Mon.Feb 27, 2023

article thumbnail

Healthcare Most Hit by Ransomware Last Year, FBI Finds

Data Breach Today

Bureau Warns Underreporting Remains Rife, Including by Critical Infrastructure Healthcare last year was the most attacked sector within critical infrastructure, David Scott, deputy assistant director of the FBI Cyber Division, told a Scottish cybersecurity conference. The bureau in 2022 received 870 complaints showing indicators of a critical infrastructure ransomware attack.

article thumbnail

Attackers Were on Network for 2 Years, News Corp Says

Dark Reading

The publisher of the Wall Street Journal, New York Post, and several other publications had last year disclosed a breach it said was the work of a state-backed actor likely working for China.

IT 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Official Reproaches Industry for Bad Cybersecurity

Data Breach Today

CISA Director Says Programming Language Swap Will End Memory Safety Vulnerabilities A top U.S. government official urged industry to become more conscientious over cybersecurity by preventing vulnerabilities from accumulating before products ship. CISA head Jen Easterly called for a more assertive role for government and an industrywide shift to memory-safe programming languages.

article thumbnail

ChatGPT’s evil sibling? Meet DAN.

Jamf

Based on OpenAI’s ChatGPT, DAN is the jailbroken version of the advanced chatbot technology that operates free from policy constraints…but is this a good thing for the advancement of AI technology or does it further complicate matters relating to mainstream adaptability in our everyday world?

IT 105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

PureCrypter Targets North America, APAC Government Agencies

Data Breach Today

Hackers Uses Same FTP Server as Earlier OneNote Phishing Campaign A campaign targeting government entities in the Asia-Pacific and North America regions with an info stealer hosted on a Discord server shares infrastructure with a campaign that used Microsoft OneNote to deliver malware. Menlo Security says the unknown threat actor doesn’t seem to be a major player.

More Trending

article thumbnail

Online Shopping Cart Software Vulnerable: German BSI Report

Data Breach Today

BSI Study Finds Outdated Software, Vulnerable JavaScript Libraries An assessment of online shopping cart software used by e-commerce sites performed by the German cybersecurity agency found a slew of vulnerabilities, including code so old it's no longer supported as well as vulnerable JavaScript libraries. Germany has one of Europe's largest e-commerce markets.

Libraries 147
article thumbnail

Thousands of NPM Packages Used to Spread Phishing Links

KnowBe4

Researchers at Checkmarx warn that attackers uploaded more than 15,000 packages to NPM, the open-source repository for JavaScript packages, to distribute phishing links. The packages themselves weren’t malicious, but they contained README text files with links to phishing sites.

Phishing 101
article thumbnail

Australia Centralizes Government Cybersecurity Response

Data Breach Today

Home Affairs Minister Clare O'Neil Dings Cybersecurity Law as 'Bloody Useless' The Australian government says it will centralize its approach to securing federal agencies by appointing a coordinator to head the new National Office for Cyber Security within the Department of Home Affairs. The appointment comes after back-to-back major data breaches.

article thumbnail

As Social Engineering Attacks Skyrocket, Evaluate Your Security Education Plan

Dark Reading

Build a playbook for employees on how to handle suspicious communications, use mail filters, and screen and verify unfamiliar calls to bolster a defensive social engineering security strategy.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GLBA and Other Regulations Wake Up to the Importance of Security Awareness Training

KnowBe4

Most computer security practitioners have understood for many years the importance of having an aggressive security awareness training program. As social engineering is involved in 70% to 90% of all successful hacking attacks, not addressing the human element is not an option. Still, some of the regulatory documents have been slow to come around. Not anymore.

article thumbnail

Resecurity identified the investment scam network ‘Digital Smoke’

Security Affairs

Resecurity identified one of the largest investment fraud networks, tracked as Digital Smoke, by size and volume of operations. Resecurity identified one of the largest investment fraud networks by size and volume of operations created to defraud Internet users from Australia, Canada, China, Colombia, the European Union, India, Singapore, Malaysia, United Arab Emirates, Saudi Arabia, Mexico, the U.S. and other regions.

article thumbnail

OnDemand Webinar: Stop Worrying About Your MDR Strategy

Data Breach Today

162
162
article thumbnail

Dutch Police arrests 3 men involved in a massive extortion scheme. One of them is an ethical hacker

Security Affairs

The Dutch police arrested three individuals as a result of an investigation into computer trespass, data theft, extortion, extortion, and money laundering. The Dutch police announced the arrest of three men as the result of an extensive investigation into computer trespass, data theft, extortion, extortion, and money laundering The suspects were arrested by the Amsterdam police arrested on January 23, 2023.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Mobile Banking Trojans Surge, Doubling in Volume

Dark Reading

Mobile malware developers were busy bees in 2022, flooding the cybercrime landscape with twice the number of banking trojans than the year before.

