Wed.Aug 03, 2022

article thumbnail

Busting the Myths of Hardware Based Security

Security Affairs

Many experts often overlook hardware based security and its vital importance in establishing a secure workspace. When it comes to cybersecurity, everyone likes to talk about software and the dangers that it poses. However, people often overlook hardware-based security and its vital importance in establishing a secure workspace. This is attributed to a general lack of knowledge when it comes to hardware security and how it works.

Security 106
article thumbnail

Hackers Steal $8M in Ongoing Attack on Solana Hot Wallets

Data Breach Today

Cause of Attack Is Unknown, Moving Funds to Cold Wallets Recommended Hackers are using an unknown exploit to draw down internet-connected wallets on the Solana blockchain. So far, thieves have made off with about $8 million worth of cryptocurrency, predominantly from mobile wallet users of Phantom and Slope. Solana is working to identify the root cause.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sending Spammers to Password Purgatory with Microsoft Power Automate and Cloudflare Workers KV

Troy Hunt

How best to punish spammers? I give this topic a lot of thought because I spend a lot of time sifting through the endless rubbish they send me. And that's when it dawned on me: the punishment should fit the crime - robbing me of my time - which means that I, in turn, need to rob them of their time. With the smallest possible overhead on my time, of course.

Passwords 145
article thumbnail

Fortinet Looks to Address Rising Costs with Price Increases

Data Breach Today

Fortinet Says Price Hikes Have More Than Offset Supply Chain and Geopolitical Issues Fortinet has raised prices on products and services to address macroeconomic challenges including shipping delays, longer activation timelines, and the suspension of sales in Russia. The company says price hikes have more than offset supply chain and geopolitical headwinds in recent months.

Sales 291
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google fixed Critical Remote Code Execution flaw in Android

Security Affairs

Google addressed a critical vulnerability in Android OS, tracked as CVE-2022-20345, that can be exploited to achieve remote code execution over Bluetooth. Google has fixed a critical vulnerability, tracked as CVE-2022-20345, that affects the Android System component. The IT giant has fixed the flaw with the release of Android 12 and 12L updates. Google did not disclose additional details about the vulnerability. “The most severe vulnerability in this section could lead to remote code execu

Security 123

More Trending

article thumbnail

Manjusaka, a new attack tool similar to Sliver and Cobalt Strike

Security Affairs

Researchers spotted a Chinese threat actors using a new offensive framework called Manjusaka which is similar to Cobalt Strike. Talos researchers observed a Chinese threat actor using a new offensive framework called Manjusaka (which can be translated to “cow flower” from the Simplified Chinese writing) that is similar to Sliver and Cobalt Strike tools.

Libraries 115
article thumbnail

Nomad Recovers $11M of $190M Stolen in Frenzied Attack

Data Breach Today

3 Crypto Wallets Hold $95M of Stolen Funds; $6M Laundered on Tornado Cash Multiple individuals returned a total of $11.4 million of the $190 million worth of cryptocurrency drained from cross-chain bridge Nomad on Wednesday, blockchain security firm PeckShield tells ISMG. Three cryptocurrency wallets currently hold $95 million of the stolen funds, it says.

article thumbnail

Critical RCE Bug in DrayTek Routers Opens SMBs to Zero-Click Attacks

Dark Reading

SMBs should patch CVE-2022-32548 now to avoid a host of horrors, including complete network compromise, ransomware, state-sponsored attacks, and more.

article thumbnail

Dental Care Alliance Settles Breach Lawsuit for $3 Million

Data Breach Today

2020 Cyberattack Affected Patients, Employees at Hundreds of Dental Practices A $3 million settlement is headed for final court approval in a class action lawsuit involving a 2020 cyberattack against a vendor that provides support services to hundreds of dental practices in 21 states. The incident affected more than 1.2 million of the practices' patients and employees.

245
245
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Labor Market Social Engineering: Supply-Side and Demand-Side

KnowBe4

We’re accustomed to social engineering being used for credential theft and business email compromise. We’re also accustomed to hearing about the increase in remote work during the pandemic, and how that has expanded organizations’ attack surface.

Marketing 110
article thumbnail

Hacking Concerns Delay Balloting for New UK Prime Minister

Data Breach Today

Online Voting System Being Revamped Over Concerns Ballots Could Later Be Changed Britain's Conservative Party is holding a leadership contest, with the winner set to become the country's next prime minister. But the balloting process has been delayed after the National Cyber Security Center warned that hackers could abuse a process allowing members to change their online vote.

Security 244
article thumbnail

Power semiconductor component manufacturer Semikron suffered a ransomware attack

Security Affairs

Semikron, a German-based independent manufacturer of power semiconductor components, suffered a ransomware cyberattck. Semikron is a German-based independent manufacturer of power semiconductor components, it employs more than 3,000 people in 24 subsidiaries worldwide, with production sites in Germany, Brazil, China, France, India, Italy, Slovakia and the USA.

article thumbnail

Proof of Concept: China's Threat to National Security

Data Breach Today

Also: Latest Analysis of Log 4j Event; How to Secure Evolving Work Patterns John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.

