Tue.May 23, 2023

article thumbnail

Panel | The Four Steps to Build a Modern Data Protection Platform

Data Breach Today

With data distributed across multiple clouds serving an increasingly remote workforce, can existing data protection programs truly be successful? Most data protection solutions have been built on a foundation of legacy technologies and operations that only drive up complexity and costs. A best-in-class data protection program should be easy to operate, reduce costs, and ultimately drive down data loss risk.

Cloud 262
article thumbnail

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

The Last Watchdog

As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. Related: Collateral damage of T-Mobile hack Yet, APIs have also exponentially increased the attack vectors available to malicious hackers – and the software community has not focused on slowing the widening of this security gap.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea's BlueNoroff Group Targets macOS Systems

Data Breach Today

BlueNoroff Changed Attack Tactics in 2023 After Its TTPs Were Leaked The BlueNoroff hacker group, which is associated with the North Korean military's Reconnaissance General Bureau, is using RustBucket malware to target macOS systems of users primarily in the United States and Asia - a tactic observed for the first time since the group began its operations.

Military 258
article thumbnail

Digitizing Records: Getting Started

National Archives Records Express

Digital Imaging Lab [technologies] at Archives 2–[photographed for] Prologue use. National Archives Identifier: 184340999 We continue our series of posts to support the publication of 36 CFR section 1236 subpart E – Digitizing Permanent Records , which provides the requirements for digitizing permanent records. Records management is a crucial part of any agency operation, and the rise of digital technology has led many agencies to digitize their records for improved efficiency and ac

article thumbnail

Beware of Pixels & Trackers: A Client-Side Security Report

At the beginning of 2023, concern grew over pixels and trackers, which load into the browser as a part of the software supply chain, being used by data harvesting platforms to collect user data. The data is then transferred to the servers of the companies owning the pixels/trackers as a part of their advertising and marketing business. Aggressive data harvesting practices increase the likelihood and/or actual transfer of sensitive data, which may cause unintended consequences, including expensiv

article thumbnail

NY AG Fines Practice Management Firm $550K in 2020 Breach

Data Breach Today

Practicefirst Failed to Patch Critical Firewall Flaw That Led to Breach, AG Says A practice management software firm has agreed to pay a $550,000 fine and implement a comprehensive data security program to settle an enforcement action by New York state regulators after a 2020 ransomware attack that affected 1.2 million individuals nationwide, including 428,000 New Yorkers.

More Trending

article thumbnail

IT Worker Admits Piggybacking on Hacker's Extortion Attempt

Data Breach Today

Analyst Altered Ransom Note, Substituting His Own Cryptocurrency Wallet Address An IT security analyst has confessed to trying to blackmail his employer by altering ransom notes sent from a hacker to a board member and changing the cryptocurrency payment address to one he controlled. After his employer detected the unusual activity, U.K. police traced it back to the worker.

IT 162
article thumbnail

Credible Handwriting Machine

Schneier on Security

In case you don’t have enough to worry about, someone has built a credible handwriting machine: This is still a work in progress, but the project seeks to solve one of the biggest problems with other homework machines, such as this one that I covered a few months ago after it blew up on social media. The problem with most homework machines is that they’re too perfect.

article thumbnail

EU Committee Probes TikTok, UK's Updated GDPR

Data Breach Today

LIBE Committee Hears From Heads of UK and Irish Privacy Regulators European Union lawmakers have criticized the British government's updated privacy bill over concerns that it fails to adequately protect European citizens' fundamental rights. Lawmakers also heard from the Irish data authority on the status of its pending TikTok inquiry.

GDPR 147
article thumbnail

What Security Professionals Need to Know About Aggregate Cyber Risk

Dark Reading

Widespread cyber incidents will happen, but unlike for natural disasters, specific security controls can help prevent a catastrophe.

