Fri.Jun 02, 2023

article thumbnail

Hackers Using MOVEit Flaw to Deploy Web Shells, Steal Data

Data Breach Today

Mandiant Said TTPs of Threat Group Behind Exploiting MOVEit Appear Similar to FIN11 Adversaries have taken advantage of a zero-day vulnerability in Progress Software's managed file transfer product to deploy web shells and steal data, Mandiant found. An unknown threat actor began exploiting the critical SQL injection vulnerability in MOVEit Transfer on May 27.

273
273
article thumbnail

Attracting and Retaining the Next Generation of Information Management Leaders

AIIM

AIIM has been discussing the next generation of information management leaders and how the industry can better attract and retain young professionals quite a lot in 2023, and with good reason. The demographics of the workforce are changing. Generation Z (people born between 1997-2012) will account for 30 percent of the U.S. civilian labor force by 2030, according to the U.S.

Insurance 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese APT Backdoor Bypasses Indonesian Antivirus

Data Breach Today

TinyNote Creates a 'You Can't See It But It's There' Open Window A Chinese espionage threat group is using a novel backdoor to bypass popular Indonesian antivirus tool Smadav. Targets include European embassies in Southeast and East Asia. Smadav treats processes with no windows as suspect. The APT gets around that by opening a window not visible to users.

IT 246
article thumbnail

'Picture-in-Picture' Obfuscation Spoofs Delta, Kohl's for Credential Harvesting

Dark Reading

A recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from trusted brands.

135
135
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Pentagon to Pay Starlink for Ukraine's Satellite Broadband

Data Breach Today

Private Sector Services Remain Essential for Ukraine's Defense as War Continues The U.S. Department of Defense says it will pay for Starlink satellite broadband access for Ukraine as it battles Russia's all-out invasion. Military experts say Starlink remains essential for supporting Ukraine's battlefield communications, including drone reconnaissance.

Military 157

More Trending

article thumbnail

Healthcare CISO: Understand Your Digital Vendors' Security

Data Breach Today

How to Prevent Gaps in Vendors' Cybersecurity Strategy From Affecting Your Business Understanding how your digital health vendors approach cybersecurity, assess and respond to risk, and plan for incident response is critical to protecting your organization. Here is a set of steps to determine if your vendor is serious about their role in protecting patients.

article thumbnail

Warning: Sharing Data with ChatGPT Can Be Misused Outside Your Organization

KnowBe4

A new study found that ChatGPT can accurately recall any sensitive information fed to it as part of a query at a later date without controls in place to protect who can retrieve it.

IT 104
article thumbnail

Mistrial in Criminal HIPAA Case Against Army Doctor & Spouse

Data Breach Today

Jury Deadlocked on Whether Couple Was Entrapped to Leak Records to Undercover Agent A federal judge declared a mistrial in the criminal HIPAA conspiracy case against a married couple, both doctors, after the jury deadlocked on whether the two had been entrapped by the U.S. government into providing patient records to a supposed Russian operative. Prosecutors will seek a retrial.

article thumbnail

PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say

Dark Reading

The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.

Security 102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ISMG Editors: Why Communications Skills Matter for CISOs

Data Breach Today

Also: Health Entities Affected by Massive Data Breach; Identity Trends In the latest weekly update, ISMG editors discuss why communication is vital to be an effective CISO in 2023, how the hack of Florida-based dental insurer MCNA affects nearly 9 million people, and how CyberArk is securing privileged users with a new browser.

article thumbnail

Point32Health ransomware attack exposed info of 2.5M people

Security Affairs

After the recent ransomware attack, Point32Health disclosed a data breach that impacted 2.5 million Harvard Pilgrim Health Care subscribers. In April, the non-profit health insurer Point32Health took systems offline in response to a ransomware attack that took place on April 17. The insurer immediately launched an investigation into the incident with the help of third-party cybersecurity experts to determine the extent of the incident.

article thumbnail

Verification and Deepfake Fraud Trends in North America

KnowBe4

Forced verification fraud and deepfake fraud are on the rise in the US and Canada, according to researchers at Sumsub. Pavel Goldman-Kalaydin, Sumsub’s Head of AI & ML, explains that forced verification involves bypassing biometric data checks.

91
article thumbnail

MOVEit Transfer software zero-day actively exploited in the wild

Security Affairs

Threat actors are exploiting a zero-day flaw in Progress Software’s MOVEit Transfer product to steal data from organizations. Threat actors are actively exploiting a zero-day vulnerability in the Progress MOVEit Transfer file transfer product to steal data from organizations. MOVEit Transfer is a managed file transfer that is used by enterprises to securely transfer files using SFTP, SCP, and HTTP-based uploads.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Streamers Ditch Netflix for Dark Web After Password Sharing Ban

Dark Reading

Disgruntled users are pursuing offers for "full Netflix access" at steeply discounted rates.