Security 236
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

India Withdraws Data Protection Bill

Hunton Privacy

Stephen Mathias from Kochhar & Co. reports that, on August 3, 2022, the Government of India withdrew the Indian Data Protection Bill (the “Bill”) that was pending before the Indian Parliament. As we previously reported , the Bill was expected to be tabled during the Monsoon session of Parliament, which commenced on July 18, 2022. While the Government was contemplating making certain changes to the existing Bill, it is now considering drafting fresh legislation, including a bill that addresse

article thumbnail

OCC's Hsu Urges Multifactor Authentication

Data Breach Today

MFA Plus Patch Management and Backups Can Prevent Cyber Incidents A top federal regulatory official urged financial institutions to implement multifactor authentication for all nonpublic systems, telling an audience of financial executives that a majority of breaches could be avoided or mitigated through basic cybersecurity controls.

article thumbnail

How IT Teams Can Use 'Harm Reduction' for Better Cybersecurity Outcomes

Dark Reading

Copado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.

article thumbnail

Reducing Risk by Breaking Down Supply Chain Siloes

Data Breach Today

Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says.

Risk 225
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cobalt Strike Inspires Next-generation Crimeware

eSecurity Planet

Cobalt Strike is a legitimate vulnerability scanning and pentesting tool that has long been a favorite tool of hackers , and it’s even been adapted by hackers for Linux environments. And now it’s inspiring imitators. Cisco Talos researchers have disclosed a new toolset used in the wild by threat actors as an alternative to Cobalt Strike or Silver.

article thumbnail

School Kid Uploads Ransomware Scripts to PyPI Repository as 'Fun' Project

Dark Reading

The malware packages had names that were common typosquats of a legitimate widely used Python library. One was downloaded hundreds of times.

Libraries 114
article thumbnail

Adopting circular business models in retail and consumer goods

CGI

Embracing a circular model is a complex process that requires innovation supported by continuous feedback and change management. But it works, and the benefits are numerous.

Retail 98
article thumbnail

UK parliament closes TikTok account after Tory criticism of app’s China links

The Guardian Data Protection

MPs including Tom Tugendhat and Iain Duncan Smith express fears Beijing may be able to access users’ personal data The UK parliament has closed its TikTok account following objections from senior Conservative politicians about the social video app’s connections to China. The speakers of the House of Commons and House of Lords said they had not been consulted on setting up the account and would close it immediately.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Zero-Day Defense: Tips for Defusing the Threat

Dark Reading

Because they leave so little time to patch and defuse, zero-day threats require a proactive, multilayered approach based on zero trust.

110
110
article thumbnail

Hackers Find Alternatives to Microsoft Office Macros

eSecurity Planet

Hackers have been exploiting macros in Microsoft Office products for years, but now their tactics are changing as Microsoft has begun blocking macros by default. The typical attack scenario involves phishing via email attachments, such as Word, Excel or PowerPoint documents containing malicious macros infected with malware. Such documents are common in enterprises, and the Microsoft Office suite is widely used.

article thumbnail

On-Demand Webinar: New 2022 Phishing By Industry Benchmarking Report: How Does Your Organization Measure Up

KnowBe4

As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up. IT security seems to be a race between effective technology and ever evolving attack strategies from the threat actors. However, there’s an often-overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

article thumbnail

VMWare Urges Users to Patch Critical Authentication Bypass Bug

Threatpost

Vulnerability—for which a proof-of-concept is forthcoming—is one of a string of flaws the company fixed that could lead to an attack chain.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Data Breach Extortion Attack Begins with a Fake Duolingo or MasterClass Subscription Scam

KnowBe4

The cybercriminal gang, dubbed ‘Luna Moth’ uses a sophisticated mix of phishing , vishing, remote support sessions, and remote access trojans to gain control of victim endpoints.

article thumbnail

New Startup Footprint Tackles Identity Verification

Dark Reading

Early-stage startup Footprint's goal is to provide tools that change how enterprises verify, authentication, authorize, and secure identity.

article thumbnail

Seven things to considering Account-Based Marketing– My Thales ABM Journey

Thales Cloud Protection & Licensing

Seven things to considering Account-Based Marketing– My Thales ABM Journey. divya. Thu, 08/04/2022 - 06:04. Back in March, as I was getting ready to come back from maternity leave, I was offered the chance to embark on a new and exciting career journey: piloting Account-Based Marketing for the Thales CPL EMEA region. Coming from a field marketing role, this felt like a bit of a shift, but I knew we had done some early ABM experiments over the last 2 years with good success, so it was an exciting