Security 128
article thumbnail

Why You Need to Use Case Studies in Sales and Marketing (and How to Start Now)

Case studies are proof of successful client relations and a verifiable product or service. They persuade buyers by highlighting your customers' experiences with your company and its solution. In sales, case studies are crucial pieces of content that can be tailored to prospects' pain points and used throughout the buyer's journey. In marketing, case studies are versatile assets for generating business, providing reusable elements for ad and social media content, website material, and marketing c

article thumbnail

Sharp Decline in Crypto Hacks in Q1 2023 Unlikely to Last

Data Breach Today

Law Enforcement, Regulatory Action in US Likely Led to 70% Drop in Hacks Law enforcement and regulatory action over the past year in the United States most likely dissuaded hackers from stealing cryptocurrency, making the amount stolen in the first quarter of the year the lowest compared to each of the four quarters in 2022, TRM Labs said.

130
130
article thumbnail

Microsoft: BEC Attackers Evade 'Impossible Travel' Flags With Residential IP Addresses

Dark Reading

Threat actors are circumventing geo-location-based security detections, using a combination of cybercrime-as-a-service platforms and the purchasing of local IP addresses.

Security 105
article thumbnail

How the New UK Fraud Strategy Targets Scams

Data Breach Today

Ken Palla on Implementing the Plan to Pursue Fraud, Block Fraud and Empower People The U.K. government earlier this month introduced a strategy to reduce fraud and scams called Fraud Strategy: Stopping Scams and Protecting the Public. Ken Palla, retired director of MUFG Bank, said this as an important step to combat authorized scams, which have now eclipsed unauthorized fraud.

article thumbnail

Security 360 Highlights: User privacy

Jamf

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise. Preserving user privacy is a growing threat that the data supports and is the focus of this blog series.

Privacy 95
article thumbnail

Apache Cassandra® NoSQL for the Relational DBA

Unleash the power of NoSQL with "Apache Cassandra® NoSQL for the Relational DBA." Learn from Lewis DiFelice, an experienced Professional Services Consultant at Instaclustr, as he shares his journey transitioning from SQL to managing a 40-node Cassandra cluster. Gain insights into Cassandra's architecture, configuration strategies, and best practices.

article thumbnail

Ukraine Identifies Central Asian Cyberespionage Campaign

Data Breach Today

Official Address of Ukraine's Embassy in Tajikistan Used to Send Phishing Emails Possibly Russian hackers likely compromised the official email address of Ukraine's embassy in Tajikistan to send phishing emails to organizations located in central Asia, Israel and India. The Computer Emergency Response Team of Ukraine tracks the campaign as UAC-0063.

Phishing 130
article thumbnail

Google announced its Mobile VRP (vulnerability rewards program)

Security Affairs

Google introduced Mobile VRP (vulnerability rewards program), a new bug bounty program for reporting vulnerabilities in its mobile applications. Google announced a new bug bounty program, named Mobile VRP (vulnerability rewards program), that covers its mobile applications. Google’s Mobile VRP is a bug bounty program for reporting vulnerabilities in first-party Android applications developed or maintained by Google.

IT 92
article thumbnail

Enterprises Must Prepare Now for Shorter TLS Certificate Lifespans

Dark Reading

Shorter certificate lifespans are beneficial, but they require a rethink of how to properly manage them.

127
127
article thumbnail

German arms manufacturer Rheinmetall suffered Black Basta ransomware attack

Security Affairs

The German automotive and arms manufacturer Rheinmetall announced it was victim of a Black Basta ransomware attack that took place last month. Rheinmetall is a German automotive and arms manufacturer that is listed on the Frankfurt stock exchange. The company this week announced it was victim of a ransomware attack conducted by the Black Basta ransomware group.

article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft

Dark Reading

Secure email gateways and end users alike are being fooled by a cyberattack campaign that's enjoying skyrocketing volumes against businesses in every industry, globally.

article thumbnail

Hanzo Collaboration Data Snapshot Survey Results from CLOC

Hanzo Learning Center

Once again, the CLOC Global Institute (CGI) has come and gone. But while we were there, Hanzo took a quick snapshot survey of Legal Operations professionals to gain insights into how people are using collaboration data and how it's affecting in-house legal departments.

