Tue.Oct 04, 2022

article thumbnail

Shangri-La Hotels Hit by Data Breach Incident

Data Breach Today

Hong Kong Privacy Office Says It Is 'Disappointed' With Breach Notification Upscale Asian hotelier Shangri-La Group has copped to a data breach incident that may affect hundreds of thousands of guests. The hotel detected unauthorized access to its guest database in July but didn't notify guests or regulators until September.

article thumbnail

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords

Thales Cloud Protection & Licensing

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords. divya. Tue, 10/04/2022 - 05:20. Historically, October has always been an important month for the cybersecurity community and a month of major cybersecurity events. So in 2004, the President of the United States designated October as Cybersecurity Awareness Month.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Steals $29M From Transit Finance, Returns $19M

Data Breach Today

Thief Retains $2M as 'Bug Bounty,' Loses $1M to Bot Attack A hacker exploited a smart contract bug to steal about $29 million from DEX aggregator Transit Finance. Within hours of the theft, the attacker returned nearly $19 million - but not before keeping a $2 million "bug bounty" and losing $1.1 million to a bot theft.

176
176
article thumbnail

Trojanized Comm100 Live Chat app installer distributed a JavaScript backdoor

Security Affairs

A threat actor used a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor. Cybersecurity firm CrowdStrike disclosed details of a supply chain attack that involved the use of a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor. Comm100 is a provider of customer service and communication products that serves over 200,000 businesses.

Metadata 119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why Is Akamai an Appealing M&A Target for Private Equity?

Data Breach Today

Akamai's Big Bets Around Security Compensate for a Struggling Content Delivery Unit The steady barrage of acquisition reports around publicly traded digital experience vendor Akamai has intensified in recent weeks. The latest salvo landed Monday when StreetInsider reported that the intelligent edge platform provider held talks with a private equity firm about a potential takeover.

Security 130

More Trending

article thumbnail

US Regulators Identify Cybersecurity Risks in Crypto Trading

Data Breach Today

Need Regulator for Bitcoin Spot Market, Says Financial Stability Oversight Council A council chaired by Treasury Secretary Janet Yellen and comprised of the heads of major federal financial regulatory agencies called on Congress to more closely regulate the spot market for crypto assets. A report from the council identifies risks in digital assets, including cybersecurity.

Risk 130
article thumbnail

One-Fourth of Organizations Have Been Victim to a Ransomware Attack with 59% Starting with Email

KnowBe4

New analysis highlights just how prevalent ransomware attacks are today, how material the impacts are, whether organizations get their data back, and exactly how these attacks start.

article thumbnail

Passwords Are Unfit - So Why Do We Still Have Them?

Data Breach Today

Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.

Passwords 130
article thumbnail

Cyber Risk Remains Top Concern for Businesses with a Distinct Lack of Unpreparedness

KnowBe4

New insight from over 1200 businesses paints a picture of how organizations believe they are ready for an attack and are definitely focused on cyber risk, but don’t have what they need in place.

Risk 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tim Eades of vArmour on Expanding From Banking to Government

Data Breach Today

CEO Dishes on How Government Has Struggled to See Across Its Application Terrain While vArmour has enjoyed success in banking, the U.S. government is now the fastest-growing part of its business. CEO Tim Eades says much of the government doesn't understand the relationships and dependencies among vArmour's applications or the consequences of an application going down.

article thumbnail

FCC Warns of Post-Hurricane Scams

KnowBe4

The US Federal Communications Commission (FCC) offers advice on how to avoid falling for scams that follow in the wake of natural disasters like Hurricane Ian. Scammers target victims of disasters as well as people trying to donate to charities.

article thumbnail

Evolving IAM Challenges in Healthcare and Other Sectors

Data Breach Today

Rebecca Archambault, Senior Director Analyst at Gartner, Discusses Top IAM Trends The healthcare sector has long faced unique challenges involving identity and access management, but the novel coronavirus pandemic and various other key drivers are accentuating those issues, says Rebecca Archambault, senior director analyst at Gartner.

