Wed.Jan 18, 2023

article thumbnail

Ransomware Picture: Volume of Known Attacks Remains Constant

Data Breach Today

Massive Profit Potential and Robust Initial Access Market Keep Fueling Ecosystem Ransomware syndicates continue to earn massive profits for criminals while disrupting victims' operations worldwide. Security researchers tracking known victims say their numbers remain unchanged from 2021 to 2022, as attackers tap abundant cybercrime services to help amass fresh victims.

article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

On January 16, 2023, the Directive on measures for a high common level of cybersecurity across the Union (the “NIS2 Directive”) and the Directive on the resilience of critical entities (“CER Directive”) entered into force. The NIS2 Directive repeals the current NIS Directive and creates a more extensive and harmonized set of rules on cybersecurity for organizations carrying out their activities within the European Union.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine: Russians Aim to Destroy Information Infrastructure

Data Breach Today

Russia's Cyber War Coordinated With Invasion, Missile Attacks, Says State Service Ukraine's top information protection agency says Russian cyberattacks are focusing on destruction of critical information infrastructure, spying and disinformation. Although efforts are underway, it will require $1.79 billion to completely restore the telecommunication sector, it says.

IT 157
article thumbnail

ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware

Dark Reading

Threat actors are diversifying across all aspects to attack critical infrastructure, muddying the threat landscape, and forcing industrial organizations to rethink their security.

Security 108
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Crypto Exchange Founder Charged With Enabling Illegal Funds

Data Breach Today

Bitzlato Facilitated $700M in Darknet Purchases on Shuttered Hydra Marketplace An international sting operation on Tuesday shut down the operations of cryptocurrency exchange Bitzlato Ltd. as FBI agents hauled co-founder Anatoly Legkodymov into a Miami jail to face U.S. federal charges of conducting an unlicensed money-transmitting business.

130
130

More Trending

article thumbnail

Health Entities Should Vet Risks of ChatGPT Use

Data Breach Today

AI Tools are Tempting Productivity Aides for Clinicians, But What Are the Patient Data Risks? Healthcare workers should think twice about using AI tools such as ChatGPT as a productivity booster, privacy experts warned after a Florida doctor publicized on TikTok how he used it to write a letter to an insurer arguing for patient coverage. What are the risks?

Risk 130
article thumbnail

Experts found SSRF flaws in four different Microsoft Azure services

Security Affairs

SSRF vulnerabilities in four Microsoft Azure services could be exploited to gain unauthorized access to cloud resources. Researchers at the security firm Orca discovered that four different Microsoft Azure services were vulnerable to server-side request forgery (SSRF) attacks. Threat actors could have exploited the flaws to gain unauthorized access to cloud resources.

article thumbnail

Ransomware Remains Top Cyber Threat, Former NCSC Chief Says

Data Breach Today

Ciaran Martin Warns 2023 Will See Increased High-Profile Attacks The former head of the U.K.'s National Cyber Security Centre warns that destructive ransomware targeting large enterprises is likely to surge in 2023, adding that recent attacks on Royal Mail and The Guardian newspaper are examples of these early-stage attacks.

article thumbnail

Spy Cams Reveal the Grim Reality of Slaughterhouse Gas Chambers

WIRED Threat Level

Animal rights activists have captured the first hidden-camera video from inside a carbon dioxide “stunning chamber” in a US meatpacking plant.

Privacy 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sophos to Lay Off 10% of Workers Amid Shift to MDR Services

Data Breach Today

Axing 450 Workers Represents Second-Largest Workforce Reduction In All of Security Sophos will execute the second-largest round of layoffs of any security company in the current economic downturn, axing 450 workers amid a shift to services. Sophos plans to reduce its staff by 10% as it moves to balance growth and profitability in a challenging and uncertain economic environment.

Security 130
article thumbnail

A couple of bugs can be chained to hack Netcomm routers

Security Affairs

A couple of critical vulnerabilities have been discovered in Netcomm rourers, experts warn of their potential exploitation in the wild. The vulnerabilities discovered in the Netcomm routers are a a stack based buffer overflow and an authentication bypass, respectively tracked as CVE-2022-4873 and CVE-2022-4874. Both issues impact the Netcomm router models NF20MESH, NF20, and NL1902 running software versions earlier than R6B035.

article thumbnail

Sophos Cuts Jobs to Focus on Cybersecurity Services

Dark Reading

Layoffs intended to cut costs, help company shift its focus on cybersecurity services, Sophos says.

article thumbnail

Myrocket HR platform’s data leak turns into privacy nightmare for employees

Security Affairs

HR management platform myrocket.co has exposed the personal information of hundreds of thousands of employees and millions of job candidates. Original post at CyberNews. On December 12, 2022, the Cybernews research team discovered a publicly accessible database with 260GB of sensitive personal data belonging to myrocket.co, offering ‘end-to-end’ recruitment solutions and HR services for companies in India.