97
article thumbnail

ChromeLoader campaign uses VHD files disguised as cracked games and pirated software

Security Affairs

Threat actors behind the ChromeLoader malware campaign are using VHD files disguised as popular games, experts warn. Researchers from Ahnlab Security Emergency Response Center ( ASEC ) recently uncovered a malware campaign distributing the ChromeLoader using VHD files. ChromeLoader is a malicious Chrome browser extension, it is classified as a pervasive browser hijacker that modifies browser settings to redirect user traffic.

article thumbnail

Vouched Raises $6.3M to Expand AI Identity Verification Offering to Telemedicine and Healthcare

Dark Reading

Vouched now covers more than 85% of the global population, as demand accelerates for its platform to securely automate KYC and KYP compliance to better serve patients and drive revenue.

article thumbnail

Threat actors leak Activision employee data on hacking forum

Security Affairs

Data allegedly stolen from the American gaming giant Activision in December security breach were leaked on a cybercrime forum. A threat actor leaked on the Breached hacking forum the data allegedly stolen from the gaming giant Activision in December 2022. @Activision was breached December 4th, 2022. The Threat Actors successfully phished a privileged user on the network.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Reduce Code Risk Using Pipelineless Security

Dark Reading

The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.

Risk 87
article thumbnail

PureCrypter used to deliver AgentTesla to govt organizations

Security Affairs

An unknown threat actor is targeting government organizations with the PureCrypter downloader, Menlo Security firm reported. Menlo Labs researchers uncovered an unknown threat actor is using the PureCrypter downloader in attacks aimed at government entities. The campaign relies on the domain of a compromised non-profit organization as a C2 server to deliver a second-stage payload.

article thumbnail

CENTRAL BANK DIGITAL CURRENCIES

Thales Cloud Protection & Licensing

CENTRAL BANK DIGITAL CURRENCIES divya Tue, 02/28/2023 - 06:31 CENTRAL BANK DIGITAL CURRENCIES an evolution of money and payments CBDC, or Central Bank Digital Currency, is a trending topic in the financial industry. Let's examine the basics of CBDC and its impact on the economy. As many Thales Accelerate Partners are actively involved in CBDC projects, it's important to understand the basics of this digital currency and see why cooperation with Thales is beneficial.

article thumbnail

PlugX Trojan disguised as a legitimate Windows open-source tool in recent attacks

Security Affairs

Researchers detailed a new wave of attacks distributing the PlugX RAT disguised as a legitimate Windows debugger tool. Trend Micro uncovered a new wave of attacks aimed at distributing the PlugX remote access trojan masqueraded as an open-source Windows debugger tool called x32dbg. The legitimate tool allows to examine kernel-mode and user-mode code, crash dumps, or CPU registers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

All CVEs Are Not Created Equal

Dark Reading

Vulnerabilities impact each industry differently, so each sector needs to think about its defenses and vulnerability management differently.

IT 81
article thumbnail

AI governance : the holy grail for all data scientists?

Collibra

I’ve been working at Collibra for almost four years now, which means that I’m proficient in everything that is related to governance. As a Data Scientist, I’m building predictive models with my colleagues. While doing this, I’ve come to the conclusion that something was missing. We lacked transparency on what data was being used, how it was being used, and what features finally made it to the model.

article thumbnail

What If Google Goes on Offense?

John Battelle's Searchblog

Last week I asked if Google was f*cked , and since then quite a few of you have reached out asking what I think the company could do to … un-f*ck itself. “Easy enough to declare the company is too big, too stuck in the mud, too cautious, too dependent on its cash cow,” you told me. “Much harder to advise them on what to do about it.” One of you just sighed to me on the phone, then said “it’s always been this way.

article thumbnail

Wiz Reaches $10B Valuation With Consolidated Cloud Security Platform

Dark Reading

Cloud security vendor Wiz has raised $900 million since its founding in 2020.

Cloud 85
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CILIP Pathways confirmed as end-point assessor for Level 7 Archivist apprenticeship

CILIP

CILIP Pathways confirmed as end-point assessor for Level 7 Archivist apprenticeship CILIP Pathways has been confirmed as the end-point assessor for the Level 7 Archivist and Records Manager apprenticeship launched by the National Archives and led by Westminster Adult Education Service (WAES). WAES will collaborate with CILIP Pathways to ensure that apprentices have a smooth journey from learning through to assessment and qualification.

article thumbnail

EU Regulatory Data Protection: Online advertising – A regulatory patchwork under construction

DLA Piper Privacy Matters

Authors: Heidi Waem and Simon Verschaeve The arrival of the internet has revolutionized the advertising landscape, and since the appearance of the first banner ad in 1994, innovative technologies have been developed in the field of online advertising. Since then, new stakeholders, such as online platforms, have emerged and a whole spectrum of new digital (behavioural) advertising means are used that increasingly rely on the use of data for online advertising.

article thumbnail

???????Top 5 Attributes for Selecting the Right Biometrics Authentication Vendor

HID Global

Businesses that want a competitive and positive customer experience should read HID’s blog about selecting the right biometrics authentication vendor.