cyber security incidents, which will be published on our website in the coming days.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Understanding Human Behavior to Tackle ATO & Fraud

Data Breach Today

Video on Protecting Your Enterprise From Breaches and Account Takeover Fraud With the rapidly changing threat landscape, protecting your enterprise from breaches and account takeover fraud has never been a bigger challenge. Fraud teams have the challenges of understanding customer identities and human behaviors regardless of how many devices and accounts they use.

238
238
article thumbnail

Obvious Phishbait, But Someone Will Bite

KnowBe4

A widespread phishing scam is circulating in Facebook Messenger, according to Jeff Parsons at Metro. The phishing messages simply contain the words, “Look what I found,” along with a link. If the user clicks the link, they’ll be taken to a spoofed Facebook login page that will steal their credentials. Notably, the attackers send the messages from compromised accounts of the target’s Facebook friends, which increases the appearance of legitimacy.

Phishing 111
article thumbnail

Breach Reports Show Diversity of Healthcare Cyber Targets

Data Breach Today

Recent Major Hacking Incidents Affected a Wide Range of Entities Recent breach reports filed by a law enforcement benefits health plan, a healthcare staffing firm and a rural medical center are the latest examples of the diverse range of healthcare sector entities being targeted by cyberattackers. What do experts recommend?

232
232
article thumbnail

La gouvernance post-implantation, un facteur clé de succès dans un contexte de progiciel

CGI

Aller de l’avant avec l’utilisation d’une solution d’affaires comme un progiciel de gestion intégré (PGI) ou un progiciel de gestion des relations avec la clientèle est un projet fort différent des projets classiques de développement et d’évolution en technologie. En effet, la mise en place et l’évolution de telles solutions ont des incidences organisationnelles majeures qu’une approche structurée permet de mieux aborder.

98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Chrome Zero-Day from North Korea

Schneier on Security

North Korean hackers have been exploiting a zero-day in Chrome. The flaw, tracked as CVE-2022-0609, was exploited by two separate North Korean hacking groups. Both groups deployed the same exploit kit on websites that either belonged to legitimate organizations and were hacked or were set up for the express purpose of serving attack code on unsuspecting visitors.

article thumbnail

Comment attirer les experts en cybersécurité malgré la pénurie

CGI

Dans les médias spécialisés en affaires et en technologie, nous entendons souvent parler de centaines de milliers de postes en cybersécurité et en sécurité des TI qui demeurent vacants. D’ici 2022, on estime que le nombre de postes non pourvus dans ces domaines s’élèvera à plus de 1,8 million.1 Par conséquent, dans tous les secteurs d’activité, on constate un nombre toujours croissant d’entreprises et d’organismes gouvernementaux se retrouvant victimes de brèches de cybersécurité et de logiciels

98
article thumbnail

Cisco: Web 3.0 Will be the Next Frontier for Social Engineering and Phishing Attacks

KnowBe4

A look at what makes up Web 3.0 and how it may be used includes insight into what kinds of cyberattacks may plague it, as cybercriminals look for new profitable opportunities.

article thumbnail

Stratégie de gestion du changement, deuxième partie : établir les stratégies

CGI

La joie ou la douleur ressentie selon les quatre différents cas de changement sont relatives à la gravité de la situation. On le conçoit bien, perdre son emploi est différent de perdre sa carte de crédit. Le plaisir ou la souffrance découlant du changement sont également relatifs à notre capacité d’adaptation; elle-même fortement liée à la lecture que nous faisons de la réalité.

97
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Anonymous hacked Russian Thozis Corp, but denies attacks on Rosaviatsia

Security Affairs

The Anonymous collective hacked the Russian investment firm Thozis Corp, but it’s a mystery the attack against the Russian Civil Aviation Authority Rosaviatsia. Anonymous continues to target Russian organizations and private foreign businesses the are still operating in the country. The popular collective claims to have hacked the Russian investment firm Thozis Corp, which is owned by the oligarch Zakhar Smushkin.

article thumbnail

Sécurité infonuagique et atteinte d’objectifs de conformité – Leçons apprises*

CGI

Lorsque de l’information ou des applications sont désignées comme essentielles, une organisation devrait immédiatement comprendre que ces systèmes exigent les plus hauts degrés de sécurité, et donc d’importants investissements pour les protéger contre les attaques malveillantes.

95
article thumbnail

Simple Facebook Phishing Scam Takes an Unexpected Turn to Throw Potential Victims Off the Scent

KnowBe4

Rather than take the usual path of sending an email and linking to a spoofed logon page, this attack takes a different set of actions that at first make no sense but may actually be brilliant.

article thumbnail

Stratégie de gestion du changement, première partie : déterminer les attitudes

CGI

Gérer le facteur humain en mode projet requiert une stratégie et une ligne de conduite. Une stratégie oriente les actions qui vont suivre et leur donne un sens. Celle-ci doit être simple et facilement comprise par tous les acteurs du changement : haute direction, direction de projet, équipe de projet, gestionnaires et destinataires du changement. La stratégie émerge d’un diagnostic organisationnel qui comprend plusieurs éléments comme la légitimité du projet, la capacité à changer ou la grille d

86
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FBI Warns of Phishing Attacks Targeting Election Officials

KnowBe4

The FBI has issued a Private Industry Notification warning of phishing emails designed to steal login credentials from election officials. The Bureau believes these attacks will increase ahead of the 2022 midterm elections; the officials who need to be alert are at the state, local, territorial, and tribal levels.

article thumbnail

Apple issues emergency patches to fix actively exploited zero-days

Security Affairs

Apple released emergency patches to address two zero-day vulnerabilities actively exploited to compromise iPhones, iPads, and Macs. Apple has released emergency security patches to address two zero-day vulnerabilities actively exploited to hack iPhones, iPads, and Macs. The first zero-day, tracked as CVE-2022-22674, is an out-of-bounds read issue that resides in the Intel Graphics Driver that could allow malicious apps to read kernel memory. “An out-of-bounds read issue may lead to the dis

article thumbnail

The Last Cell Tower in Mariupol

WIRED Threat Level

For weeks, a lone mobile base station allowed thousands in the besieged Ukrainian city to stay connected—until Russian troops arrived.

article thumbnail

Bad OPSEC allowed researchers to uncover Mars stealer operation????

Security Affairs

The Morphisec Labs researchers analyzed a new malware, tracked as Mars stealer, which is based on the older Oski Stealer. . Morphisec Labs recently discovered the Mars stealer that was spreading masqueraded as malicious software cracks and keygens. The Mars stealer is available for sale on several underground forums, researchers pointed out that it is under constant development.

Sales 87
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cost of Internet Crimes in 2021 Increase 64% Exceeding $6.9 Billion

KnowBe4

New data from the FBI’s Internet Crime Complaint Center (IC3) shows a massive increase in the cost of internet crimes, with phishing and BEC topping the list.

article thumbnail

Nation-State Hackers Ramp Up Ukraine War-Themed Attacks

Dark Reading

Among them is the operator of the Ghostwriter misinformation campaign, with a new browser-in-browser phishing technique, according to Google's research team.

article thumbnail

Automaker Cybersecurity Lagging Behind Tech Adoption, Experts Warn

Threatpost

A bug in Honda is indicative of the sprawling car-attack surface that could give cyberattackers easy access to victims, as global use of ‘smart car tech’ and EVs surges.