Privacy 96
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ChatGPT Opens New Opportunities for Cybercriminals: 5 Ways for Organizations to Get Ready

Dark Reading

From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against chatbot-augmented attacks.

article thumbnail

Celsius Bankruptcy Court Confirms That Customer Digital Assets Are Property of the Estate in Key Ruling

Data Matters

The bankruptcy court presiding over the Chapter 11 cases of digital asset platform Celsius Network LLC and its affiliates (Celsius) issued a key ruling on January 4, 2023 (the Decision), by concluding that a significant portion of digital assets held in Celsius’ customer accounts are property of the debtors’ estates, and holders of such accounts accordingly are unsecured creditors. 1 The digital assets at issue in the Decision were held under Celsius’ “Earn” program, pursuant to which the digit

Privacy 88
article thumbnail

Cybersecurity and the Myth of Quiet Quitting

Dark Reading

People are working harder than ever, but they're not happy about it — and the insider threat is all too real.

article thumbnail

Harnessing Employee Networks to Drive Positive Change

Micro Focus

Our goal is to create and maintain an inclusive culture where every employee has opportunities to grow, express themselves, exchange ideas, and feel heard. It’s a journey and there is always more to learn and more to do. The post Harnessing Employee Networks to Drive Positive Change appeared first on Micro Focus Blog.

71
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Would the FTC Rule on Noncompetes Affect Data Security?

Dark Reading

Without noncompetes, how do organizations make sure employees aren't taking intellectual property when they go work to work for a competitor?

article thumbnail

A good foundation is key to digital forensic investigations

OpenText Information Management

I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When we build a house, we think about how big it will be, how it will be decorated, what kind of a view it will have or whether it will be close to schools and shopping. But … The post A good foundation is key to digital forensic investigations appeared first on OpenText Blogs.

IT 62
article thumbnail

Vulnerable Historian Servers Imperil OT Networks

Dark Reading

These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.

Archiving 112
article thumbnail

Empower business users in financial services to elevate customer experience

OpenText Information Management

The modern workplace expects more “jack of all trades” than specialists. It’s not a new phenomenon in traditional customer communications management (CCM) for an individual to wear multiple hats – performing more than one role to provide the most value to a business. The roles and responsibilities around data normalization, programming communications layouts and adding … The post Empower business users in financial services to elevate customer experience appeared first on

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Amazing Thing Is that DHL Phishing Campaigns STILL Work

KnowBe4

Researchers at Armorblox warn that a phishing campaign is impersonating DHL with fake shipping invoices.

article thumbnail

Data Security in Multicloud: Limit Access, Increase Visibility

Dark Reading

Ensuring that data can be easily discovered, classified, and secured is a crucial cornerstone of a data security strategy.

Access 73
article thumbnail

Whole Foods Settles BIPA Voiceprint Class Action 

Hunton Privacy

On January 3, 2023, an Illinois state court entered a preliminary approval order for a settlement of nearly $300,000 in a class action lawsuit against Whole Foods for claims that the company violated the Illinois Biometric Information Privacy Act (“BIPA”). The plaintiffs alleged that Whole Foods unlawfully collected voiceprints from employees who worked at the company’s distribution centers. .

Privacy 58
article thumbnail

Focus on citizen experience to make lasting change in government

OpenText Information Management

As the U.S. House of Representatives transitions to a new set of leaders, I can reflect upon my experience going through three Administration transitions as a government employee. No matter which party was entering or departing the White House, one common phrase was uttered by the leadership team every time: “How do we make lasting … The post Focus on citizen experience to make lasting change in government appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers

Dark Reading

The integration provides crucial protection for businesses’ most vulnerable departments — help desks and customer support teams — preventing the most advanced threats sent by online users.

63
article thumbnail

Australia to consider European-style right to be forgotten privacy laws

The Guardian Data Protection

Attorney general promises a ‘whole range’ of modernisations of the Privacy Act to follow new customer data protection laws Get our morning and afternoon news emails , free app or daily news podcast The right to be forgotten and a right to sue for privacy breaches will be considered for the next tranche of Australian legislation, the attorney general has said.

Privacy 60
article thumbnail

Meet Janet Greathouse – Learning Program Manager, Plano, USA

Micro Focus

Janet Greathouse, a Learning Program Manager in Plano USA, shares her experience moving from one department to another to grow her professional career – and how Micro Focus supported her on her journey. The post Meet Janet Greathouse – Learning Program Manager, Plano, USA appeared first on Micro Focus Blog.

52