Access 130
article thumbnail

Bumblebee Malware Loader's Payloads Significantly Vary by Victim System

Dark Reading

On some systems the malware drops infostealers and banking Trojans; on others it installs sophisticated post-compromise tools, new analysis shows.

IT 116
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

North Korea Trojanizing Open-Source Software

Data Breach Today

Lazarus Group Uses Social Engineering to Manipulate Victims to Download Malware North Korea is using weaponized versions of open-source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.

IT 130
article thumbnail

NSA Employee Charged with Espionage

Schneier on Security

An ex-NSA employee has been charged with trying to sell classified data to the Russians (but instead actually talking to an undercover FBI agent). It’s a weird story, and the FBI affidavit raises more questions than it answers. The employee only worked for the NSA for three weeks—which is weird in itself. I can’t figure out how he linked up with the undercover FBI agent.

IT 102
article thumbnail

Digital Identity Bill Passes Key Senate Milestone

Data Breach Today

Jeremy Grant Explains How Bill Would Create Standards, Funding for Online IDs A Senate committee this week approved a bill that would create governmentwide standards for identity verification and provide grants to help states and local agencies upgrade ID systems and offer online digital identity services. Supporter Jeremy Grant hopes to see a full Senate vote in 2022.

130
130
article thumbnail

AI Governance: Break open the black box

IBM Big Data Hub

It is well known that Artificial Intelligence (AI) has progressed, moving past the era of experimentation. Today, AI presents an enormous opportunity to turn data into insights and actions, to amplify human capabilities, decrease risk and increase ROI by achieving break through innovations. While the promise of AI isn’t guaranteed and doesn’t always come easy, adoption is no longer a choice.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Steam Gaming Phish Showcases Browser-in-Browser Threat

Dark Reading

Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses.

Phishing 100
article thumbnail

A Few Considerations When Preserving Slack Data for Ediscovery

Hanzo Learning Center

Court rulings in the past few years have codified what people working in ediscovery have known all along: Slack (and other collaboration app data) is discoverable during litigation and should be preserved the same as email as stipulated in Rule 26 of the Federal Rules of Civil Procedure (FRCP). With that in mind, here are a few things to consider when preserving Slack data for ediscovery.

article thumbnail

Microsoft mitigations for recently disclosed Exchange zero-days can be easily bypassed

Security Affairs

The mitigation shared by Microsoft for the two recently disclosed Exchange zero-day vulnerabilities can be bypassed, expert warns. Last week, Microsoft confirmed that two zero-day vulnerabilities in Microsoft Exchange recently disclosed by researchers at cybersecurity firm GTSC are being actively exploited in the wild. The first flaw, tracked as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) issue.

article thumbnail

First 72 Hours of Incident Response Critical to Taming Cyberattack Chaos

Dark Reading

Responding to cyberattacks is extraordinarily stressful, but better planning, frequent practice, and the availability of mental health services can help IR professionals, a survey finds.

132
132
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A flaw in the Packagist PHP repository could have allowed supply chain attacks

Security Affairs

Experts disclosed a flaw in the PHP software package repository Packagist that could have been exploited to carry out supply chain attacks. SonarSource Researchers disclosed details about a now-fixed vulnerability ( CVE-2022-24828 ) in PHP software package repository Packagist,, that could have been exploited to carry out supply chain attacks. The issue was addressed within hours by the maintainers of the impacted repository. . “Sonar discovered and responsibly disclosed a critical vulnera

article thumbnail

Ransomware 3.0: The Next Frontier

Dark Reading

Attackers are already circling back to reselling stolen data instead of — and in addition to — extortion.

article thumbnail

KnowBe4 Named a Leader in the Fall 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Fall 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the sixth consecutive quarter!

article thumbnail

Vice Society Publishes LA Public School Student Data, Psych Evals

Dark Reading

After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

KnowBe4 Named a Leader in the Fall 2022 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

Microsoft Updates Mitigation for Exchange Server Zero-Days

Dark Reading

Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed.

110
110
article thumbnail

[HEADS UP] The Old "Nigerian Prince Scam" resurfaces as "Russian Billionaire Fraud"

KnowBe4

Scammers continue to get creative when it comes to current events - and this new scam is no exception.

IT 107