Thu.Jan 26, 2023

article thumbnail

FBI Seizes Hive Ransomware Servers in Multinational Takedown

Data Breach Today

Agents Infiltrated Hive in July 2022: 'We Hacked the Hackers,' Says DOJ Official The FBI penetrated the network of the Hive ransomware group, which has a history of attacking hospitals.

article thumbnail

7 Insights From a Ransomware Negotiator

Dark Reading

The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2 Hacks Involving Mental Health Data Affected Nearly 400,000

Data Breach Today

Includes Ransomware Attack on Social Services Provider, Email Hack on Behavioral Health Entity Two hacking breaches - one at a non-profit provider of foster care, mental health and substance treatment services, and the other at a provider of behavioral health services - have affected sensitive information of nearly 400,000 individuals.

article thumbnail

German Government, Airports, Banks Hit With Killnet DDoS Attacks

Dark Reading

After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Venture Capitalist: Now Is an Ideal Time to Invest in Cyber

Data Breach Today

Forgepoint's Alberto Yépez on the State of Cybersecurity Investments in 2023 Valuations are down, some companies have left the market altogether, and some even have announced deep rounds of layoffs.

More Trending

article thumbnail

Protecting the Hidden Layer in Neural Networks

Data Breach Today

In this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning models, and John Kindervag explains how such technology fits into the zero trust framework

article thumbnail

A Child's Garden of Cybersecurity

Dark Reading

Whether you dream of your child growing into a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery

article thumbnail

Uniform Infrastructure Raises Risk for Industrial Attacks

Data Breach Today

Dragos CEO: Unpatched Vulnerabilities Less of a Problem in OT Than Outsiders Think The increased physical connectivity of digital assets has expanded the attack surface and added complexity for engineers in industrial environments, says Dragos CEO Robert Lee.

Risk 130
article thumbnail

Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems

Dark Reading

Hackers don't need a key to get past your defenses, if they can essentially teleport using RMMs, warns CISA and the NSA

135
135
article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

OneSpan to Buy ProvenDB to Securely Store, Vault Documents

Data Breach Today

The Australian Startup Uses Blockchain To Stop Data Tampering, Document Alteration OneSpan plans to purchase an Australian startup founded by a longtime Quest Software executive to securely store and vault documents based on blockchain technology.

article thumbnail

SaaS RootKit Exploits Hidden Rules in Microsoft 365

Dark Reading

A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit

134
134
article thumbnail

U.K. Insurers Mostly Withstand Cyber Stress Test

Data Breach Today

Exclusions and Reinsurance Bolster Resiliency to Extreme Cyber Risk A periodic stress test assessment of U.K. insurers by the Bank of England found underwriters mostly withstood extreme cyber events.

Insurance 130
article thumbnail

Hive Ransomware Gang Loses Its Honeycomb, Thanks to DoJ

Dark Reading

The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

Ukraine's Critical Sectors Targeted in Phishing Attack Surge

Data Breach Today

Spike in Late 2022 Occurred as Experts Were Tracking 'Reduced Tempo' in Conflict While Russian military forces and allied groups continue to pummel Ukrainian targets with online attacks, security experts tracked a phishing and malware surge at the end of 2022, even as U.S.

Military 130
article thumbnail

Riot Games Latest Video-Game Maker to Suffer Breach

Dark Reading

Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends

128
128
article thumbnail

ISACA Survey: Privacy in Practice 2023 Highlights

Data Breach Today

Privacy Expert Safia Kazi on Privacy Skills, Building Privacy by Design ISACA's recently published Privacy in Practice 2023 survey report shares new research related to the privacy workforce, privacy skills, privacy by design and the future of privacy.

Privacy 130
article thumbnail

Organizations Must Brace for Privacy Impacts This Year

Dark Reading

Expect more regulatory and enforcement action in the US and around the world

Privacy 122
article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

The Double-Edged Sword of AI in Healthcare Cybersecurity

Data Breach Today

Both Medical Professionals and Cyberattackers Are Using AI to Improve Their Work As artificial intelligence, or AI, grows in popularity for simplifying workflows and diagnosing patients, healthcare leaders need to understand that AI use is also increasing among cyberattackers and take action to prevent its use for malicious purposes.

article thumbnail

Dutchman Detained for Dealing Details of Tens of Millions of People

Dark Reading

The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop

122
122
article thumbnail

The Best Personal Safety Devices, Apps, and Alarms (2023)

WIRED Threat Level

Your smartphone or wearable could help you out in a truly dangerous situation. Here are some options to consider. Gear Gear / Buying Guides Gear / Products / Lifestyle Security

Security 106
article thumbnail

Threat Groups Distributing Malware via Google Ads

eSecurity Planet

Security researchers are warning that Google Ads are being actively leveraged to distribute malware to unsuspecting victims searching for software downloads.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Most Criminal Cryptocurrency Funnels Through Just 5 Exchanges

WIRED Threat Level

The crypto money-laundering market is tighter than at any time in the past decade, and the few big players are moving a “shocking” amount of currency. Security Security / Cyberattacks and Hacks Security / Security News Business / Blockchain and Cryptocurrency

Marketing 101
article thumbnail

Cybellum Releases Enhanced SBOM Management and Compliance Oversight for Manufacturers with New Release of its Product Security Platform

Dark Reading

Advanced workflow, approval process, and management dashboard enhance control, distribution, and supervision, while reducing errors and streamlining the entire SBOM management process

article thumbnail

On Alec Baldwin’s Shooting

Schneier on Security

We recently learned that Alec Baldwin is being charged with involuntary manslaughter for his accidental shooting on a movie set. I don’t know the details of the case, nor the intricacies of the law, but I have a question about movie props. Why was an actual gun used on the set?

article thumbnail

NIST Risk Management Framework Aims to Improve Trustworthiness of Artificial Intelligence

Dark Reading

New guidance seeks to cultivate trust in AI technologies and promote AI innovation while mitigating risk

article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

Experts warn of a surge of attacks exploiting a Realtek Jungle SDK RCE (CVE-2021-35394)

Security Affairs

Experts warn of a spike in the attacks that between August and October 2022 attempted to exploit a Realtek Jungle SDK RCE (CVE-2021-35394).

IoT 87
article thumbnail

Center for Cyber Safety and Education Opens 2023 Cybersecurity Scholarship Applications

Dark Reading

Program provides financial assistance to aspiring information security professionals, enabling students toward long-term career success

article thumbnail

Hive Ransomware Tor leak site apparently seized by law enforcement

Security Affairs

The leak site of the Hive ransomware gang was seized due to an international operation conducted by law enforcement in ten countries. The Tor leak site used by Hive ransomware operators has been seized as part of an international operation conducted by law enforcement in 10 countries.