Passwords 120
article thumbnail

CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added actively exploited Progress MOVEit Transfer zero-day vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added a Progress MOVEit Transfer SQL injection vulnerability, tracked as CVE-2023-34362 , to its Known Exploited Vulnerabilities Catalog. Threat actors are actively exploiting a zero-day vulnerability in the Progress MOVEit Transfer file transfer product to steal data from organizations.

IT 92
article thumbnail

Modernizing child support enforcement with IBM and AWS

IBM Big Data Hub

With 68% of child support enforcement (CSE) systems aging , most state agencies are currently modernizing them or preparing to modernize. More than 20% of families and children are supported by these systems, and with the current constituents of these systems becoming more consumer technology-centric, the use of antiquated technology systems is archaic and unsustainable.

Cloud 88
article thumbnail

New botnet Horabot targets Latin America

Security Affairs

A new botnet malware dubbed Horabot is targeting Spanish-speaking users in Latin America since at least November 2020. Cisco Talos researchers were observed deploying a previously unidentified botnet, dubbed Horabot, that is targeting Spanish-speaking users in the Americas. The botnet is used to deliver a banking trojan and spam tool to the infected systems, Horabot has been active since at least November 2020.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 350

Troy Hunt

And so ends a long period of back-to-back weeks of conferences and talks. It's funny how these things seem to cluster together at times and whilst the last 6 or 8 weeks (I honestly lose track!) have been chaotic, I've now got a few weeks of much less pressure which will give me time to finally push out some HIBP stuff that's been in the wings for ages.

IoT 79
article thumbnail

How CISOs Can Manage the Intersection of Security, Privacy, And Trust

Dark Reading

Integrating a subject rights request tool with security and compliance solutions can help identify potential data conflicts more efficiently and with greater accuracy.

article thumbnail

The Messy US Influence That’s Helping Iranians Stay Online

WIRED Threat Level

Newly announced sanctions against Iran-based Avaran Cloud underscore the complexity of crafting Washington’s internet freedom efforts.

Cloud 73
article thumbnail

'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft

Dark Reading

SMS campaigns targeting members of the public in the United Arab Emirates have been detected.

98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Jamf Breakfast Club: Top 5 ways digital signage reinforces students safety and wellbeing

Jamf

In this episode of the Jamf Breakfast Club, Jamf co-hosts Mike Lawrence and Nick Morawiecki are joined by guests Amber Ward, Marketing Director at Carousel Digital Signage, and Ashley Northrup, National Certified School Psychologist to discuss how Jamf and Carousel reinforce social/emotional learning in schools.

article thumbnail

Want Sustainable Security? Find Middle Ground Between Tech & Education

Dark Reading

The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.

article thumbnail

Prioritizing Cybersecurity Risk with Vulnerability Prediction: Insights from Outpost24's Director of Product Management on Smashing Security

Outpost24

Prioritizing Cybersecurity Risk with Vulnerability Prediction: Insights from Outpost24's Director of Product Management on Smashing Security 02.Jun.2023 Florian Barre Fri, 06/02/2023 - 08:15 Teaser The Smashing Security podcast recently invited our Director of Product Management, John Stock, on to discuss our Vulnerability Prediction Technology (VPT) tool, the security challenges brought by remote work, and the importance of balancing risk management with business goals.

Risk 52
article thumbnail

Nuix Acquires Automation Partner Rampiva

IG Guru

Check out the Press Release here

73
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Accelerating AI & Innovation: the future of banking depends on core modernization

IBM Big Data Hub

In the rapidly evolving landscape of financial services, embracing AI and digital innovation at scale has become imperative for banks to stay competitive. With the power of AI and machine learning, financial institutions can leverage predictive analytics, anomaly detection and shared learning models to enhance system stability, detect fraud and drive superior customer-centric experiences.

article thumbnail

Russia’s FSB blames the US intelligence for Operation Triangulation

Security Affairs

Russia’s intelligence Federal Security Service (FSB) said that the recent attacks against iPhones with a zero-click iOS exploit as part of Operation Triangulation were carried out by US intelligence. Researchers from the Russian firm Kaspersky have uncovered a previously unknown APT group that is targeting iOS devices with zero-click exploits as part of a long-running campaign dubbed Operation Triangulation.

article thumbnail

Friday Squid Blogging: Squid Chromolithographs

Schneier on Security

Beautiful illustrations. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.