IT 88
article thumbnail

Configure an IBM Cloud Code Engine application to use custom domains

IBM Big Data Hub

IBM Cloud Code Engine is a fully managed, serverless platform that runs your containerized workloads, including web apps, microservices, event-driven functions or batch jobs. Code Engine even builds container images for you from your source code. All these workloads can seamlessly work together because they are all hosted within the same Kubernetes infrastructure.

Cloud 84
article thumbnail

The previously undocumented GoldenJackal APT targets Middle East, South Asia entities

Security Affairs

A previously undocumented APT group tracked as GoldenJackal has been targeting government and diplomatic entities in the Middle East and South Asia since 2019. Kaspersky researchers shared details about the activity of a previously undocumented APT group, tracked as GoldenJackal, which has been active since 2019. The primary motivation of the group appears to be the espionage.

article thumbnail

From Hadoop to Data Lakehouse

Getting off of Hadoop is a critical objective for organizations, with data executives well aware of the significant benefits of doing so. The problem is, there are few options available that minimize the risk to the business during the migration process and that’s one of the reasons why many organizations are still using Hadoop today. By migrating to the data lakehouse, you can get immediate benefits from day one using Dremio’s phased migration approach.

article thumbnail

[Microsoft Warning] A 38% Spike In Business Email Compromise with new Cybercrime-as-a-Service

KnowBe4

Microsoft has observed a thirty-eight percent increase in cybercrime-as-a-service (CaaS) offerings for launching business email compromise (BEC) attacks between 2019 and 2022.

80
article thumbnail

A deeper insight into the CloudWizard APT’s activity revealed a long-running activity

Security Affairs

Experts warn of a threat actor, tracked as CloudWizard APT, that is targeting organizations involved in the region of the Russo-Ukrainian conflict. On March 2023, researchers from Kaspersky spotted a previously unknown APT group, tracked as Bad Magic (aka Red Stinger), that targeted organizations in the region of the Russo-Ukrainian conflict. The attackers were observed using PowerMagic and CommonMagic implants.

article thumbnail

AI-generated Disinformation Dipped The Markets Yesterday

KnowBe4

The Insider reported that an apparently AI-generated photo faking an explosion near the Pentagon in D.C. went viral. The Arlington Police Department confirmed that the image and accompanying reports were fake. But when the news was shared by a reputable Twitter account on Monday, the market briefly dipped.

article thumbnail

FBI: Human Trafficking Rings Force Job Seekers Into Cryptojacking Schemes

Dark Reading

Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.

114
114
article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

What is smart transportation?

IBM Big Data Hub

Every day, people encounter multiple obstacles while traveling to their intended destinations. Sitting in traffic, waiting for the bus to arrive 15 minutes later than scheduled, driving around for 30 minutes to find a parking spot—the modern world is full of inconveniences due to underlying inefficiencies in our transportation systems. However, stalled cars and harried people waiting for public transportation aren’t just an individual nuisance.

IoT 79
article thumbnail

To Lock Down PII, Privacy and Security Must Work Side by Side via Government Technology

IG Guru

North Carolina Chief Privacy Officer Cherie Givens talks about what she learned from building privacy programs at federal agencies and what common pitfalls states should avoid when establishing their own policies.

Privacy 78
article thumbnail

LogRhythm vs Splunk: Top SIEM Solutions Compared

eSecurity Planet

If you’re in the market for a security information and event management (SIEM) solution, both LogRhythm and Splunk have a lot to offer, with strong support from customers and industry analysts. Both solutions appear in eSecurity Planet ’s list of top SIEM products , and SIEM buyers often compare the two. What follows is a closer look at key features of each product, with an examination of their strengths and weaknesses.

Cloud 76